《计算机网络与因特网(第5版)(影印版)》:大学计算机国外著名教材系列
《计算机网络与因特网(第5版)(影印版)》由畅销书作者和网络领域的权威专家Douglas Comer教授编著,全面而系统地介绍了计算机网络知识。全书分5大部分共32章,涵盖的内容广泛,包括网桥、交换、路由与路由协议、多媒体协议与IP技术,以及Web浏览等。《计算机网络与因特网(第5版)(影印版)》第5版在前几版的基础上进行了重新组织和全面修订,新增了无线网络协议、网络性能等*新技术主题。《计算机网络与因特网(第5版)(影印版)》适合作为高等学校计算机、通信、电子等专业的教材或参考书。
插图:File Scanning. The most straightforward approach to analyze content operates onentire files. File scanning is a well-known technique used by the security software in-stalled on a typical PC. In essence, a file scanner takes a file as input and looks for pat-terns of bytes that indicate a problem. For example, many virus scanners look forstrings of bytes known as a fingerprint. That is, a company that sells a virus scannercollects copies of viruses, places each in a file, finds sequences of bytes that are uncom-mon, and creates a list of all sequences. When a user runs virus scanner software, thesoftware searches files on the user's disk to see if any file contains sequences of bytesthat match items on the list. File scanning works well to catch common problems. Ofcourse, file scanning can produce a false positive if an ordinary file happens to contain astring on the list, and can produce a false negative if a new virus exists that does notcontain any of the strings on the list.Deep Packet Inspection (DP1). The second form of content analysis operates onpackets instead of files. That is, instead of merely examining the headers in packetsthat pass into the site, a DPI mechanism also examines the data in the packet payload.Note that DPI does not exclude header examination —— in many cases, the contents of apayload cannot be interpreted without examining fields in the packet header.As an example of DPI, consider an attack where a slight misspelling of a domainname is used to trick a user into trusting a site. An organization that wants to preventsuch attacks can black-list a set of URLs that are known to be a security risk. Theproxy approach requires every user at the site to configure their browser to use a webproxy (i.e, an intermediate web system that checks a URL before fetching the requestedpage). As an alternative, a Deep Packet Inspection filter can be set up to inspect eachoutgoing packet and watch for an HTTP request to any of the black-listed sites.The chief disadvantage of DPI arises from computational overhead. Because apacket payload in an Ethernet frame can be over twenty times larger than a packetheader, DPI can require twenty times more processing than header inspection. Further-more, the payload is not divided into fixed fields, which means that DPI mechanismsmust parse contents during an inspection.
《51单片机零基础轻松入门视频教程》内容简介:本书以STC89C52(AT89S52)为例,介绍了51单片机的结构和特点、入门和提高所需的C语
《所罗门王的宝藏》内容简介:犹太民族的所罗门国王既是智慧的代表,又是财富的象征。他死后多少个世纪以来,人们一直在寻找这批古
《倾听生命的低语》内容简介:本书是散文作家鲁先圣积数年之力完成的一部随笔断章作品集,全书语句凝练,思想深邃,情感真挚,禅意
改变未来的九大算法 本书特色 google得出的搜索结果是如何产生的? 百度为何会陷入“搜索门”,又是什么机制使然?身处在大数据时代...
《四季读诗》内容简介:呈现在您面前的这本《四季读诗》,是一册编排新颖、图文并茂的古诗词读本。从先秦时代的《诗经》,一直到近
AhoandUllmanhavecreatedaCversionoftheirgroundbreakingtext.Asinthattext,thisbookc...
《路演中国》内容简介:本书用通俗易懂的语言阐述了路演含义、形成、演变、重要作用、落地策略、实用案例,以及各种不同路演的运作
《人体经络按摩祛病养生一本就够》内容简介:穴位按摩通过刺激人体特定穴位,通畅经络之气,达到舒经活络、调整人体功能、祛邪扬正
《绘画之美》内容简介:《绘画之美》是北京大学哲学系教授、中华美学学会副会长朱良志对中国传统文人画的解析与品读。作者选取了元
Java Web从入门到精通(配光盘)(软件开发视频大讲堂) 本书特色 “软件开发视频大讲堂”丛书系清华社“视频大讲堂”重点大系之一。该大系包括多个子系列,每个...
本书通过实例的方式介绍了Macromedia公司的DreamweaverMX2004的使用方法和技巧。全书由14章组成,第1章和第2章介绍了软件的应用领
《Linux应用大全:服务器架设》内容简介:Linux是一个免费的多用户、多任务的操作系统,其稳定性、安全性与网络功能特别显著。目前
《家庭电工一本通(第2版)》内容简介:本书内容包括家庭安全用电早知道,家庭用电必备工具,家庭电工看图,家庭照明安装,家用电器
正在发生的未来——手机人的族群与趋势基于独家真实数据盘点2011年中国手机业发展状况,基于独到研究方法解析手机人族群,基于独
GetuptospeedontheprincipaltechnologiesintheJavaPlatform,EnterpriseEdition7,andle...
“Inthisupdatedandexpandededitionofherexcellenttelecommunicationsprim...
《我是微商4》内容简介:本书是微商界超级畅销书“我是微商”系列的第4本,是三位作者服务了2000多家国内微商品牌之后,总结得出的
《Web开发系列丛书·Web开发解决方案:应用Ajax、Apl、库和托管服务》金额ishaoruhe建立以个高校的WEB开发环境,在打下坚实基础之
《流浪生死书》内容简介:人生实苦,要么是身体的病,要么是精神上的痛。人,无法躲避,只有超越。有的人选择文学、有的人选择艺术
《健康延长线》内容简介:本书紧扣“长寿之道在于科学健身,健身之道在于知行同步”的主题,围绕健身的四大要素———睡眠、饮食、