楊中皇老師 一百零六學年度第一學期 (Fall 2017) 「網路安全與網際網路應用」參考資料:

  1. 課程大綱
  2. 教科書網站

  3. 國立高雄師範大學行事曆
  4. 學校選課學生名單
  5. 高雄師範大學開課資料查詢系統
  6. 期中考(考試範圍:Chapters 1- 3中文考題包含計算題與問答題,Open Book Exam): 11月14日
  7. 期中報告(軟體功能): 11月21日,11月28日上課前繳交投影片
  8. 期末報告(軟體安裝與操作使用):12月26日起,1月9日期末考前繳交投影片
  9. 期末考(考試範圍:Chapters 1- 9中文考題包含計算題與問答題,Open Book Exam): 1月9日
  10.   姓名

    軟體功能、安裝與使用

     相關網址

    1

     

    AndroRat

    https://github.com/DesignativeDave/androrat

    2

    刁珮雯

    OpenKeychain

    https://github.com/open-keychain/open-keychain

    3

    莊竣富

    AFLogical OSE https://github.com/nowsecure/android-forensics

    4

    沈育全

    drozer

    https://labs.mwrinfosecurity.com/tools/drozer/

    5

    徐明鴻

    MobiSec

    http://sourceforge.net/projects/mobisec/

    6

    涂心偉

    Santoku

    https://santoku-linux.com

    7   Code Arbiter https://github.com/blackarbiter/Android_Code_Arbiter
    8   QARK https://github.com/linkedin/qark
    9   Frida https://github.com/frida/frida
  11. 微軟Windows Cryptographic Primitives

  12. Android設備 Cryptographic Primitives

  13. Android Security, https://source.android.com/security/

  14. 智慧型手機市場銷售 (2016)

  15. 個人電腦市場銷售 (2016)

  16. Android Open Source Project (AOSP)

  17. Android主要版本與使用分佈

  18. Android 7.1 密碼學算法原始碼

  19. 2017年3月Android擊敗Windows,正式成為全球第一大作業系統Android超越Windows成互联网用户最常用操作系统

  20. Google's Nexus devices

  21. Factory Images for Nexus and Pixel Devices

  22. Android 8.0.0, Nexus 6P

  23. Android 8.0.0原始碼

  24. Full-Disk Encryption

  25. OpenSSL, openssl-1.1.0b (2016-Sep-26)

  26. The security mirage,安全的錯覺,https://www.ted.com/talks/bruce_schneier?language=zh-tw

  27. "How to avoid surveillance ... with the phone in your pocket",https://www.youtube.com/watch?v=ni4FV5zL6lM

  28. “Cracking Stuxnet, a 21st-century cyber weapon”,https://www.youtube.com/watch?v=CS01Hmjv1pQ

  29. “比特幣、汗水、汰漬:品牌貨幣的未來”,https://www.ted.com/talks/paul_kemp_robertson_bitcoin_sweat_tide_meet_the_future_of_branded_currency?language=zh-tw

  30. “How the blockchain will radically transform the economy”,https://www.youtube.com/watch?v=RplnSVTzvnU

  31. How the blockchain is changing money and business,區塊鍊將如何改變金融與企業,https://www.ted.com/talks/don_tapscott_how_the_blockchain_is_changing_money_and_business/transcript?language=zh-tw

  32. We need hackers 我們需要駭客,https://www.ted.com/talks/rodrigo_bijou_governments_don_t_understand_cyber_warfare_we_need_hackers?language=zh-tw

  33. Everyday cybercrime,網路犯罪無所不在,https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it?language=zh-tw

  34. The 1s and 0s behind cyber warfare,網路戰爭背後的1與0,https://www.ted.com/talks/chris_domas_the_1s_and_0s_behind_cyber_warfare?language=zh-tw

  35. Three types of online attack,網路戰爭如何影響我們真實的世界,https://www.ted.com/talks/guy_philippe_goldstein_how_cyberattacks_threaten_real_world_peace?language=zh-tw

  36. Hire the hackers,雇用駭客吧,https://www.ted.com/talks/misha_glenny_hire_the_hackers?language=zh-tw

  37. Three types of online attack,線上攻擊的三種類型, https://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack?language=zh-tw

  38. Fighting viruses, defending the net,打擊電腦病毒,捍衛網路安全,https://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net?language=zh-tw

  39. SHA-256 Checksum in Factory Images for Nexus Devices  (local copy, Nov. 2016)

  40. Ubuntu 16.04.1 LTS download

  41. One-Way Hash MD5原始碼(RFC1321)

  42. Birthday Paradox (生日迷思):n個人,任意兩人生日是同一天(同月同日)的機率

  43. 網路犯罪導致全球每年損失6兆億美金,網絡安全人士失業率降至零,http://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/

  44. 網路駭客 Hackers: Outlaws & Angels

  45. Smartphones Become Next Frontier in Cybersecurity (智慧型手機為網路空間安全的下一個新領域)

  46. 楊義先教授、鈕心忻教授,安全通論

  47. Windows XP"裸奔" 挑戰安全 https://www.youtube.com/watch?v=_BScWpvV-Bk

  48. Virustotal惡意程式偵測  Anubis惡意程式偵測 CWSandbox惡意程式分析  Sandbox惡意程式分析 Malware Domain List

  49. Symantec免費線上掃毒程式

  50. MOOC大規模公開線上課程(Massive Open Online Courses)Cybersecurity

  51. 台灣開放式課程聯盟

  52. Coursera, 密碼學

  53. Mikko Hypponen: 打擊電腦病毒,捍衛網路安全

  54. 行政院國家資通安全會報技術服務中心-共通規範

  55. Android手機使用ECDHUsing ECDH on Android

  56. Apple Wins Crucial iPhone Encryption & WebObjects Patents (2009)
  57. 個人資料保護法(個資法),第28條:"如被害人不易或不能證明其實際損害額時,得請求法院依 侵害情節,以每人每一事件新臺幣五百元以上二萬元以下計算 … 對於同一原因事實造成多數當事人權利受侵害之事件,經當事人請求損害賠償者,其合計最高總額以新臺幣二億元為限"

  58. 大陸國家信息技術安全研究中心

  59. 烏雲網: http://wooyun.org

  60. FreeBuf關注黑客與極客 http://www.freebuf.com

  61. Apple公司產品安全性的相關資訊,http://www.apple.com/support/security/

  62. David Kahn, The Codebreakers - The Story of Secret Writing, 1967.

  63. 行政院主計處資安稽核

  64. Claude E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, vol.28-4, page 656-715, 1949.

  65. 美國普渡大學 CS 355, Fall, 2011, Homework 3

  66. Implementation of Data Encryption Standard (DES) in C

  67. DES的弱金鑰(weak key)K,使得用這個金鑰K加密任意明文M後的密文C,再度用相同金鑰K加密C會得到M,意即 DESK(M) = C    DESK(C) = M , http://en.wikipedia.org/wiki/Weak_key
  68. A.J. Menezes, et al, Handbook of Applied Cryptography  (CRC Press Series on Discrete Mathematics and Its Applications), 1996. 參閱http://www.cacr.math.uwaterloo.ca/hac/有PDF電子檔. 

  69. 行政院國家資通安全會報技術服務中心 http://www.icst.org.tw/
  70. FIPS 186-3,Digital Signature Standard (DSS), June 2009http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf , http://csrc.nist.gov/publications/drafts/dss_recommendation.pdf
  71. 日本NTT密碼學技術
  72. 國家圖書館 全國博碩士論文資訊網
  73. 美國博碩士論文檢索
  74. 一天內破解DES報導: (1). RSA公司 (2). CNN公司
  75. 中國密碼學會, http://www.cacrnet.org.cn/

  76. 大陸信息安全國家重點實驗室(The State Key Laboratory of Information Security,SKLOIS)

  77. 西安電子科技大學李暉教授:信息安全專業學生實踐能力培養的探索 (local copy)

  78. 西安電子科技大學王育民教授:資訊理論等專業的建設和參與建設的體會 (local copy)

  79. 2009年西安電子科技大學通信工程學院工程碩士指導教師名單 (local copy)

  80. 歐拉函數(Euler's totient function): 如果兩個整數的最大公因數是 1 時,我們稱它們為互質。歐拉函數 Phi(N)定義為小於N且與N互質的所有正整數的個數。例如N=9,小於9的所有正整數為{1,2,3,4,5,6,7,8},其中與9互質的為{1,2,4,5,7,8}有6個正整數,所以Phi(9)=6。再如N=10,小於10的所有正整數為{1,2,3,4,5,6,7,8,9},其中與10互質的為{1,3,7,9}有4個正整數,所以Phi(10)=4。如果P與Q為質數,則Phi(P*Q)=Phi(P)*Phi(Q)= (P-1)*(Q-1)。

  81. 破解512-bit RSA

  82. Sneakers (神鬼尖兵)

  83. How to Share NFS Files With Diffie-Hellman Authentication

  84. 2004年5月中國密碼年會與2004年8月美國Crypto年會的Rump Session,山東大學王小雲教授破解MD5和其他幾個one-way hash function (local copy)。NIST宣佈將於2010年淘汰SHA1 (local copy)

  85. IQ Test 智力測驗

  86. "NIST announces that Rijndael has been selected as the proposed AES,"NIST, October 2, 2000, http://csrc.nist.gov/archive/aes/

  87. AES (Advanced Encryption Standard) 原始碼 , rijndeal.c, rijndeal.h, boxes-ref.dat

  88. FIPS 197: Advanced Encryption Standard (2001年11月)

  89. Rijndeal原始文件

  90. AES動畫(flash)介紹,http://e-handel.mm.com.pl/crypto/rijndael_ingles2004.swf  (local copy)

  91. AES Algorithm Validation List, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html

  92. Chung-Huang Yang, "Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs," Proc. The 2001 Symposium on Cryptography and Information Security (SCIS2001), January 2001,  pp. 727-730.

  93. Wi-Fi Security

  94. Wi-Fi Protected Access (WPA)

  95. WPA2 (Wi-Fi Protected Access 2)

  96. An Initial Security Analysis of the IEEE 802.1x Standard (local copy)

  97. 802.11i (How we got here and where are we headed)

  98. Wireless LANs: Defending the Enterprise Airwaves

  99. Hacking the Invisible Network

  100. WLAN War Driving

  101. Eli Biham and Adi Shamir, Differential cryptanalysis of DES-like cryptosystems, Technical report CS90-16, Weizmann Institute of Science, 1990.

  102. 美國聯邦調查局的網路監控計畫:Carnivore, 英文介紹(mpeg, rm)

  103. IEEE 802.11, 802.11 LAN/MAN Wireless LANS標準

  104. Wi-Fi聯盟

  105. Mobile Security by NIST

  106. MIT, Dos and Don'ts of Client Authentication on the Web

  107. Nimda Notifyer

  108. IBM企業軟體技術發展暨解決方案論壇

  109. Unix Security

  110. 美國James Madison大學 資訊安全碩士學位(遠距教學)
  111. RFC, IETF 安全工作組
  112. 美國國家標準技術局電腦安全資源中心http://csrc.nist.gov/
  113. 最好的100個網路安全工具
  114. 日本資訊處理機構安全中心
  115. CERT

  116. COAST

  117. Common Vulnerabilities and Exposures (CVE)

  118. SANS

  119. SecurityFocus

  120. 國家圖書館 全國博碩士論文資訊網

  121. 美國博碩士論文檢索

  122. Bastille Linux

  123. Aryabhata and his commentators

  124. 內政部憑證管理中心

  125. 自然人憑證申請

  126. 財政部網路報繳稅財政部北區國稅局

  127. Internet Drafts

  128. 搜索引擎 All the Web

  129. 搜索引擎 AltaVista

  130. 密碼學常見問題集(FAQ)
  131. 美國國家安全局NSA的Security-Enhanced Linux

  132. BIBPIPE IT Security Research

  133. Research Papers on Strong Password Authentication
  134. W3C XML Digital Signature

  135. W3C XML Encryption 

  136. IETF PKIX Working Group

  137. IETF TLS Working Group, SSLv3TLSv1, OpenSSLRFC 2818  RFC 2817 RFC 2595  RFC 2487

  138. IETF LDAPv3 Revision Working Group, LDAPv3, OpenLDAP

  139. IETF S/MIME Working Group

  140. IETF Multicast Security Working Group

  141. IETF Secure Shell Working Group

  142. SSH

  143. PKCS #11: Cryptographic Token Interface Standard

  144. 打破NATs是安全的假象 (mirror)

  145. DCE team at Stanford University, Security in a Public World: A Survey

  146. Robert B. Reinhardt, An Architectural Overview of UNIX Network Security

  147. Dan Farmer, Improving the Security of Your Site by Breaking Into it

  148. IBM, Things that Go Bump in the Net

  149. IBM, Addressing security issues in Linux

  150. Linux Administrators Security Guide

  151. Securing a default Linux installation

  152. Windows XP Security

  153. Microsoft IIS Lockdown Tool, 23 August 2001

  154. Don Davis, Defective Sign & Encrypt in S/MIME,PKCS#7, MOSS, PEM, PGP, and XML

  155. Red Hat Linux 8.0 Security Guide

  156. Linux Security

  157. MUSCLE (Movement for the Use of Smart Cards in a Linux Environment)

  158. 政府投領標電子採購系統

  159. 美國ISS總代理鈺松國際資訊股份有限公司

  160. 2002年1月微軟資訊安全日防範網路系統的安全威脅

  161. 微軟Windows 2000 Server實力扎根系列研討會

  162. "NIST announces that Rijndael has been selected as the proposed AES,"NIST, October 2, 2000, http://csrc.nist.gov/encryption/aes/.

  163. One-Way Hash MD5原始碼(RFC1321)、htmlpdf

  164. Ubuntu 14.04.3 LTS 下載網頁

  165. FIPS 180-2Secure Hash Standard (SHS)NIST,2002年8月。

  166. NIST SHA3, http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf, 2015年8月。

  167. 人類已知最大的質數: 257885161-1 (17,425,170 decimal digits ) = ?  

  168. 木田祐司之UBASIC高速整數運算軟體。

  169. RSA演算法參數(P, Q, N, E, D) 範例一範例二範例三

  170. 大陸信息安全國家重點實驗室(The State Key Laboratory of Information Security,SKLOIS)

  171. 大陸中國網路信息安全

  172. 日本NTT的數位簽章演算法(TSH-EISNG)與公開金鑰加解密演算法(EPOC)

  173. 美國國立密碼博物館(National Cryptologic Museum)

  174. 政府憑證管理中心用戶使用說明

  175. 電子簽章法 (民國90年11月14日)

  176. 電子簽章法施行細則 (民國91年4月10日)

  177. 財政部網路報繳稅財政部北區國稅局

  178. Kerberos: RFC 1510

  179. 微軟公司 Internet Security and Acceleration Server (ISA)

  180. Windows 2000 Security Services

  181. 微軟公司視窗2000安全性服務 (中文)

  182. Benchmarks and Scoring Tool for Windows 2000

  183. 大數分解有獎徵答(總獎金超過美金六十萬元)

  184. 大數分解記錄

  185. Certificate Authorities (CAs), Public-Key Infrastructure (PKI): RFC 2693  RFC 2587  RFC 2585  RFC 2559 RFC 2527  RFC 2528  RFC 2511  RFC 2510  RFC 2459

  186. PGP: RFC 1991, RFC 2015, RFC 2440

  187. S/MIME: RFC 2311, RFC 2312, RFC 2632, RFC 2633, RFC 2634

  188. Virtual Private Networks (VPNs): RFC 2917  RFC 2764  RFC 2547  RFC 2685

  189. NTT's IPv6, Sun's IPv6, IETF IPSec Working Group, FreeS/WAN, KAME

  190. 中華電信研究所IPv6, HiNet IPv6, 台灣IPv6論壇, 下一代IPv6網路之建置

    RFC 3041

    Privacy Extensions for Stateless Address Autoconfiguration in IPv6

    RFC 2409

    Internet Key Exchange (IKE) 

    RFC 2406

    IP Encapsulating Security Payload (ESP)

    RFC 2402

    IP Authentication Header 

    RFC 2401

    Security Architecture for the Internet Protocol 

    RFC 1829

    The ESP DES-CBC Transform

    RFC 1828

    IP Authentication using Keyed MD5 

  191. ICSA certified firewall products

  192. Time Synchronization

  193. Secure Network Time Protocol (stime)

  194. W3C XML Signature Working Group

  195. CISSP (Certified Information System Security Professional資訊系統安全認證專家)證照
  196.  

  197. 網路管理工具

    Nessus

    http://www.nessus.org/

    Nmap

    http://www.nmap.org/nmap/

    ISS

    http://www.iss.net/

    SATAN

    ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/satan/satan/

    Tripwire

    http://sourceforge.net/projects/tripwire/

    COPS

    ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/cops/

    TCP Wrappers

    ftp://ftp.cerias.purdue.edu/pub/tools/unix/netutils/tcp_wrappers/

    WinDump

    http://netgroup-serv.polito.it/windump/

    Tiger

    http://www-arc.com/tara/ http://savannah.nongnu.org/projects/tiger/

    portmap

    ftp://ftp.cerias.purdue.edu/pub/tools/unix/netutils/portmap/

    Fremont

    ftp://ftp.cs.colorado.edu/pub/cs/distribs/fremont/

    ipacl

    ftp://ftp.cerias.purdue.edu/pub/tools/unix/netutils/ipacl/

    Argus

    ftp://ftp.andrew.cmu.edu/pub/argus/current/

    NETMAN

    ftp://ftp.cerias.purdue.edu/pub/tools/unix/netutils/netman/

    Sniffit

    http://sniffit.rug.ac.be/%20coder/sniffit/

    Sniffer Pro

    http://www.snifferpro.co.uk/

    ethereal

    http://www.ethereal.com/download.html

    hunt

    ftp://ftp.gncz.cz/pub/linux/hunt/hunt-1.5.tgz

    Anti Sniff

    http://www.securitysoftwaretech.com/antisniff/download.html

    SARA

    http://www-arc.com/sara/

    SAINT

    http://www.wwdsi.com/saint/

    AIDE

    http://www.cs.tut.fi/~rammer/aide.html

    Snort

    http://www.snort.org

    Shadow

    http://www.nswc.navy.mil/ISSEC/CID/

    BSD Airtools http://dachb0den.com/projects/bsd-airtools.html
    WEPCrack http://wepcrack.sourceforge.net/
    FreeS/WAN http://www.freeswan.org/
    KAME http://www.kame.net/
    VNC http://www.realvnc.com/

  198. FTP Security

    RFC0959

    File Transfer Protocol

    RFC1579

    Firewall-Friendly FTP

    RFC2228

    FTP Security Extensions

    RFC2389

    Feature negotiation mechanism for the File Transfer Protocol

    RFC2428

    FTP Extensions for IPv6 and NATs

    RFC2577

    FTP Security Considerations, May 1999.

    RFC2773

    Encryption using KEA and SKIPJACK

  199. RFC 3281, An Internet Attribute Certificate Profile for Authorization, April 2002.

  200. RFC 3280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, April 2002.

  201. RFC 3279 Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, April 2002.

  202. RFC 3278, Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), April 2002.

  203. RFC 3275, (Extensible Markup Language) XML-Signature Syntax and Processing, March 2002.

  204. RFC 3244, Microsoft Windows 2000 Kerberos Change Password and Set Password Protocols, February 2002.

  205. RFC 3218, Preventing the Million Message Attack on Cryptographic Message Syntax, January 2002.

  206. RFC 3217, Triple-DES and RC2 Key Wrapping, December 2001.

  207. RFC 3211, Password-based Encryption for CMS, December 2001.

  208. RFC 3207, SMTP Service Extension for Secure SMTP over Transport Layer Security, February 2002.

  209. RFC 3206, The SYS and AUTH POP Response Codes, February 2002.

  210. RFC 3193, Securing L2TP using IPsec, November 2001.

  211. RFC 3185, Reuse of CMS Content Encryption Keys, October 2001.

  212. RFC 3183, Domain Security Services using S/MIME, October 2001.

  213. RFC 3174, US Secure Hash Algorithm 1 (SHA1), September 2001.

  214. RFC 3161, Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)
  215. RFC 2030, Simple Network Time Protocol (SNTP) Version 4, October 1996.
  216. RFC 2986, PKCS #10: Certification Request Syntax Specification Version 1.7.
  217. RFC 2985, PKCS #9: Selected Object Classes and Attribute Types Version 2.0
  218. RFC 2437, PKCS #1: RSA Cryptography Specifications Version 2.0. B. Kaliski, J. Staddon. 
  219. RFC 2315, PKCS #7: Cryptographic Message Syntax Version 1.5.
  220. RFC 2559, Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2.
  221. RFC 3039, Interne t X.509 Public Key Infrastructure Qualified Certificates Profile
  222. RFC 3029, Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols
  223. RFC 3024, Reverse Tunneling for Mobile IP, revised
  224. RFC 3012, Mobile IPv4 Challenge/Response Extensions
  225. RFC 3163, ISO/IEC 9798-3 Authentication SASL Mechanism
  226. RFC 2759, Microsoft PPP CHAP Extensions, Version 2. G. Zorn. January 2000.
  227. RFC 2712, Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). A. Medvinsky, M. Hur. October 1999.
  228. RFC 2692, SPKI Requirements. C. Ellison. September 1999.
  229. RFC 2693, SPKI Certificate Theory. C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen. September 1999.
  230. RFC 2660, The Secure HyperText Transfer Protocol. E. Rescorla, A. Schiffman. August 1999.
  231. RFC 2632, S/MIME Version 3 Certificate Handling. B. Ramsdell, Ed.. June 1999.
  232. RFC 2633, S/MIME Version 3 Message Specification. B. Ramsdell, Ed.. June 1999.
  233. RFC 2634, Enhanced Security Services for S/MIME. P. Hoffman, Ed.. June 1999.
  234. RFC 2585, Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP. R. Housley, P. Hoffman. May 1999.
  235. RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams. June 1999.
  236. RFC 2511, Internet X.509 Certificate Request Message Format, March 1999.
  237. RFC 2510, Internet X.509 Public Key Infrastructure Certificate Management Protocols, March 1999.
  238. RFC 2460, Internet Protocol, Version 6 (IPv6) Specification. S. Deering, R. Hinden. December 1998.
  239. RFC 2459, Internet X.509 Public Key Infrastructure Certificate and CRL Profile. R. Housley, W. Ford, W. Polk, D. Solo. January 1999.
  240. RFC 2409, The Internet Key Exchange (IKE). D. Harkins, D. Carrel. November 1998.
  241. RFC 2408, Internet Security Association and Key Management Protocol (ISAKMP). D. Maughan, M. Schertler, M. Schneider, J. Turner. November 1998.
  242. RFC 2407, The Internet IP Security Domain of Interpretation for ISAKMP. D. Piper. November 1998.
  243. RFC 2246, The TLS Protocol Version 1.0. T. Dierks, C. Allen. January 1999.
  244. RFC 1994, PPP Challenge Handshake Authentication Protocol (CHAP). W. Simpson. August 1996.
  245. RFC 1898, CyberCash Credit Card Protocol Version 0.8. D. Eastlake 3rd, B. Boesch, S. Crocker & M. Yesil. February 1996.
  246. RFC 1510,  PS   J. Kohl, B. Neuman, "The Kerberos Network Authentication Service (V5)", 09/10/1993.

教科書目錄:

(一)、基礎理論篇
第1章:網路安全概論
第2章:私密金鑰密碼系統
第3章:公開金鑰密碼系統
第4章:單向雜湊函數
第5章:數位簽章
第6章:橢圓曲線密碼系統
第7章:金鑰管理
第8章:密碼學模組技術
第9章:IC卡
(二)、 網路工具篇
第10章:Wireshark封包分析軟體
第11章:Nmap
第12章:Nessus
第13章:Snort
第14章:AIDE與wxChecksums
第15章:PGP/GnuPG
第16章:開放原始碼的網路安全軟體