|

|
[IT HOLIC series]º¸¾È ÇÁ·ÎÅäÄÝ ³×Æ®¿öÅ© ¼³°è |
|
|
|
 |
9791162890226 |
 |
\20,000 |
 |
2019-12-27 |
 |
|
 |
336 p |
|
|
 |
À̱¤±Ô | |
|
|
|
|
| |
|

|
Åë½Åȯ°æ¿¡¼ °³ÀÎ ¹× Á¶Á÷ÀÇ º¸¾ÈÀ» À§ÇÑ °¡Àå È¿°úÀûÀÎ ¹æ¹ýÀ¸·Î ÀÎÅÍ³Ý ÇÁ·ÎÅäÄÝÀÇ µ¿ÀÛ ¿ø¸®, ÀÎÅÍ³Ý ÁÖ¼Ò¹æ½Ä, ÀÎÅÍ³Ý ÇÁ·ÎÅäÄÝ, IP Packet Routing, ARP, RARP, TCP/UDP, ICMP, Telnet FTP, SMTP, HTTP, IPv6 µî º¸¾È ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÏ¿© ÇÏÇâ½ÄÀ¸·Î ÇнÀÇÑ´Ù. ÀÌµé °¢ ÇÁ·ÎÅäÄÝ °£ÀÇ °ü°è¿¡ ´ëÇØ ÀÌÇØÇϰí, À̸¦ ÅëÇÑ º¸¾Èü°èÀÇ ¼³°è¿Í ±¸ÃàÀ» ÁøÇàÇÏ¿© ±âÃÊÀûÀÎ ±×¸®°í ÇöÀç ¾÷üµé¿¡¼ ¿ä±¸ÇÏ´Â ³×Æ®¿öÅ© º¸¾È¿¡ ´ëÇÑ °æ°¢½É°ú ´ëÀÀ·ÂÀ» ÇÔ¾ç½ÃÄÑ 4Â÷ »ê¾÷ Çõ¸í¿¡ Âü¿©ÇÒ ¼ö ÀÖ´Â ¿ª·®ÀÇ °È¿¡ º»¼ÀÇ °³¹ß¸ñÀû ¹× Çʿ伺ÀÌ ÀÖÀ½À» È®ÀÎÇÑ´Ù.
|
|
 |
½ÅÇÑ´ëÇб³ ITÀ¶ÇÕ°øÇкΠ±³¼ö |
|

|
Chapter01 ÀÎÅͳݰú º¸¾È
1.1 ÀÎÅÍ³Ý °³¿ä
1.2 µ¥ÀÌÅÍ Àü¼Û ¸ÞÄ¿´ÏÁò°ú ³×Æ®¿öÅ© º¸¾È
1.3 ³×Æ®¿öÅ© ±â¹Ý º¸¾ÈÀÇ °³³ä
Chapter02 ³×Æ®¿öÅ© ±¸Á¶¿Í º¸¾È
2.1 TCP/IP Protocol Suit & Secure
2.2 ¾ÏÈ£
2.3 ¸Þ½ÃÁö ¹«°á¼º°ú ÀüÀÚ¼¸í
2.4 ¼¸í½Ç¹« °èÃþº° ¾ÏÈ£È ¹æ¹ý-VPN(Virtual Private Network) ±¸Ãà
Chapter03 ¾ÏÈ£È ¹æ½Ä ¹× Ű ºÐ¹è
3.1 °³¿ä ¹× °ü·Ã Ç¥ÁØ
3.2 Ű ºÐ¹è ¹æ½Ä
Chapter04 ÀÎÁõ(Authentication) & Àΰ¡(Authorization)
4.1 Á¢±ÙÁ¦¾î(Access Control)
4.2 ÀÎÁõ(Authentication)
4.3 ÃֽŠÀÎÁõ ¹æ¹ý
4.4 Àΰ¡(Authorization)
4.5 ±âº»ÀûÀÎ º¸¾È ¸ðµ¨¸µ
4.6 ºñ ÀüÅëÀû Á¢±ÙÁ¦¾î
Chapter05 Åë½Å¸Á°ú º¸¾È ÇÁ·ÎÅäÄÝ
5.1 º¸¾È ÇÁ·ÎÅäÄÝ(Secure Protocol)ÀÇ °³¿ä ¹× Ȱ¿ë
5.2 ÀÎÁõ ÇÁ·ÎÅäÄÝ
5.3 ÀÎÁõ ¹× TCP
5.4 SSL(Secure Socket Layer)
5.5 IPSec(IP Security)
5.6 Ä¿º£·Î½º(Kerberos)
5.7 GSM(Global System for Mobile communication)
5.8 ÀÀ¿ë °èÃþ¿¡¼ÀÇ º¸¾È ¸ÞÀÏ ÇüÅ - S/MIME, PGP, PEM
Chapter06 PKI(Public Key Infrastructure)¿Í X.509 ÀÎÁõ¼
6.1 °ø°³ Ű ¾ÏÈ£ ½Ã½ºÅÛ °³¿ä
6.2 °ø°³ Ű ¹æ½Ä ¸Þ½ÃÁö ÀÎÁõÀÇ Ãë¾à¼º
6.3 °ø°³ Ű ±â¹Ý ±¸Á¶
6.4 Ű »ý¼º ¹× °ü¸®
6.5 ITU-TÀÇ X.509 ¹× IETFÀÇ PKIX
6.6 X.509 ÀÎÁõ¼
6.7 ÀÎÁõ¼ ÆóÁö¸ñ·Ï(CRL)
6.8 ¿Â¶óÀÎ ÀÎÁõ¼ »óÅÂÈ®ÀÎ ÇÁ·ÎÅäÄÝ(OCSP)
6.9 X.509 ½Å·Ú ¸ðµ¨
Chapter07 TCP ¿¬°á º¸¾È: SSL(Secure Sockets Layer)
7.1 SSL/TLS º¸¾È ÇÁ·ÎÅäÄÝ
7.2 Ű À¯µµ ¹× µ¥ÀÌÅÍ Àü¼Û
Chapter08 IPsec/IKE(Internet Key Exchange)
8.1 IP º¸¾È ÇÁ·ÎÅäÄÝÀÇ ¼ºñ½º¿Í ±¸Çö
8.2 IPSec(Internet Protocol security)
8.3 IKE(Internet Key Exchange)
Chapter09 ¼ÒÇÁÆ®¿þ¾î(Software)
9.1 ¼ÒÇÁÆ®¿þ¾î °áÇÔ°ú ¸Ö¿þ¾î
9.2 ¼ÒÇÁÆ®¿þ¾î ºñ º¸¾È¼º
9.3 ¿î¿µÃ¼Á¦¿Í º¸¾È
Chapter10 ¹«¼± ·£ º¸¾È(Wireless LAN Secure)
10.1 ¹«¼± ·£ÀÇ °³¿ä
10.2 IEEE 802.11 Ç¥ÁØÀÇ º¸¾È ±â¼ú
10.3 Â÷¼¼´ë ¹«¼± ·£ Ä§ÇØ ¹æÁö ±â¼ú
10.4 ±¹³»ÀÇ ¹«¼± ·£ º¸¾È
Chapter11 ¹æÈº®(Firewall)
11.1 ¹æÈº®°ú ±× Çʿ伺
11.2 ÇØÅ· ±×¸®°í º¸¾È ½Ã½ºÅÛ
11.3 ¹æÈº® ½Ã½ºÅÛ
11.4 Â÷¼¼´ë ¹æÈº®
Chapter12 º¸¾È°ú ³×Æ®¿öÅ© °ü¸®(Secure & Network Management)
12.1 ±â¼ú °³¿ä
12.2 ³×Æ®¿öÅ© º¸¾È
12.3 ±â¼ú µ¿Çâ
12.4 ±â¼úÀû Æ®·»µåÀÇ º¯È ÃßÀÌ
Chapter13 Áß¼Ò±â¾÷ÀÇ º¸¾È ÇöȲ°ú ½Ç¹« »ç·Ê
13.1 Áß¼Ò¡¤Áß°ß±â¾÷ÀÇ º¸¾È ÇöȲ
13.2 Áß¼Ò¡¤Áß°ß±â¾÷ÀÇ º¸¾ÈÈ ½Ç¹« ±¸Ãà»ç·Ê |
|