《计算机网络与因特网(第5版)(影印版)》:大学计算机国外著名教材系列
《计算机网络与因特网(第5版)(影印版)》由畅销书作者和网络领域的权威专家Douglas Comer教授编著,全面而系统地介绍了计算机网络知识。全书分5大部分共32章,涵盖的内容广泛,包括网桥、交换、路由与路由协议、多媒体协议与IP技术,以及Web浏览等。《计算机网络与因特网(第5版)(影印版)》第5版在前几版的基础上进行了重新组织和全面修订,新增了无线网络协议、网络性能等*新技术主题。《计算机网络与因特网(第5版)(影印版)》适合作为高等学校计算机、通信、电子等专业的教材或参考书。
插图:File Scanning. The most straightforward approach to analyze content operates onentire files. File scanning is a well-known technique used by the security software in-stalled on a typical PC. In essence, a file scanner takes a file as input and looks for pat-terns of bytes that indicate a problem. For example, many virus scanners look forstrings of bytes known as a fingerprint. That is, a company that sells a virus scannercollects copies of viruses, places each in a file, finds sequences of bytes that are uncom-mon, and creates a list of all sequences. When a user runs virus scanner software, thesoftware searches files on the user's disk to see if any file contains sequences of bytesthat match items on the list. File scanning works well to catch common problems. Ofcourse, file scanning can produce a false positive if an ordinary file happens to contain astring on the list, and can produce a false negative if a new virus exists that does notcontain any of the strings on the list.Deep Packet Inspection (DP1). The second form of content analysis operates onpackets instead of files. That is, instead of merely examining the headers in packetsthat pass into the site, a DPI mechanism also examines the data in the packet payload.Note that DPI does not exclude header examination —— in many cases, the contents of apayload cannot be interpreted without examining fields in the packet header.As an example of DPI, consider an attack where a slight misspelling of a domainname is used to trick a user into trusting a site. An organization that wants to preventsuch attacks can black-list a set of URLs that are known to be a security risk. Theproxy approach requires every user at the site to configure their browser to use a webproxy (i.e, an intermediate web system that checks a URL before fetching the requestedpage). As an alternative, a Deep Packet Inspection filter can be set up to inspect eachoutgoing packet and watch for an HTTP request to any of the black-listed sites.The chief disadvantage of DPI arises from computational overhead. Because apacket payload in an Ethernet frame can be over twenty times larger than a packetheader, DPI can require twenty times more processing than header inspection. Further-more, the payload is not divided into fixed fields, which means that DPI mechanismsmust parse contents during an inspection.
Aninternationallyacclaimedneuroscientistandauthorpresentsaboldnewtheoryabouthowo...
《JAVAWEB整合开发实例精通:Struts+Hibernate+Spring(1碟)》介绍如何整合Struts+Hibemate+Spring进行JavaW...
《一本书玩转信息图制作》内容简介:本书是一本全面揭秘信息图制作的大全,从两条线帮助读者精通信息图制作:一条是横向案例线,通
Inthisengrossingbook,twoworld-renownedscholarscompareandcontrastthecosmology,sci...
《GPU精粹:实时图形编程的技术技巧和技艺》汇集了当今国际上前沿开发者们经多年研究和实践得出的实用的实时图形技术成果。《GPU精
计算机网络系统集成 本书特色 1.实用性强。面向应用型人才的培养,具有大量当前实用的个案实例研究,让学生学而有用,学而能用2.知识体系具备科学性及新颖性,借鉴国...
软件“风格”所要讨论的主题是如何在开销与功能之间、优雅与可维护性之间、灵活。性与过分灵活之间寻找完美的平街点。在本书中,
《商务语言学》内容简介:本书是“当代商务英语学科建设系列”之一,主要探讨商务语言学的基本概念、商务语言学的产生背景和理据、
《我不是产品经理》内容简介:移动互联网商业模式下的用户增长,本质上就是更低成本地获取用户,更高效率地实现商业变现,并在获取
《室内分布系统规划与设计:GSM/TD-SCDMA/TD-LTE/WLAN》介绍了GSM/TD—SCDMA/WLAN/TD—LTE四网融合室内分布系统的基本原理...
《HAWQ数据仓库与数据挖掘实战》内容简介:ApacheHAWQ是一个SQL-on-Hadoop产品,它非常适合用于Hadoop平台上快速构建数据仓库系统。
《非正常军师联盟》内容简介:古人很潮系列书籍。继《唐朝有嘻哈》《宋朝好声音》《魏晋有美男》《奇葩王者说》《古人教你学吐槽》
《安德森18首长笛练习曲 OP.41》内容简介:安德森长笛练习曲系列教程是欧美地区针对长笛演奏使用很普遍的一套教材,在长笛技巧性的
Anew,revisededitionofayetunrivaledworkonfrequencydomainanalysisLongrecognizedfor...
《TRIZ:产品创新设计》内容简介:开发出有竞争力的产品,是制造业企业提高自身竞争优势的重要保障因素。在模糊前端和新产品开发、
国内首部复杂网络专著【图书目录】第1章引论1.1引言1.2复杂网络研究简史1.3基本概念1.4本书内容简介参考文献第2章网络拓扑基
《配色宝典》是一本集配色理论和配色实例为一体的便携式工具书。配色理论部分以日本视觉设计研究所研发的色立体为基础,将色彩分
《Android Studio移动应用开发高级进阶》内容简介:本书是Android Studio移动应用开发系列教材的高级篇。本书在《Android Studi...
《亚非诸国文学研究的学术历程》内容简介:本书是《中国外国文学研究的学术历程》总12卷之第12卷。本卷主要介绍亚非地区除日本、印
GPRS技术继承和发展了GSM体系结构,并为第三代移动通信技术的发展提供了基础。《通用分组无线业务(GPRS)技术与应用》结合GSM相关