Computer Network Security ºô¸ô¦w¥þ·§½×

¦^±Ð¾Çºô­¶

 

³Ì·s®ø®§

l    ²Ä¤@¦¸¤W½Ò¤é´Á¡G2010.2.21(¤G)

 

l    ´Á¥½¦Ò¤é´Á¡G2010.6.8(¤G)

 

 

¤W½Ò»P¥Í¬¡¤½¬ù

 

±Ð¾ÇÁ¿¸q (½Ð¿í¦u´¼¼z°]²£Åv)

Ch1

ºô¸ô¦w¥þ²¤¶

Ch2

¹ïºÙ¦¡¥[±K»P°T®§¾÷±K©Ê

Ch3

¤½¶}ª÷Æ_¥[±K»P°T®§»{ÃÒ

Ch4

»{ÃÒªºÀ³¥Î

Ch5

¹q¤l¶l¥ó¦w¥þ

Ch6

IPSec IPSec(v2)(new)

Ch7

ºô¯¸¦w¥þ

Ch8

ºô¸ôºÞ²zªº¦w¥þ

Ch9

¤J«IªÌ

Ch10

´c·N³nÅé

Ch11

¨¾¤õÀð

(PS. Á¿¸q·½¦Û ¥xÆW°ö¥Í±Ð¨|¥Xª© ¤§§ë¼v¤ù)

 

¤W½Ò®É¶¡»P¦aÂI

¬P´Á

¶}©l®É¶¡

µ²§ô®É¶¡

±Ð«Ç

¬P´Á¤G

9:10

12:00

 

 

±Ð¬ì®Ñ

1. Network Security Essentials, Applications and Standards, 3rd Edition, William Stallings, Pearson Education (°ª¥ß¹Ï®Ñ¤½¥q)

2. ¤¤¤åª©:ºô¸ô¦w¥þºë­n(²Ä¤Tª©),¿àºa¼Ï(ùÖ®p)

°Ñ¦Ò®Ñ

1. Cryptography and Network Security, Principle and 
Practice, 4th Edition, William Stallings, Prentice Hall
¡]¶}µo®Ñ§½¡^

2. ¤¤¤åª©:±K½X¾Ç»Pºô¸ô¦w¥þ¡]²Ä¥|ª©¡^,¿àºa¼Ï¡]¶}µo®Ñ§½¡^

§U±Ð

¶ÀÄ£½å/¹êÅç«Ç:¤u¾Ç¤j¼Ó7¼Óºô¸ô¦w¥þ¹êÅç«Ç EXT:5329

Email: m9821051@stmail.cgu.edu.tw

½Òµ{Á¿¸qºô§}

http://memo.cgu.edu.tw/shin-yan/

¾ãÅé±Ð¾Ç¥Ø¼Ð

Åý­×½Ò¦P¾Ç¤F¸Ñ±K½X¾Ç¤Îºô¸ô¦w¥þ¤§·§©À­ì²z»P¨äÀ³¥Î¡C

±Ð¾Ç¤èªk

¨Ï¥Î§ë¼v¤ù¤f±ÂÁ¿¸Ñ¤Î°Q½×

¤¤¤å½Òµ{²¤¶

¥»½Òµ{±Ð§÷¥D­n«Y¥HWilliam Stalling©ÒµÛ¡uNetwork Security Essentials¡v¬°¥D¡A¨Ã¥H±Â½Ò¦Ñ®v§ë¼v¤ù»P¦Û½sÁ¿¸q¬°»²¡C±Ð§÷¤º®e¥D­n¤¶²Ðºô¸ô¦w¥þªº·§©À¡A¨Ï¦P¾Ç¤F¸Ñ±K½X§Þ³N¡AÀ´±o¾Þ§@±K½X³nÅé¡A¨Ã¥[±j¹ï¦Û§Úºô¸ô¦w¥þ«OÅ@ªº¯à¤O¡C¥»½Òµ{±Ð§÷¥]§t¹ïºÙª÷Æ_¨t²Î¡B¤½¶}ª÷Æ_¨t²Î¡B»{ÃÒ»P¼Æ¦ìñ³¹¡Bºô¸ô¦w¥þÀ³¥Î¡B¹q¸£¯f¬r»P¸ê°T¦w¥þ¡A¥H¤Îºô¸ô¦w¥þ¤§§ðÀ»»P¨¾¿m¡C

­^¤å½Òµ{²¤¶

This course is devoted to the concept of network security. The purposes are to understand cryptography technology, to learn cryptography software and, moreover, to enhance the protection ability of network security. This course includes Symmetric Cryptosystems, Public-Key Cryptosystems, Authentication and Digital Signature, Network Security Applications, Computer Viruses and Data Security, and Security Attacks and Protections.

¦¨ÁZ¦Ò®Ö

¥­®É¦Ò®Ö 30%
´Á¤¤¦Ò 25%
´Á¥½¦Ò 25%
§@·~ 20%

®v¥Í¤¬°Ê®É¶¡

¤G-6,7