华信教育资源网
电子商务安全(第2版)
作   译   者:刘英卓 出 版 日 期:2016-06-01
出   版   社:电子工业出版社 维   护   人:谭湘楠 
书   代   号:G0291430 I S B N:9787121291432

图书简介:

本书是《电子商务安全与网上支付》一书的改进版,不再讲解网上支付的相关知识,而将核心完全转移到电子商务安全上来。通过本书的学习,能够使学生全面了解计算机信息安全技术的基础理论,初步掌握计算机信息安全防范的基本方法,加强对计算机安全重要性的理解,掌握实现和管理 Windows Server 网络环境的知识和技能,具备进行故障排除的能力。为学生今后进行进一步学习、研究信息安全技术打下坚实的基础。
定价 43.0
您的专属联系人更多
关注 评论(0) 分享
配套资源 图书内容 样章/电子教材 图书评价
  • 配 套 资 源

    本书资源

    会员上传本书资源

  • 图 书 内 容

    内容简介

    本书是《电子商务安全与网上支付》一书的改进版,不再讲解网上支付的相关知识,而将核心完全转移到电子商务安全上来。通过本书的学习,能够使学生全面了解计算机信息安全技术的基础理论,初步掌握计算机信息安全防范的基本方法,加强对计算机安全重要性的理解,掌握实现和管理 Windows Server 网络环境的知识和技能,具备进行故障排除的能力。为学生今后进行进一步学习、研究信息安全技术打下坚实的基础。

    图书详情

    ISBN:9787121291432
    开 本:16开
    页 数:344
    字 数:523.0

    本书目录

    目 录
    第1 章 电子商务安全概论 ················································································································ 1
    1.1 客户机的安全 ······················································································································ 2
    1.2 服务器的安全 ······················································································································ 5
    1.3 电子商务安全问题 ············································································································· 10
    1.4 系统安全评测标准 ············································································································· 12
    第2 章 加密与解密 ·························································································································· 19
    2.1 加密与解密基本知识 ········································································································· 20
    2.2 对称加密学 ························································································································ 23
    2.3 非对称加密学 ···················································································································· 43
    2.4 通信加密技术 ···················································································································· 48
    第3 章 安全网络协议 ······················································································································ 53
    3.1 TCP/IP 基本知识 ················································································································ 54
    3.2 IPSec··································································································································· 70
    3.3 PGP ···································································································································· 80
    3.4 SSL ····································································································································· 86
    3.5 SET ····································································································································· 92
    3.6 无线网安全 ······················································································································ 101
    第4 章 防火墙、VPN ··················································································································· 113
    4.1 防火墙 ······························································································································ 113
    4.2 VPN ·································································································································· 138
    第5 章 认证与管理 ························································································································ 163
    5.1 报文鉴别与身份认证 ······································································································· 163
    5.2 证书与CA ························································································································ 184
    5.3 PKI ··································································································································· 194
    5.4 域和活动目录 ·················································································································· 207
    第6 章 安全电子商务应用 ············································································································ 236
    6.1 电子商务安全体系结构 ··································································································· 236
    6.2 电子商务安全解决方案 ··································································································· 241
    第7 章 安全电子商务编码 ············································································································ 258
    7.1 Java 安全 ·························································································································· 258
    7.2 JSP 安全 ··························································································································· 281
    7.3 电子商务JSP 安全编码实例 ··························································································· 288
    第8 章 安全的网上支付 ················································································································ 315
    8.1 现代化安全支付系统概述 ······························································································· 316
    8.2 安全网上支付系统的实现 ······························································································· 319
    附录A 安全术语 ···························································································································· 331
    附录B Windows 安全性的核心组件和数据库 ············································································· 333
    附录C 信息论 ································································································································ 335
    参考文献 ··········································································································································· 336
    展开

    前     言

    前    言
    
    未来的商务必将成为完全的电子商务,未来的经济也必将是网络化的经济,这是科技的发展和应用客观之必然。电子商务进一步强调了同一个地球村的概念,给整个世界带来了交易上的大一统。但任何事物的发展都是光明与黑暗并存的,数分实虚、词分实虚、意分显隐、矛与盾一直在相辅相成中伴随着事物发展。电子商务的攻击与防御一直是安全的主题,安全问题解决好了,将会更大程度地释放电子商务的经济效能。
    本书是《电子商务安全与网上支付》一书的改进版,不再讲解网上支付的相关知识,而将核心完全转移到电子商务安全上来。一是为配合开设课程,二可将内容变得更纯净。本书的调整之处主要有:每章的引导案例做了改写,目的使案例更具时代性、更符合章节内容;增加了AES算法的讲解,目的为适应国际安全形势;更新了书中比较陈旧的内容,如当前主流操作系统为Windows Server 2008,所以相关内容均作了调整;增加了安全电子商务编码一章,目的一是让学生贯通理论到实现的逻辑思维转换,二是顺承所开设Java课程、Java安全知识的运用;书后增加了附录,附录有助于教师和学生理解书中相关知识。
    本书面向高等院校中的电子商务本科学生;也可供MBA学生、经济管理类专业硕士生及本科高年级学生选用;还可为相关人员、相应层次的电子商务安全人员培训时选用。
    本书编写的目的是充当教材,教材必须具有教师教之而传授给学生的“材”,还必须有适合于学生学习的“材”。因此,一本好的教材要安排好内容的质和量。质上要让学习者能够学习到东西、讲授者能够便宜的讲授,这就需要调整好知识点、知识面和知识体。量上要考虑一学期、一节课的知识量在章节中的合理安排。我们常常发现,有很多被称为教材的书,里面充斥了大量东拼西凑、四处网罗来的天南地北阅读资料,篇幅极为厚重,但教师看了不知其所教,学生看了不知其所学。编者往往还在前言中宣称什么什么规划、什么什么资助、什么什么名人力挺,还在落款处写上于国内某某地、于国外某某地。这些其实与教材本身没有任何关系,纯粹是一种浮浅的表现。本教材特点是:一定的基础知识的导引,一定的故事趣味性,一定的知识深度,一定的应用实例;语言简洁明了,知识点突出,层次分明;注意课程间的衔接和深入。
    通过本书的学习,使学生能够全面了解计算机信息安全技术的基础理论,初步掌握计算机信息安全防范的基本方法,加强对计算机安全重要性的理解,掌握实现和管理 Windows Server 网络环境的知识和技能,具备进行故障排除的能力。为学生今后进行进一步学习、研究信息安全技术打下坚实的基础。
    本书由刘英卓、曹杰和张艳萍编写,刘英卓负责编写书中正文内容,张艳萍编写了引导案例和实验内容以及习题内容。本书尽量保留了作者认为重要的、有实用价值的或者有趣的内容,注意了和同类教材内容上的区分。在教材编写过程中,参考了国内外有关的最新著作和资料,南京财经大学电子商务实验室的相关老师也提出了宝贵的建议,在此表示衷心的感谢!由于作者的水平和教学经验有限,书中难免有不足之处,希望广大读者批评指正。
    教学建议如下表。
    	知识点	课时安排	重点讲述内容	选讲内容
    第1章	电子商务安全的基本知识点,客户机的安全,服务器的安全,安全的目标,安全的威胁等	4课时	客户机的安全设置;服务器的安全原理和设置	安全评估 标准
    第2章	加密和解密基本知识,DES算法原理,AES算法,RSA算法	6课时	DES算法、RSA算法	AES算法
    第3章	TCP/IP基本知识,IPSec协议、SSL协议和SET协议	8课时	TCP/IP基本知识,IPSec原理,SSL协议,SET协议	IPv6,VLAN
    第4章	防火墙和VPN基本知识	8课时	防火墙基本原理、VPN 原理	GRE VPN和MPLS VPN
    第5章	鉴别和认证基本知识	6课时	鉴别和认证基本原理,PKI和CA	域与活动  目录
    第6章	安全策略和安全实践	3课时	安全策略和安全实践注意事项	电子商务安全案例
    第7章	安全电子商务编码	10课时	Java安全,JSP安全,购物车的实现	数字签名
    第8章	安全的网上支付	3课时	在线支付功能的安全  实现	中国金融  认证
    本建议表是按照一学期18周、每周3课时、2次复习课来设计的,仅供教师使用时做参考。每一本书都在面临着内容的老化,即使是最新的书也是难免的。所以,我们的广大教学者和学习者在使用本书时,应该及时更新本书中已经过时的数据,对本书中的不当之处提出指正。
    展开

    作者简介

    本书暂无作者简介
  • 样 章 试 读
    本书暂无样章试读!
  • 图 书 评 价 我要评论
华信教育资源网