热门搜索: 中考 高考 考试 开卷17
服务电话 024-23945002/96192
 

数字顽疾:计算机病毒简史

编号:
wx1203652965
销售价:
¥76.56
(市场价: ¥88.00)
赠送积分:
77
数量:
   
商品介绍

本书以科学理性与人文关怀相融合的笔触,系统梳理了计算机病毒从理论萌芽、技术演化到当代智能化威胁的完整发展历程。通过翔实的历史考证与生动的案例剖析,本书深入揭示了病毒技术的理论溯源、核心迭代、关键性人物,及其与数字社会文化的深刻关联,精准勾勒了其在信息技术演进和网络攻防对抗中的多维生态位,并前瞻性地审视了由此引发的社会结构冲击、伦理治理困境及未来潜在风险。全书兼顾理论深度与科普表达,将复杂的技术原理、生动的安全攻防、演化的博弈逻辑,转化为通俗易懂的知识,为读者呈现了一场跨越技术、社会与文化的智慧盛宴。本书既适合IT从业者、网络安全研究者及相关学科学生阅读,亦是科技政策制定者以及所有对数智文明充满好奇的公众读者的理想读物。

基 础 篇
第1 章 信息技术:网络空间的物质基础·················································.2
1.1 计算思维与理论······································································.2
1.1.1 计算火种:史前计算·······················································.2
1.1.2 计算文明:图灵机··························································.4
1.1.3 计算体系:存储程序思想·················································.7
1.1.4 计算动力:摩尔定律·······················································.9
1.1.5 计算理念:开源思想·····················································.13
1.2 硬件技术·············································································.17
1.2.1 IT 发动机:CPU 芯片····················································.17
1.2.2 AI 助推剂:GPU 芯片····················································.20
1.2.3 数据仓库:内存芯片·····················································.23
1.3 软件技术·············································································.26
1.3.1 IT 动力源语:编程语言··················································.26
1.3.2 IT 生态平台:操作系统··················································.29
1.4 信息技术公司·······································································.32
1.4.1 PC 推广商:IBM ··························································.32
1.4.2 PC 原动力:Intel···························································.37
1.4.3 PC 生态盟主:Microsoft ·················································.40
1.4.4 数字创新者:Apple ·······················································.44
1.4.5 AI 原动力:NVIDIA······················································.49
1.5 风云人物·············································································.53
1.5.1 IT 筹划师:图灵···························································.54
1.5.2 IT 架构师:冯·诺依曼··················································.57
1.5.3 软件生态师:比尔·盖茨···············································.60
1.5.4 数字创新师:史蒂夫·乔布斯·········································.64
1.5.5 开源实践师:林纳斯·托瓦兹·········································.67
1.5.6 AI 梦想家:黄仁勋························································.70
第2 章 网络技术:网络空间的黏合剂··················································.75
2.1 国际互联网:网络空间的支撑平台············································.75
2.1.1 DARPA:美国科技引擎··················································.75
2.1.2 ARPANET:国际互联网前身···········································.78
2.1.3 Internet:国际互联网·····················································.80
2.2 暗网:隐匿的互联网平行世界··················································.84
2.3 移动互联网:掌上智能互联网··················································.86
2.4 物联网:万物互联网······························································.90
2.5 星联网:全域互联网······························································.92
第3 章 高新技术:网络空间的创新引擎···············································.98
3.1 人工智能技术·······································································.98
3.1.1 AI 起源与演化······························································.99
3.1.2 AI 生态······································································.105
3.2 区块链技术·········································································.109
3.2.1 区块链起源·································································.109
3.2.2 神秘缔造者:中本聪····················································.111
3.3 云计算技术·········································································.112
3.3.1 云淡风轻····································································.112
3.3.2 云深不知处·································································.114
演 化 篇
第4 章 数字顽疾:计算机病毒··························································.117
4.1 计算机病毒定义···································································.117
4.2 计算机病毒起源···································································.118
4.2.1 理论起源····································································.118
4.2.2 游戏起源····································································.119
4.2.3 科幻起源····································································.120
4.2.4 实验起源····································································.121
4.3 计算机病毒特性···································································.122
4.3.1 繁殖性·······································································.122
4.3.2 破坏性·······································································.123
4.3.3 传染性·······································································.124
4.3.4 潜伏性·······································································.124
4.3.5 可触发性····································································.125
4.3.6 衍生性·······································································.125
4.3.7 不可预见性·································································.126
4.4 计算机病毒类型···································································.127
4.4.1 按存储介质划分··························································.128
4.4.2 按感染系统划分··························································.128
4.4.3 按破坏性划分······························································.129
4.4.4 按算法功能划分··························································.130
4.5 计算机病毒结构···································································.131
4.6 计算机病毒环境···································································.134
4.6.1 计算机体系结构依赖····················································.135
4.6.2 计算机操作系统依赖····················································.138
4.6.3 文件系统及文件格式依赖··············································.140
4.6.4 解释环境依赖······························································.141
4.7 计算机病毒的生命周期··························································.143
4.7.1 病毒攻击阶段······························································.143
4.7.2 病毒防御阶段······························································.146
第5 章 嬗变之路:病毒演化简史·······················································.148
5.1 病毒演化逻辑与时间轴··························································.148
5.1.1 计算机病毒外部环境变迁视角········································.148
5.1.2 计算机病毒攻击载体视角··············································.152
5.1.3 计算机病毒编写者视角·················································.155
5.2 计算机病毒演化模式·····························································.158
5.2.1 计算机病毒个体演化模式··············································.158
5.2.2 计算机病毒群体演化模式··············································.175
5.2.3 计算机病毒与环境适应演化模式·····································.179
5.2.4 计算机病毒的演化趋势·················································.184
5.3 风云人物············································································.189
5.3.1 里奇·斯克伦塔··························································.189
5.3.2 弗雷德·科恩······························································.191
5.3.3 巴基斯坦兄弟······························································.192
5.3.4 罗伯特·莫里斯··························································.194
5.3.5 陈盈豪·······································································.196
5.4 病毒研究组织······································································.198
5.4.1 29A ···········································································198
5.4.2 VLAD ·······································································.199
5.4.3 VX Heaven ·································································.201
5.4.4 VirusView···································································.203
博 弈 篇
第6 章 绝地反击:反病毒简史··························································.206
6.1 反病毒软件简史···································································.206
6.2 反病毒技术简史···································································.210
6.3 风云人物············································································.213
6.3.1 约翰·迈克菲······························································.213
6.3.2 尤金·卡巴斯基··························································.215
6.3.3 马库斯·哈钦斯··························································.217
6.3.4 彼得·苏尔·································································.221
6.4 反病毒研究组织···································································.222
6.4.1 EICAR·······································································.223
6.4.2 CARO ·······································································.225
6.4.3 AMTSO ·····································································.226
6.4.4 Virus Bulletin·······························································.227
趋 势 篇
第7 章 魔道之争:病毒与反病毒博弈·················································.230
7.1 网络空间攻防博弈································································.230
7.1.1 网络空间博弈······························································.230
7.1.2 病毒与反病毒博弈·······················································.232
7.2 AI 赋能未来网络攻防····························································.236
7.2.1 AI 赋能“剑更锋”·······················································.237
7.2.2 AI 赋能“盾更坚”·······················································.239
7.2.3 AI 面临的攻防挑战·······················································.243
7.3 构建数字马其顿防线·····························································.244
后记·······························································································.251
参考文献·························································································.253

商品参数
基本信息
出版社 电子工业出版社
ISBN 9787121502682
条码 9787121502682
编者 张瑜 著
译者 --
出版年月 2025-06-01 00:00:00.0
开本 其他
装帧 平装
页数 253
字数
版次 1
印次 1
纸张
商品评论

暂无商品评论信息 [发表商品评论]

商品咨询

暂无商品咨询信息 [发表商品咨询]