Note: Please check your Spam or Junk folder, in case you didn't receive the email with verification code.
1.1 Introduction :Security Attacks-Services & Mechanisms
1.2 Symmetric Cipher Model, Substitution Techniques,Transportation Technique
1.3 Cyber Threats And Their Defense(Phishing Defensive Measures, Web Based Attacks, Sql Injection & Defense Techniques)
1.4 Buffer Overflow & Format String Vulnerabilities, tcp Session Hijacking(Arp Attacks, Route Table Modification) , udp Hijacking ( Man-In-The-Middle Attacks)
2.1 Traditional Block Cipher Structure- Block Cipher Design Principles, Block Cipher Modes Of Operation
2.2 Des
2.3 Aes-Structure-Transformation Functions
2.4 Blowfish
2.5 Key Expansion
2.6 Cast-128, Idea
3.1 Number Theory
3.2 Prime And Relatively Prime Numbers
3.3 Modular Arithmetic, Fermat’s And Euler’s Theorems, The Chinese Remainder Theorem, Discrete Logarithms
3.4 Public Key Cryptography,Principles
3.5 Public Key Cryptography Algorithms :Rsa Algorithms,, Diffie Hellman Key Exchange, Elgamal Encryption & Decryption, Elliptic Curve Cryptography
4.1 Application Of Cryptographic Hash Functions,Requirements & Security, Secure Hash Algorithm
4.2 Message Authentication Functions-Requirements & Security
4.3 Hmac & Cmac
4.4 Digital Signatures,Nist Digital Signature Algorithm-Key Management & Distribution
5.1 User Authentication- Remote User Authentication Principles- Kerberos
5.2 Transport Level Security
5.3 Web Security Requirements, Secure Socket Layer (Ssl) And Transport Layer Security (Tls), Secure Shell(Ssh)
5.4 Electronic Mail Security,Pretty Good Privacy (Pgp) And s/Mime
6.1 Ip Security- Ip Security Overview-Ip Security Architecture
6.2 Authentication Header, Encapsulating Security Payload, Combining Security Associations And Key Management
6.3 Intrusion Detection-Overview, Approaches For Ids/Ips, Signature Based Ids, Host Based Ids/Ips
No Preview is available for this book
CategoriesComputer Science
Format EPUB
TypeeBook