Computer Network Security ºô¸ô¦w¥þ·§½× |
³Ì·s®ø®§
l ²Ä¤@¦¸¤W½Ò¤é´Á¡G2010.2.21(¤G)
|
l ´Á¥½¦Ò¤é´Á¡G2010.6.8(¤G)
|
±Ð¾ÇÁ¿¸q (½Ð¿í¦u´¼¼z°]²£Åv)
Ch1 |
|
Ch2 |
|
Ch3 |
|
Ch4 |
|
Ch5 |
|
Ch6 |
|
Ch7 |
|
Ch8 |
|
Ch9 |
|
Ch10 |
|
Ch11 |
(PS. Á¿¸q·½¦Û ¥xÆW°ö¥Í±Ð¨|¥Xª© ¤§§ë¼v¤ù)
¤W½Ò®É¶¡»P¦aÂI
¬P´Á |
¶}©l®É¶¡ |
µ²§ô®É¶¡ |
±Ð«Ç |
¬P´Á¤G |
9:10 |
12:00 |
|
±Ð¬ì®Ñ |
1. Network Security Essentials, Applications and Standards, 3rd Edition, William Stallings, Pearson Education (°ª¥ß¹Ï®Ñ¤½¥q) 2. ¤¤¤åª©:ºô¸ô¦w¥þºën(²Ä¤Tª©),¿àºa¼Ï(ùÖ®p) |
°Ñ¦Ò®Ñ |
1. Cryptography and Network Security, Principle and 2. ¤¤¤åª©:±K½X¾Ç»Pºô¸ô¦w¥þ¡]²Ä¥|ª©¡^,¿àºa¼Ï¡]¶}µo®Ñ§½¡^ |
§U±Ð |
¶ÀÄ£½å/¹êÅç«Ç:¤u¾Ç¤j¼Ó7¼Óºô¸ô¦w¥þ¹êÅç«Ç EXT:5329 Email: m9821051@stmail.cgu.edu.tw |
½Òµ{Á¿¸qºô§} |
http://memo.cgu.edu.tw/shin-yan/ |
¾ãÅé±Ð¾Ç¥Ø¼Ð |
Åý×½Ò¦P¾Ç¤F¸Ñ±K½X¾Ç¤Îºô¸ô¦w¥þ¤§·§©Àì²z»P¨äÀ³¥Î¡C |
±Ð¾Ç¤èªk |
¨Ï¥Î§ë¼v¤ù¤f±ÂÁ¿¸Ñ¤Î°Q½× |
¤¤¤å½Òµ{²¤¶ |
¥»½Òµ{±Ð§÷¥Dn«Y¥HWilliam Stalling©ÒµÛ¡uNetwork Security Essentials¡v¬°¥D¡A¨Ã¥H±Â½Ò¦Ñ®v§ë¼v¤ù»P¦Û½sÁ¿¸q¬°»²¡C±Ð§÷¤º®e¥Dn¤¶²Ðºô¸ô¦w¥þªº·§©À¡A¨Ï¦P¾Ç¤F¸Ñ±K½X§Þ³N¡AÀ´±o¾Þ§@±K½X³nÅé¡A¨Ã¥[±j¹ï¦Û§Úºô¸ô¦w¥þ«OÅ@ªº¯à¤O¡C¥»½Òµ{±Ð§÷¥]§t¹ïºÙª÷Æ_¨t²Î¡B¤½¶}ª÷Æ_¨t²Î¡B»{ÃÒ»P¼Æ¦ìñ³¹¡Bºô¸ô¦w¥þÀ³¥Î¡B¹q¸£¯f¬r»P¸ê°T¦w¥þ¡A¥H¤Îºô¸ô¦w¥þ¤§§ðÀ»»P¨¾¿m¡C |
^¤å½Òµ{²¤¶ |
This course is devoted to the concept of network security. The purposes are to understand cryptography technology, to learn cryptography software and, moreover, to enhance the protection ability of network security. This course includes Symmetric Cryptosystems, Public-Key Cryptosystems, Authentication and Digital Signature, Network Security Applications, Computer Viruses and Data Security, and Security Attacks and Protections. |
¦¨ÁZ¦Ò®Ö |
¥®É¦Ò®Ö 30% |
®v¥Í¤¬°Ê®É¶¡ |
¤G-6,7 |