信息安全系列:计算机体系结构与安全(英文版)

价格 69.00对比
发货 广东东莞市
销量 暂无
评价 已有 0 条评价
人气 已有 4 人关注
数量
+-
库存100
 
联系方式
加关注0

新图书资料发布

VIP   VIP会员第1年
资料未认证
保证金未缴纳

内容简介

本书从安全的角度对计算机和网络硬件、系统软件、信息和数据的概念进行全面的阐述,并为读者提供实现安全的计算机和信息系统的解决方案和工具。

目录

1 Introduction to Computer Architecture and Security
1.1 History of Computer Systems
1.1.1 Timeline of Computer History
1.1.2 Timeline of Internet History
1.1.3 Timeline of Computer Security History
1.2 John von Neumann Computer Architecture
1.3 Memory and Storage
1.4 Input1Output and Network Interface
1.5 Single CPU and Multiple CPU Systems
1.6 Overview of Computer Security
1.6.1 Confidentiality
1.6.2 Integrity
1.6.3 Availability
1.6.4 Threats
1.6.5 Firewalls
1.6.6 Hacking and Attacks
1.7 Security Problems in Neumann Architecture
1.8 Summary
Exercises
References
2 Digital Logic Design
2.1 Concept of Logic Unit
2.2 Logic Functions and Truth Tables
2.3 Boolean Algebra
2.4 Logic Circuit Design Process
2.5 Gates and Flip-Flops
2.6 Hardware Security
2.7 FPGA and VLSI
2.7.1 Design of an FPGA Biometric Security System
2.7.2 A RIFD Student Attendance System
2.8 Summary
Exercises
References
3 Computer Memory and Storage
3.1 A One Bit Memory Circuit
3.2 Register, MAR, MDR and Main Memory
3.3 Cache Memory
3.4 Virtual Memory
3.4.1 Paged Virtual Memory
3.4.2 Segmented Virtual Memory
3.5 Non-Volatile Memory
3.6 External Memory
3.6.1 Hard Disk Drives
3.6.2 Tertiary Storage and Off-Line Storage
3.6.3 Serial Advanced Technology Attachment (SATA)
3.6.4 Small Computer System Interface (SCSI)
3.6.5 Serial Attached SCSI (SAS)
3.6.6 Network-Attached Storage (NAS)
3.6.7 Storage Area Network (SAN)
3.6.8 Cloud Storage
3.7 Memory Access Security
3.8 Summary
Exercises
References
4 Bus and Interconnection
4.1 System Bus
4.1.1 Address Bus
4.1.2 Data Bus
4.1.3 Control Bus
4.2 Parallel Bus and Serial Bus
4.2.1 Parallel Buses and Parallel Communication
4.2.2 Serial Bus and Serial Communication
4.3 Synchronous Bus and Asynchronous Bus
……
5 I/O and network interface
6 Central processing unit
7 advanced computer architecture
8 assembly language and operating systems
9 TCP/IP and internet
10 design and implementation: modifying Neumann architecture
Appendix a digital logic simulators
Appendix b computer security tools
Appendix c patent application: intrusion-free computer architecture
for information and data security
Index

摘要与插图

TCP is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet applications such as the World Wide Web, e-mail, remote administration and file transfer rely on.
  Other applications, which do not require reliable data stream service, may use the User Datagram Protocol (UDP), which provides a datagram service that emphasizes reduced latency over reliability.
  There are several types of applications designed to complement TCP. These applications are the Simple Mail Transfer Protocol (SMTP), the File Transfer Protocol (FI'P), and the Secure Shell (SSH). The SMTP operates in a similar way as the gathering, organizing, packaging and delivering of mail in the traditional sense. Traditionally speaking, when someone places their physical letter (message) in a mail box, or at the post office, a mail room employee takes possession of that mail, completes the necessary action consistent with mailroom protocol procedures, places it in the queue for dispatching it to the intended destination. The Simple Mail Transfer Protocol operates in that same vein in an electronic sense by accepting a message and using TCP to send it to an SMTP module on another host, and then the SMTP makes use of a local electronic mail package to store the incoming message in a user's mailbox.
  The File Transfer Protocol relies on the use of TCP when uploading and transfer-
  ring text and binary files that are to and from multiple host systems on the Internet, and the Secure Shell is actually what its name implies, a secure method of logging on to a system, that is, a terminal or other computerized device, with the ability to encrypt data ensuring that no one is able to contaminate, taint or corrupt that data.
  There are other protocol suites that serve the same purposes as TCP/IP, such as the
  Open Systems Interconnection (OSI) reference model. However, TCP has led the way in effortless communications and the exchange of data across the Internet spectrum. OSI was developed by the International Organization for Standardization(ISO) as a model for a computer protocol architecture and as a framework for developing protocol standards.
  ……
举报收藏 0
网站首页  |  关于我们  |  联系方式  |  用户协议  |  隐私政策  |  版权声明  |  网站地图  |  排名推广  |  广告服务  |  积分换礼  |  网站留言  |  RSS订阅  |  违规举报  |  粤ICP备2021111040号