Current location - Quotes Website - Personality signature - Hello! My younger brother wants to be a graduate student of information security in Chengdu University of Electronic Technology next year. What books should I read for the professional exam?
Hello! My younger brother wants to be a graduate student of information security in Chengdu University of Electronic Technology next year. What books should I read for the professional exam?
There are some things about Chengdian Admissions Online.

Unified examination of English political mathematics, independent proposition of professional courses. 825 Cryptography Foundation and Network Security

Introduction to Cryptography: The Beauty of Wade trapp

Cryptography and network security: principle and practice.

Re-examination of C language or computer composition principle

Examination Subject 825 Cryptography Foundation and Network Security Examination Form Written Examination (Closed Book)

Examination time 180 minutes, total examination score 150 points.

I. General requirements

Master the basic theories, methods and application technologies of cryptography, the basic principles of network security, knowledge structure and various methods and technologies to ensure network security, and master the basic concepts and methods of information security engineering.

Second, the content

1, information security foundation

1) the development of cryptography (understanding)

2) Basic concepts of cryptography and its classification (mastery)

2. Classic password

1) Basic encryption operations in classical cryptography (understanding)

2) Several typical classical cryptosystems (understanding)

3) Statistical analysis of classical passwords (understanding)

3. Shannon theory

1) Mathematical model of cryptographic system (master)

2) Entropy and its Properties (Understanding)

3) Perfect confidentiality of cryptographic system (understanding)

Step 4 block passwords

1) Basic principle of block cipher (understanding)

2) Data encryption standard DES (master)

3) Multiple DES (Proficiency)

4)DES working mode (main)

5) Advanced Encryption Standard AES (Understanding)

5. Public key cryptography

1) Basic knowledge of elementary number theory (master)

2) Theoretical basis of public key cryptography (understanding)

3)RSA public key password (master)

4)EIGamal Public Key Cryptography (Understanding)

5) elliptic curve public key cryptography theory and algorithm (Master)

6. Sequence cipher and shift register

The basic principle of 1) sequence cipher (understanding)

2) shift register and shift register sequence (understanding)

3) Representation of Linear Shift Register (Understanding)

4) periodicity of linear shift register sequence (understanding)

5) Sequence space of linear shift register (understanding)

6)RC4 algorithm and its application in wireless communication (proficient)

7. Digital signature

1) Digital signature based on public key encryption (master)

2) Eight-element signature scheme (understanding)

3) Digital signature standard DSS (master)

8. Hash function

1) Attribute of hash function (master tape)

2) Hash function based on block cipher (understanding)

3)MD5 hash function algorithm (master)

4) secure hash algorithm (SHA- 1) (master)

9. Cryptographic protocol

1) key establishment protocol (master)

2) Secret division of labor and * * * sharing technology (understanding)

3) Identification technology (understanding)

4) Zero-knowledge proof technology (understanding)

5) Key management technologies (master)

10, Fundamentals of Network and Information Security

1) Fundamentals of Network and Information Security (Understanding)

2)TCP/IP protocol and its security risks (understanding)

3) The relationship between various network topologies and network interconnection devices and information security (master)

4) Wireless communication network and its network threat and defense technology (master)

1 1, network isolation and intrusion detection technology

1) security policy technology (understanding)

2) Firewall and its isolation technology (master)

3) Network address translation technology (master)

4) Network equipment isolation technology (master)

12, network security defense and attack

1) network scanning technology (master)

2) Common network attacks in e-mail, DNS system and WEB system and their defense methods (mastery)

3) Principles of various network threats (such as DDOS, botnet, virus, worm, spam, etc. ) and its protection methods (master)

4) Principles and defense methods of malicious software (such as spyware, adware, phishing software, backdoor, Trojan horse) (master)

5) Basic principles and defense methods of security coding and buffer overflow (master)

6) Honeypot Technology and Its Application (Master)

7) Intrusion Detection Technology (Master)

Protocol security technology and its application.

1) Basic concepts of security protocols (understanding)

2) Understand PGP, S/MIME and email security.

3)SSH protocol and its application (main)

4)SSL protocol and network security (Master)

5)IPSec protocol (understanding)

6)Kerberos and X.509 protocol (main)

13, system security technology

1) physical security of computer system (main)

2) System Reliability Technology (Master)

3) Access control technology (proficient)

4) multilevel security and security policy model (understanding)

5) Multilateral security technology (understanding)

6) Access control technology of 6)UNIX system and Windows (proficient)

7) Common security technologies of 7)UNIX system and Windows system (main)

Electronic warfare and information warfare.

1) information warfare (mastery)

2) Information confrontation (mastery)

15, e-commerce security

1) The development history of e-commerce (understanding)

2) Network deception (mastery)

3) secure electronic transaction (SET) (master)

16, management and operation safety

1) safety management method (understanding)

2) Safety Requirements Engineering (Understanding)

3) Risk management (understanding)

4) Computer forensics technology (understanding)

5) Rapid response, disaster backup and recovery technology (understanding)

6) Understand the safety assessment method (master)

7) Various information security laws and regulations (understanding)

Third, the question type and score ratio

Multiple choice questions (50 points)

Short answer questions (30 points)

Discussion and analysis questions (40 points)

Calculation and proof questions (30 points)