登入帳戶  | 訂單查詢  | 購物車/收銀台(0) | 在線留言板  | 付款方式  | 聯絡我們  | 運費計算  | 幫助中心 |  加入書簽
會員登入   新用戶註冊
HOME新書上架暢銷書架好書推介特價區會員書架精選月讀2023年度TOP分類閱讀雜誌 香港/國際用戶
最新/最熱/最齊全的簡體書網 品種:超過100萬種書,正品正价,放心網購,悭钱省心 送貨:速遞 / 物流,時效:出貨後2-4日

2024年11月出版新書

2024年10月出版新書

2024年09月出版新書

2024年08月出版新書

2024年07月出版新書

2024年06月出版新書

2024年05月出版新書

2024年04月出版新書

2024年03月出版新書

2024年02月出版新書

2024年01月出版新書

2023年12月出版新書

2023年11月出版新書

2023年10月出版新書

『簡體書』TCP/IP详解 卷1:协议(英文版第2版) (TCP/IP领域不朽名著,Stevens传世之作)

書城自編碼: 1910341
分類: 簡體書→大陸圖書→計算機/網絡網絡與數據通信
作 者: [美]Kevin
國際書號(ISBN): 9787111382287
出版社: 机械工业出版社
出版日期: 2012-05-01
版次: 1 印次: 1
頁數/字數: 1017/
書度/開本: 16开 釘裝: 平装

售價:NT$ 1226

我要買

share:

** 我創建的書架 **
未登入.



新書推薦:
现代无人机鉴赏(珍藏版)
《 现代无人机鉴赏(珍藏版) 》

售價:NT$ 356.0
汗青堂丛书·晚清风云(4册套装):帝国的切口 清朝与中华传统文化 太平天国运动史 冲击与回应
《 汗青堂丛书·晚清风云(4册套装):帝国的切口 清朝与中华传统文化 太平天国运动史 冲击与回应 》

售價:NT$ 1948.0
穿在身上的历史:世界服饰图鉴(增订珍藏版)
《 穿在身上的历史:世界服饰图鉴(增订珍藏版) 》

售價:NT$ 2540.0
历史的严妆:解读道学阴影下的南宋史学(中华学术·有道)
《 历史的严妆:解读道学阴影下的南宋史学(中华学术·有道) 》

售價:NT$ 500.0
海外中国研究·江南:中国文雅的源流
《 海外中国研究·江南:中国文雅的源流 》

售價:NT$ 347.0
迟缓的巨人:“大而不能倒”的反思与人性化转向
《 迟缓的巨人:“大而不能倒”的反思与人性化转向 》

售價:NT$ 352.0
我们去往何方:身体、身份和个人价值
《 我们去往何方:身体、身份和个人价值 》

售價:NT$ 305.0
大学问·批判的武器:罗莎·卢森堡与同时代思想者的论争
《 大学问·批判的武器:罗莎·卢森堡与同时代思想者的论争 》

售價:NT$ 449.0

建議一齊購買:

+

NT$ 1721
《 深入理解计算机系统(英文版·第3版) 》
+

NT$ 368
《 代码整洁之道 程序员的职业素养 》
+

NT$ 743
《 HTTPS权威指南 在服务器和Web应用上部署SSL TLS和PKI 》
+

NT$ 968
《 TCP/IP详解 卷1:协议(原书第2版) 》
+

NT$ 1110
《 代码大全(第2版)英文版 》
編輯推薦:
·W. Richard Stevens传奇般的TCPIP指南,现在被顶级网络专家Kevin R.
Fall更新,反映了新一代的基于TCPIP的网络技术。
·展示每种协议的实际工作原理,并解释其来龙去脉。
·新增加的内容包括RPC、访问控制、身份认证、隐私保护、NFS、SMBCIFS、DHCP、NAT、防火墙、电子邮件、Web、Web服务、无线、无线安全等。
內容簡介:
《TCPIP详解》是已故网络专家、著名技术作家W. Richard
Stevens的传世之作,内容详尽且极具权威,被誉为TCPIP领域的不朽名著。
本书是《TCPIP详解》的第1卷,主要讲述TCPIP协议,结合大量实例讲述TCPIP协议族的定义原因,以及在各种不同的操作系统中的应用及工作方式。第2版在保留Stevens卓越的知识体系和写作风格的基础上,新加入的作者Kevin
R.
Fall结合其作为TCPIP协议研究领域领导者的尖端经验来更新本书,反映了最新的协议和最佳的实践方法。首先,他介绍了TCPIP的核心目标和体系结构概念,展示了它们如何能连接不同的网络和支持多个服务同时运行。接着,他详细解释了IPv4和IPv6网络中的互联网地址。然后,他采用自底向上的方式来介绍TCPIP的结构和功能:从链路层协议(如Ethernet和Wi-Fi),经网络层、传输层到应用层。
书中依次全面介绍了ARP、DHCP、NAT、防火墙、ICMPv4ICMPv6、广播、多播、UDP、DNS等,并详细介绍了可靠传输和TCP,包括连接管理、超时、重传、交互式数据流和拥塞控制。此外,还介绍了安全和加密的基础知识,阐述了当前用于保护安全和隐私的重要协议,包括EAP、IPsec、TLS、DNSSEC和DKIM。
本书适合任何希望理解TCPIP协议如何实现的人阅读,更是TCPIP领域研究人员和开发人员的权威参考书。无论你是初学者还是功底深厚的网络领域高手,本书都是案头必备,将帮助你更深入和直观地理解整个协议族,构建更好的应用和运行更可靠、更高效的网络。
關於作者:
Kevin R.
Fall博士有超过25年的TCPIP工作经验,并且是互联网架构委员会成员。他是互联网研究任务组中延迟容忍网络研究组(DTNRG)的联席主席,该组致力于在极端和挑战性能的环境中探索网络。他是一位IEEE院士。
W. Richard
Stevens博士(1951—1999)是国际知名的Unix和网络专家,受人尊敬的技术作家和咨询顾问。他教会了一代网络专业人员使用TCPIP的技能,使互联网成为人们日常生活的中心。Stevens于1999年9月1日去世,年仅48岁。在短暂但精彩的人生中,他著有多部经典的传世之作,包括《TCPIP
详解》(三卷本)、《UNIX网络编程》(两卷本)以及《UNIX环境高级编程》。2000年他被国际权威机构Usenix追授“终身成就奖”。
目錄
Foreword v
Chapter 1 Introduction
1.1 Architectural Principles
1.1.1 Packets, Connections, and Datagrams
1.1.2 The End-to-End Argument and Fate Sharing
1.1.3 Error Control and Flow Control
1.2 Design and Implementation
1.2.1 Layering
1.2.2 Multiplexing, Demultiplexing, and Encapsulation in
Layered
Implementations
1.3 The Architecture and Protocols of the TCPIP Suite
1.3.1 The ARPANET Reference Model
1.3.2 Multiplexing, Demultiplexing, and Encapsulation in
TCPIP
1.3.3 Port Numbers
1.3.4 Names, Addresses, and the DNS
1.4 Internets, Intranets, and Extranets
1.5 Designing Applications
1.5.1 ClientServer
1.5.2 Peer-to-Peer
1.5.3 Application Programming Interfaces APIs
Preface to the Second Edition vii
Adapted Preface to the First Edition xiii
1.6 Standardization Process
1.6.1 Request for Comments RFC
1.6.2 Other Standards
1.7 Implementations and Software Distributions
1.8 Attacks Involving the Internet Architecture
1.9 Summary
1.10 References
Chapter 2 The Internet Address Architecture
2.1 Introduction
2.2 Expressing IP Addresses
2.3 Basic IP Address Structure
2.3.1 Classful Addressing
2.3.2 Subnet Addressing
2.3.3 Subnet Masks
2.3.4 Variable-Length Subnet Masks VLSM
2.3.5 Broadcast Addresses
2.3.6 IPv6 Addresses and Interface Identifiers
2.4 CIDR and Aggregation
2.4.1 Prefixes
2.4.2 Aggregation
2.5 Special-Use Addresses
2.5.1 Addressing IPv4IPv6 Translators
2.5.2 Multicast Addresses
2.5.3 IPv4 Multicast Addresses
2.5.4 IPv6 Multicast Addresses
2.5.5 Anycast Addresses
2.6 Allocation
2.6.1 Unicast
2.6.2 Multicast
2.7 Unicast Address Assignment
2.7.1 Single ProviderNo NetworkSingle Address
2.7.2 Single ProviderSingle NetworkSingle Address
2.7.3 Single ProviderMultiple NetworksMultiple Addresses
2.7.4 Multiple ProvidersMultiple NetworksMultiple Addresses
Multihoming
Contents xvii
2.8 Attacks Involving IP Addresses
2.9 Summary
2.10 References
Chapter 3 Link Layer
3.1 Introduction
3.2 Ethernet and the IEEE 802 LANMAN Standards
3.2.1 The IEEE 802 LANMAN Standards
3.2.2 The Ethernet Frame Format
3.2.3 802.1pq: Virtual LANs and QoS Tagging
3.2.4 802.1AX: Link Aggregation Formerly 802.3ad
3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow
Control
3.3.1 Duplex Mismatch
3.3.2 Wake-on LAN WoL, Power Saving, and Magic Packets
3.3.3 Link-Layer Flow Control
3.4 Bridges and Switches
3.4.1 Spanning Tree Protocol STP
3.4.2 802.1ak: Multiple Registration Protocol MRP
3.5 Wireless LANs—IEEE 802.11Wi-Fi
3.5.1 802.11 Frames
3.5.2 Power Save Mode and the Time Sync Function TSF
3.5.3 802.11 Media Access Control
3.5.4 Physical-Layer Details: Rates, Channels, and
Frequencies
3.5.5 Wi-Fi Security
3.5.6 Wi-Fi Mesh 802.11s
3.6 Point-to-Point Protocol PPP
3.6.1 Link Control Protocol LCP
3.6.2 Multi link PPP MP
3.6.3 Compression Control Protocol CCP
3.6.4 PPP Authentication
3.6.5 Network Control Protocols NCPs
3.6.6 Header Compression
3.6.7 Example
3.7 Loopback
3.8 MTU and Path MTU
3.9 Tunneling Basics
3.9.1 Unidirectional Links
x viii Contents
3.10 Attacks on the Link Layer
3.11 Summary
3.12 References
Chapter 4 ARP: Address Resolution Protocol
4.1 Introduction
4.2 An Example
4.2.1 Direct Delivery and ARP
4.3 ARP Cache
4.4 ARP Frame Format
4.5 ARP Examples
4.5.1 Normal Example
4.5.2 ARP Request to a Nonexistent Host
4.6 ARP Cache Timeout
4.7 Proxy ARP
4.8 Gratuitous ARP and Address Conflict Detection ACD
4.9 The arp Command
4.10 Using ARP to Set an Embedded Device’s IPv4 Address
4.11 Attacks Involving ARP
4.12 Summary
4.13 References
Chapter 5 The Internet Protocol IP
5.1 Introduction
5.2 IPv4 and IPv6 Headers
5.2.1 IP Header Fields
5.2.2 The Internet Checksum
5.2.3 DS Field and ECN Formerly Called the ToS Byte or IPv6
Traffic Class
5.2.4 IP Options
5.3 IPv6 Extension Headers
5.3.1 IPv6 Options
5.3.2 Routing Header
5.3.3 Fragment Header
5.4 IP Forwarding
5.4.1 Forwarding Table
5.4.2 IP Forwarding Actions
Contents xix
5.4.3 Examples
5.4.4 Discussion
5.5 Mobile IP
5.5.1 The Basic Model: Bidirectional Tunneling
5.5.2 Route Optimization RO
5.5.3 Discussion
5.6 Host Processing of IP Datagrams
5.6.1 Host Models
5.6.2 Address Selection
5.7 Attacks Involving IP
5.8 Summary
5.9 References
Chapter 6 System Configuration: DHCP and Autoconfiguration
6.1 Introduction
6.2 Dynamic Host Configuration Protocol DHCP
6.2.1 Address Pools and Leases
6.2.2 DHCP and BOOTP Message Format
6.2.3 DHCP and BOOTP Options
6.2.4 DHCP Protocol Operation
6.2.5 DHCPv6
6.2.6 Using DHCP with Relays
6.2.7 DHCP Authentication
6.2.8 Reconfigure Extension
6.2.9 Rapid Commit
6.2.10 Location Information LCI and LoST
6.2.11 Mobility and Handoff Information MoS and ANDSF
6.2.12 DHCP Snooping
6.3 Stateless Address Autoconfiguration SLAAC
6.3.1 Dynamic Configuration of IPv4 Link-Local Addresses
6.3.2 IPv6 SLAAC for Link-Local Addresses
6.4 DHCP and DNS Interaction
6.5 PPP over Ethernet PPPoE
6.6 Attacks Involving System Configuration
6.7 Summary
6.8 References
xx Contents
Chapter 7 Firewalls and Network Address Translation NAT
7.1 Introduction
7.2 Firewalls
7.2.1 Packet-Filtering Firewalls
7.2.2 Proxy Firewalls
7.3 Network Address Translation NAT
7.3.1 Traditional NAT: Basic NAT and NAPT
7.3.2 Address and Port Translation Behavior
7.3.3 Filtering Behavior
7.3.4 Servers behind NATs
7.3.5 Hairpinning and NAT Loopback
7.3.6 NAT Editors
7.3.7 Service Provider NAT SPNAT and Service Provider IPv
Transition
7.4 NAT Traversal
7.4.1 Pinholes and Hole Punching
7.4.2 UNilateral Self-Address Fixing UNSAF
7.4.3 Session Traversal Utilities for NAT STUN
7.4.4 Traversal Using Relays around NAT TURN
7.4.5 Interactive Connectivity Establishment ICE
7.5 Configuring Packet-Filtering Firewalls and NATs
7.5.1 Firewall Rules
7.5.2 NAT Rules
7.5.3 Direct Interaction with NATs and Firewalls: UPnP,
NAT-PMP,
and PCP
7.6 NAT for IPv4IPv6 Coexistence and Transition
7.6.1 Dual-Stack Lite DS-Lite
7.6.2 IPv4IPv6 Translation Using NATs and ALGs
7.7 Attacks Involving Firewalls and NATs
7.8 Summary
7.9 References
Chapter 8 ICMPv4 and ICMPv6: Internet Control Message
Protocol
8.1 Introduction
8.1.1 Encapsulation in IPv4 and IPv6
8.2 ICMP Messages
8.2.1 ICMPv4 Messages
Contents xxi
8.2.2 ICMPv6 Messages
8.2.3 Processing of ICMP Messages
8.3 ICMP Error Messages
8.3.1 Extended ICMP and Multipart Messages
8.3.2 Destination Unreachable ICMPv4 Type 3, ICMPv6 Type 1
and Packet Too Big ICMPv6 Type 2
8.3.3 Redirect ICMPv4 Type 5, ICMPv6 Type 137
8.3.4 ICMP Time Exceeded ICMPv4 Type 11, ICMPv6 Type 3
8.3.5 Parameter Problem ICMPv4 Type 12, ICMPv6 Type 4
8.4 ICMP QueryInformational Messages
8.4.1 Echo RequestReply ping ICMPv4 Types 08, ICMPv6
Types
129128
8.4.2 Router Discovery: Router Solicitation and Advertisement
ICMPv4 Types 9, 10
8.4.3 Home Agent Address Discovery RequestReply ICMPv6
Types
144145
8.4.4 Mobile Prefix SolicitationAdvertisement ICMPv6 Types
146147
8.4.5 Mobile IPv6 Fast Handover Messages ICMPv6 Type 154
8.4.6 Multicast Listener QueryReportDone ICMPv6 Types
130131132
8.4.7 Version 2 Multicast Listener Discovery MLDv2 ICMPv
Type 143
8.4.8 Multicast Router Discovery MRD IGMP Types 484950,
ICMPv6 Types 151152153
8.5 Neighbor Discovery in IPv6
8.5.1 ICMPv6 Router Solicitation and Advertisement ICMPv6
Types
133, 134
8.5.2 ICMPv6 Neighbor Solicitation and Advertisement IMCPv6
Types
135, 136
8.5.3 ICMPv6 Inverse Neighbor Discovery
SolicitationAdvertisement
ICMPv6 Types 141142
8.5.4 Neighbor Unreachability Detection NUD
8.5.5 Secure Neighbor Discovery SEND
8.5.6 ICMPv6 Neighbor Discovery ND Options
8.6 Translating ICMPv4 and ICMPv6
8.6.1 Translating ICMPv4 to ICMPv6
8.6.2 Translating ICMPv6 to ICMPv4
8.7 Attacks Involving ICMP
x xii Contents
8.8 Summary
8.9 References
Chapter 9 Broadcasting and Local Multicasting IGMP and MLD
9.1 Introduction
9.2 Broadcasting
9.2.1 Using Broadcast Addresses
9.2.2 Sending Broadcast Datagrams
9.3 Multicasting
9.3.1 Converting IP Multicast Addresses to 802 MACEthernet
Addresses
9.3.2 Examples
9.3.3 Sending Multicast Datagrams
9.3.4 Receiving Multicast Datagrams
9.3.5 Host Address Filtering
9.4 The Internet Group Management Protocol IGMP and Multicast
Listener
Discovery Protocol MLD
9.4.1 IGMP and MLD Processing by Group Members “Group
Member Part”
9.4.2 IGMP and MLD Processing by Multicast Routers
“Multicast
Router Part”
9.4.3 Examples
9.4.4 Lightweight IGMPv3 and MLDv2
9.4.5 IGMP and MLD Robustness
9.4.6 IGMP and MLD Counters and Variables
9.4.7 IGMP and MLD Snooping
9.5 Attacks Involving IGMP and MLD
9.6 Summary
9.7 References
Chapter 10 User Datagram Protocol UDP and IP Fragmentation
10.1 Introduction
10.2 UDP Header
10.3 UDP Checksum
10.4 Examples
10.5 UDP and IPv6
10.5.1 Teredo: Tunneling IPv6 through IPv4 Networks
Contents xxiii
10.6 UDP-Lite
10.7 IP Fragmentation
10.7.1 Example: UDPIPv4 Fragmentation
10.7.2 Reassembly Timeout
10.8 Path MTU Discovery with UDP
10.8.1 Example
10.9 Interaction between IP Fragmentation and ARPND
10.10 Maximum UDP Datagram Size
10.10.1 Implementation Limitations
10.10.2 Datagram Truncation
10.11 UDP Server Design
10.11.1 IP Addresses and UDP Port Numbers
10.11.2 Restricting Local IP Addresses
10.11.3 Using Multiple Addresses
10.11.4 Restricting Foreign IP Address
10.11.5 Using Multiple Servers per Port
10.11.6 Spanning Address Families: IPv4 and IPv6
10.11.7 Lack of Flow and Congestion Control
10.12 Translating UDPIPv4 and UDPIPv6 Datagrams
10.13 UDP in the Internet
10.14 Attacks Involving UDP and IP Fragmentation
10.15 Summary
10.16 References
Chapter 11 Name Resolution and the Domain Name System DNS
11.1 Introduction
11.2 The DNS Name Space
11.2.1 DNS Naming Syntax
11.3 Name Servers and Zones
11.4 Caching
11.5 The DNS Protocol
11.5.1 DNS Message Format
11.5.2 The DNS Extension Format EDNS0
11.5.3 UDP or TCP
11.5.4 Question Query and Zone Section Format
11.5.5 Answer, Authority, and Additional Information Section
Formats
11.5.6 Resource Record Types
x xiv Contents
11.5.7 Dynamic Updates DNS UPDATE
11.5.8 Zone Transfers and DNS NOTIFY
11.6 Sort Lists, Round-Robin, and Split DNS
11.7 Open DNS Servers and DynDNS
11.8 Transparency and Extensibility
11.9 Translating DNS from IPv4 to IPv6 DNS64
11.10 LLMNR and mDNS
11.11 LDAP
11.12 Attacks on the DNS
11.13 Summary
11.14 References
Chapter 12 TCP: The Transmission Control Protocol
Preliminaries
12.1 Introduction
12.1.1 ARQ and Retransmission
12.1.2 Windows of Packets and Sliding Windows
12.1.3 Variable Windows: Flow Control and Congestion Control
12.1.4 Setting the Retransmission Timeout
12.2 Introduction to TCP
12.2.1 The TCP Service Model
12.2.2 Reliability in TCP
12.3 TCP Header and Encapsulation
12.4 Summary
12.5 References
Chapter 13 TCP Connection Management
13.1 Introduction
13.2 TCP Connection Establishment and Termination
13.2.1 TCP Half-Close
13.2.2 Simultaneous Open and Close
13.2.3 Initial Sequence Number ISN
13.2.4 Example
13.2.5 Timeout of Connection Establishment
13.2.6 Connections and Translators
13.3 TCP Options
13.3.1 Maximum Segment Size MSS Option
Contents xxv
13.3.2 Selective Acknowledgment SACK Options
13.3.3 Window Scale WSCALE or WSOPT Option
13.3.4 Timestamps Option and Protection against Wrapped
Sequence Numbers PAWS
13.3.5 User Timeout UTO Option
13.3.6 Authentication Option TCP-AO
13.4 Path MTU Discovery with TCP
13.4.1 Example
13.5 TCP State Transitions
13.5.1 TCP State Transition Diagram
13.5.2 TIME_WAIT 2MSL Wait State
13.5.3 Quiet Time Concept
13.5.4 FIN_WAIT_2 State
13.5.5 Simultaneous Open and Close Transitions
13.6 Reset Segments
13.6.1 Connection Request to Nonexistent Port
13.6.2 Aborting a Connection
13.6.3 Half-Open Connections
13.6.4 TIME-WAIT Assassination TWA
13.7 TCP Server Operation
13.7.1 TCP Port Numbers
13.7.2 Restricting Local IP Addresses
13.7.3 Restricting Foreign Endpoints
13.7.4 Incoming Connection Queue
13.8 Attacks Involving TCP Connection Management
13.9 Summary
13.10 References
Chapter 14 TCP Timeout and Retransmission
14.1 Introduction
14.2 Simple Timeout and Retransmission Example
14.3 Setting the Retransmission Timeout RTO
14.3.1 The Classic Method
14.3.2 The Standard Method
14.3.3 The Linux Method
14.3.4 RTT Estimator Behaviors
14.3.5 RTTM Robustness to Loss and Reordering
x xvi Contents
14.4 Timer-Based Retransmission
14.4.1 Example
14.5 Fast Retransmit
14.5.1 Example
14.6 Retransmission with Selective Acknowledgments
14.6.1 SACK Receiver Behavior
14.6.2 SACK Sender Behavior
14.6.3 Example
14.7 Spurious Timeouts and Retransmissions
14.7.1 Duplicate SACK DSACK Extension
14.7.2 The Eifel Detection Algorithm
14.7.3 Forward-RTO Recovery F-RTO
14.7.4 The Eifel Response Algorithm
14.8 Packet Reordering and Duplication
14.8.1 Reordering
14.8.2 Duplication
14.9 Destination Metrics
14.10 Repacketization
14.11 Attacks Involving TCP Retransmission
14.12 Summary
14.13 References
Chapter 15 TCP Data Flow and Window Management
15.1 Introduction
15.2 Interactive Communication
15.3 Delayed Acknowledgments
15.4 Nagle Algorithm
15.4.1 Delayed ACK and Nagle Algorithm Interaction
15.4.2 Disabling the Nagle Algorithm
15.5 Flow Control and Window Management
15.5.1 Sliding Windows
15.5.2 Zero Windows and the TCP Persist Timer
15.5.3 Silly Window Syndrome SWS
15.5.4 Large Buffers and Auto-Tuning
15.6 Urgent Mechanism
15.6.1 Example
15.7 Attacks Involving Window Management
Contents xxvii
15.8 Summary
15.9 References
Chapter 16 TCP Congestion Control
16.1 Introduction
16.1.1 Detection of Congestion in TCP
16.1.2 Slowing Down a TCP Sender
16.2 The Classic Algorithms
16.2.1 Slow Start
16.2.2 Congestion Avoidance
16.2.3 Selecting between Slow Start and Congestion Avoidance
16.2.4 Tahoe, Reno, and Fast Recovery
16.2.5 Standard TCP
16.3 Evolution of the Standard Algorithms
16.3.1 NewReno
16.3.2 TCP Congestion Control with SACK
16.3.3 Forward Acknowledgment FACK and Rate Halving
16.3.4 Limited Transmit
16.3.5 Congestion Window Validation CWV
16.4 Handling Spurious RTOs—the Eifel Response Algorithm
16.5 An Extended Example
16.5.1 Slow Start Behavior
16.5.2 Sender Pause and Local Congestion Event 1
16.5.3 Stretch ACKs and Recovery from Local Congestion
16.5.4 Fast Retransmission and SACK Recovery Event 2
16.5.5 Additional Local Congestion and Fast Retransmit Events
16.5.6 Timeouts, Retransmissions, and Undoing cwnd Changes
16.5.7 Connection Completion
16.6 Sharing Congestion State
16.7 TCP Friendliness
16.8 TCP in High-Speed Environments
16.8.1 HighSpeed TCP HSTCP and Limited Slow Start
16.8.2 Binary Increase Congestion Control BIC and CUBIC
16.9 Delay-Based Congestion Control
16.9.1 Vegas
16.9.2 FAST
x xviii Contents
16.9.3 TCP Westwood and Westwood+
16.9.4 Compound TCP
16.10 Buffer Bloat
16.11 Active Queue Management and ECN
16.12 Attacks Involving TCP Congestion Control
16.13 Summary
16.14 References
Chapter 17 TCP Keepalive
17.1 Introduction
17.2 Description
17.2.1 Keepalive Examples
17.3 Attacks Involving TCP Keepalives
17.4 Summary
17.5 References
Chapter 18 Security: EAP, IPsec, TLS, DNSSEC, and DKIM
18.1 Introduction
18.2 Basic Principles of Information Security
18.3 Threats to Network Communication
18.4 Basic Cryptography and Security Mechanisms
18.4.1 Cryptosystems
18.4.2 Rivest, Shamir, and Adleman RSA Public Key
Cryptography
18.4.3 Diffie-Hellman-Merkle Key Agreement aka Diffie-Hellman or
DH
18.4.4 Signcryption and Elliptic Curve Cryptography ECC
18.4.5 Key Derivation and Perfect Forward Secrecy PFS
18.4.6 Pseudorandom Numbers, Generators, and Function
Families
18.4.7 Nonces and Salt
18.4.8 Cryptographic Hash Functions and Message Digests
18.4.9 Message Authentication Codes MACs, HMAC, CMAC, and
GMAC
18.4.10 Cryptographic Suites and Cipher Suites
18.5 Certificates, Certificate Authorities CAs, and PKIs
18.5.1 Public Key Certificates, Certificate Authorities, and
X.509
18.5.2 Validating and Revoking Certificates
18.5.3 Attribute Certificates
Contents xxix
18.6 TCPIP Security Protocols and Layering
18.7 Network Access Control: 802.1X, 802.1AE, EAP, and PANA
18.7.1 EAP Methods and Key Derivation
18.7.2 The EAP Re-authentication Protocol ERP
18.7.3 Protocol for Carrying Authentication for Network Access
PANA
18.8 Layer 3 IP Security IPsec
18.8.1 Internet Key Exchange IKEv2 Protocol
18.8.2 Authentication Header AH
18.8.3 Encapsulating Security Payload ESP
18.8.4 Multicast
18.8.5 L2TPIPsec
18.8.6 IPsec NAT Traversal
18.8.7 Example
18.9 Transport Layer Security TLS and DTLS
18.9.1 TLS 1.2
18.9.2 TLS with Datagrams DTLS
18.10 DNS Security DNSSEC
18.10.1 DNSSEC Resource Records
18.10.2 DNSSEC Operation
18.10.3 Transaction Authentication TSIG, TKEY, and SIG0
18.10.4 DNSSEC with DNS64
18.11 DomainKeys Identified Mail DKIM
18.11.1 DKIM Signatures
18.11.2 Example
18.12 Attacks on Security Protocols
18.13 Summary
18.14 References
Glossary of Acronyms
Index

 

 

書城介紹  | 合作申請 | 索要書目  | 新手入門 | 聯絡方式  | 幫助中心 | 找書說明  | 送貨方式 | 付款方式 台灣用户 | 香港/海外用户
megBook.com.tw
Copyright (C) 2013 - 2024 (香港)大書城有限公司 All Rights Reserved.