《计算机网络与因特网(第5版)(影印版)》:大学计算机国外著名教材系列
《计算机网络与因特网(第5版)(影印版)》由畅销书作者和网络领域的权威专家Douglas Comer教授编著,全面而系统地介绍了计算机网络知识。全书分5大部分共32章,涵盖的内容广泛,包括网桥、交换、路由与路由协议、多媒体协议与IP技术,以及Web浏览等。《计算机网络与因特网(第5版)(影印版)》第5版在前几版的基础上进行了重新组织和全面修订,新增了无线网络协议、网络性能等*新技术主题。《计算机网络与因特网(第5版)(影印版)》适合作为高等学校计算机、通信、电子等专业的教材或参考书。
插图:File Scanning. The most straightforward approach to analyze content operates onentire files. File scanning is a well-known technique used by the security software in-stalled on a typical PC. In essence, a file scanner takes a file as input and looks for pat-terns of bytes that indicate a problem. For example, many virus scanners look forstrings of bytes known as a fingerprint. That is, a company that sells a virus scannercollects copies of viruses, places each in a file, finds sequences of bytes that are uncom-mon, and creates a list of all sequences. When a user runs virus scanner software, thesoftware searches files on the user's disk to see if any file contains sequences of bytesthat match items on the list. File scanning works well to catch common problems. Ofcourse, file scanning can produce a false positive if an ordinary file happens to contain astring on the list, and can produce a false negative if a new virus exists that does notcontain any of the strings on the list.Deep Packet Inspection (DP1). The second form of content analysis operates onpackets instead of files. That is, instead of merely examining the headers in packetsthat pass into the site, a DPI mechanism also examines the data in the packet payload.Note that DPI does not exclude header examination —— in many cases, the contents of apayload cannot be interpreted without examining fields in the packet header.As an example of DPI, consider an attack where a slight misspelling of a domainname is used to trick a user into trusting a site. An organization that wants to preventsuch attacks can black-list a set of URLs that are known to be a security risk. Theproxy approach requires every user at the site to configure their browser to use a webproxy (i.e, an intermediate web system that checks a URL before fetching the requestedpage). As an alternative, a Deep Packet Inspection filter can be set up to inspect eachoutgoing packet and watch for an HTTP request to any of the black-listed sites.The chief disadvantage of DPI arises from computational overhead. Because apacket payload in an Ethernet frame can be over twenty times larger than a packetheader, DPI can require twenty times more processing than header inspection. Further-more, the payload is not divided into fixed fields, which means that DPI mechanismsmust parse contents during an inspection.
Automatedtestingisacornerstoneofagiledevelopment.Aneffectivetestingstrategywilld...
从新手到高手Photoshop手绘从新手到高手 本书特色 零基础Photoshop手绘实战类图书。Photoshop手绘初学者从入门到精通s选。涵盖Photos...
《无限相思无限恨》内容简介:石评梅作为深受大众喜爱的民国才女,是“五四”时期有名的作家。其情感经历、文采才干与绝代风华都一
轻松学习C程序设计-揭开计算机与程序设计的奥秘 本书特色 尽自己*大能力写一本比较轻,松颖,清晰,透彻,有价值的计算机科学入门是我的夙愿;把真正掌握计算奥秘和学...
《爱是万能的调味》内容简介:爱是世间最美的味道,爱是世间万能的调味品。爱是流淌在生命里,妈妈的味道。台湾地区著名的私房菜老
EricSchaffer博士,是人因国际公司(HumanFactorsInternational,Inc,简称HFI)的创始人和CEO。他曾创见性地认为可用性是...
Consideredoneofthemostintricatewritingsystemsinuse,Chinesecharactersholdapresenc...
《别具光芒:Flash动感网站设计与制作》是一本专门介绍Flash网站设计与制作的图书,通过生动、实用的案例向读者全面展示动感网站制
《中国经济哲学评论(2017)》内容简介:本书由“重新认识市场经济模式”“社会主义与市场经济的内生关系”“社会主义市场经济制度
《自私的基因》内容简介:《自私的基因》于1976年首次出版之后便畅销全球,是20世纪百大经典名著之一,是一部不仅在基因领域更在社
《零基础学PHP》主要内容:PHP是一种运行于服务器端并完全跨平台的嵌入式脚本编程语言,是目前开发各类Web应用的主流语言之一。P
《贫困的复杂图景与反贫困的多元路径》内容简介:本书在实地田野调研的基础上,通过宏观、微观考察民族地区农村贫困的复杂图景及致
数据库原理及应用(SQLServer2005)-数学指导与习题解答 本书特色 《数据库原理及应用(SQL Server 2005):教学指导与习题解答》是国家级...
《午夜降临前抵达》内容简介:本书是作家刘子超的旅行文学作品。在这本书里,他深入欧洲的中部,展开了一次逃脱和寻找的漫游。中欧
"EthnographyandVirtualWorlds"istheonlybookofitskind-aconcise,comprehensive,andpr...
广告语英国DK经典作品艺术排行榜冠军姊妹篇独特3D图立体图解析全球最标志建筑!主要卖点•世界建筑史上最著名的50余座全面解析•分
我也能掌握Flash编程:8.0版 内容简介 本书介绍了制作Flash特效、Flash游戏等所需要的Flash编程技巧,主要内容包括Flash编程的语法基础、事...
《赢在运营》内容简介:这是一个产品高度同质化的时代。为什么有的企业,明明产品并不是最好的,但投放市场却更受欢迎?因为他们的
1997年5月11日,全世界数百万人通过电视观看了一场惊人的胜利——一台计算机战胜了欲捍卫世界冠军称号的卡斯帕罗夫,此举震惊了国
《使用JavaWeb服务构建SOA》是一本方便的开发指南,可以帮助你在当前Java EE5和JavaSE6平台上实现Web服务和面向服务的架构(SOA