Network Security ºô¸ô¦w¥þ

¦^±Ð¾Çºô­¶

 

³Ì·s®ø®§

l    ²Ä¤@¦¸¤W½Ò¤é´Á¡G2013.2.25

l   Facebookºô§}¡GÂI§Ú¦b¥k¤W¤è«ö¡u­n¨D¥[¤J¡v

 

¤W½Ò»P¥Í¬¡¤½¬ù

 

±Ð¾ÇÁ¿¸q (½Ð¿í¦u´¼¼z°]²£Åv)

¡@

Ch1

¸ê°T¦w¥þ²¤¶

Ch2

¥[±K»P¸Ñ±K

Ch3

ª÷Æ_¥æ´«»P¨ó©w

Ch4

¤½¶}ª÷Æ_

Ch5

¶Ã¼Æ²£¥Í¾¹

Ch6

Âø´ê¨ç¼Æ(Hash function)

Ch7

¼Æ¦ìñ³¹

Ch8

¹q¤l°Ó°È¤Î¨ä¦w¥þ

Ch9

Ų§O§Þ³N

Ch10

IP Security

Ch11

ª÷Æ_ºÞ²z

Ch12

PGP ²¤¶

Ch13

¡@

Ch14

¡@

(PS. Á¿¸q ½Ð¼g«H¦V§U±Ð¯Á¨ú)

 

¤W½Ò®É¶¡»P¦aÂI

¬P´Á

¶}©l®É¶¡

µ²§ô®É¶¡

±Ð«Ç

¬P´Á¤@

14:10

17:00

¤u¾Ç°|¤C¼Ó½s½X¹êÅç«Ç

 

±Ð¬ì®Ñ

1. Network Security Essentials, Applications and Standards, 3rd Edition, William Stallings, Pearson Education (°ª¥ß¹Ï®Ñ¤½¥q)

2. ¤¤¤åª©:ºô¸ô¦w¥þºë­n(²Ä¤Tª©),¿àºa¼Ï(ùÖ®p)

°Ñ¦Ò®Ñ

1. Cryptography and Network Security, Principle and 
Practice, 4th Edition, William Stallings, Prentice Hall
¡]¶}µo®Ñ§½¡^

2. ¤¤¤åª©:±K½X¾Ç»Pºô¸ô¦w¥þ¡]²Ä¥|ª©¡^,¿àºa¼Ï¡]¶}µo®Ñ§½¡^

§U±Ð

³¯«T¦W (c755324@hotmail.com)

¹êÅç«Ç:¤u¾Ç¤j¼Ó7ºô¸ô¦w¥þ¹êÅç«Ç EXT:5329

½Òµ{Á¿¸qºô§}

http://memo.cgu.edu.tw/shin-yan/

¾ãÅé±Ð¾Ç¥Ø¼Ð

Åý­×½Ò¦P¾Ç¤F¸Ñ±K½X¾Ç¤Îºô¸ô¦w¥þ¤§·§©À­ì²z»P¨äÀ³¥Î¡C

±Ð¾Ç¤èªk

¨Ï¥Î§ë¼v¤ù¤f±ÂÁ¿¸Ñ¤Î°Q½×

¤¤¤å½Òµ{²¤¶

¥»½Òµ{±Ð§÷¥D­n«Y¥HWilliam Stalling©ÒµÛ¡uNetwork Security Essentials¡v¬°¥D¡A¨Ã¥H±Â½Ò¦Ñ®v§ë¼v¤ù»P¦Û½sÁ¿¸q¬°»²¡C±Ð§÷¤º®e¥D­n¤¶²Ðºô¸ô¦w¥þªº·§©À¡A¨Ï¦P¾Ç¤F¸Ñ±K½X§Þ³N¡AÀ´±o¾Þ§@±K½X³nÅé¡A¨Ã¥[±j¹ï¦Û§Úºô¸ô¦w¥þ«OÅ@ªº¯à¤O¡C¥»½Òµ{±Ð§÷¥]§t¹ïºÙª÷Æ_¨t²Î¡B¤½¶}ª÷Æ_¨t²Î¡B»{ÃÒ»P¼Æ¦ìñ³¹¡Bºô¸ô¦w¥þÀ³¥Î¡B¹q¸£¯f¬r»P¸ê°T¦w¥þ¡A¥H¤Îºô¸ô¦w¥þ¤§§ðÀ»»P¨¾¿m¡C

­^¤å½Òµ{²¤¶

This course is devoted to the concept of network security. The purposes are to understand cryptography technology, to learn cryptography software and, moreover, to enhance the protection ability of network security. This course includes Symmetric Cryptosystems, Public-Key Cryptosystems, Authentication and Digital Signature, Network Security Applications, Computer Viruses and Data Security, and Security Attacks and Protections.

¦¨ÁZ¦Ò®Ö

´Á¤¤¦Ò 30%
´Á¥½³ø§i 30%
¤p¦Ò 20%
§@·~ 10%
¥­®Éªí²{ 10%

®v¥Í¤¬°Ê®É¶¡

¤G - 5,6