Idioma: Chino
Publicado por Beijing University of Posts and Telecommunications, 2000
ISBN 10: 7563519599 ISBN 13: 9787563519590
Librería: liu xing, Nanjing, JS, China
EUR 47,27
Cantidad disponible: 10 disponibles
Añadir al carritopaperback. Condición: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 202 Publisher: Beijing University of Posts and Telecommunications Press Pub. Date: 2009 -08 this book is to adapt to computer network security. teaching and writing of an experimental teaching materials. Book is to highlight the systematic network security for the purpose to analyze and address specific security issues for the purpose of combining with the principles of network security. in accordance with the shallow depth. from the local to the whole idea of ??the network security course experiments carried out System classification. LAN and general book websites for common security attacks and network technology. emphasis on offensive and defensive opposition and balance. Book easy to understand. focus on practical. The author s many years of teaching practice. to find a combination of practicality and students interested in point. the design of experimental techniques and strong interest. Taking into account the different experimental conditions in different schools. the majority of experimental content is based on the Windows operating system is easy to set up the experimental environment. reducing the cost of the course of experimental set up. This book is based on the experimental design in order from easy to difficult. teachers can be flexible according to students with different layout. Each experiment consists of book experimental purposes. laboratory equipment. experimental procedures. experimental summary of several components. the experimental design is necessary to stress the independence of the various experiments also took note of the consistency between experiments. Note book and other computer programs. highlighting the computer knowledge of systematic. comprehensive. relevant to each experiment with a combination of computer knowledge. so the reader to establish the basic concepts of computer network security and basic infrastructure. This book not only as a vocational computer science. network management professionals. information security professional. teaching professional communication. computer networks can be used as more Contents: first network infrastructure and network sniffing and network infrastructure Chapter 1 Network Technology Experiment 1-1windows sniffing network traffic analysis (ethereal) experimental 1-2tcp three-way handshake protocol analysis of experimental 1-3udp protocol network sniffer based analysis of experimental techniques 1-4 second hacking vulnerability scanning technology Chapter 2 Use stealth and network experiments 2-1 supeFour Satisfaction guaranteed,or money back.