Table of Contents
Chapter 1: Internetworking and Layered Models
Chapter 2: TCP/IP Suite and Internet Stack Protocols
2.6 Network Management Service
2.10 Social Networking Services
2.13 Internet Security Threats
2.14 Computer Security Threats
Chapter 3: Global Trend of Mobile Wireless Technology
3.2 2G Mobile Radio Technology
3.3 2.5G Mobile Radio Technology
3.4 3G Mobile Radio Technology (Situation and Status of 3G)
3.5 3G UMTS Security-Related Encryption Algorithm
Chapter 4: Symmetric Block Ciphers
4.1 Data Encryption Standard (DES)
4.2 International Data Encryption Algorithm (IDEA)
Chapter 5: Hash Function, Message Digest, and Message Authentication Code
5.3 MD5 Message-Digest Algorithm
5.4 Secure Hash Algorithm (SHA-1)
5.5 Hashed Message Authentication Codes (HMAC)
Chapter 6: Asymmetric Public-Key Cryptosystems
6.1 Diffie–Hellman Exponential Key Exchange
6.2 RSA Public-Key Cryptosystem
6.3 ElGamal's Public-Key Cryptosystem
6.4 Schnorr's Public-Key Cryptosystem
6.5 Digital Signature Algorithm
6.6 The Elliptic Curve Cryptosystem (ECC)
Chapter 7: Public-Key Infrastructure
7.1 Internet Publications for Standards
7.2 Digital Signing Techniques
7.3 Functional Roles of PKI Entities
7.4 Key Elements for PKI Operations
7.6 Certificate Revocation List
7.7 Certification Path Validation
Chapter 8: Network Layer Security
8.4 Key Management Protocol for IPsec
Chapter 9: Transport Layer Security: SSLv3 and TLSv1
9.2 Cryptographic Computations
Chapter 10: Electronic Mail Security: PGP, S/MIME
Chapter 11: Internet Firewalls for Trusted Systems
11.2 Firewall-Related Terminology
11.5 IDS Against Cyber Attacks
11.6 Intrusion Detections Systems
Chapter 12: SET for E-Commerce Transactions
12.1 Business Requirements for SET
12.3 Cryptographic Operation Principles
12.4 Dual Signature and Signature Verification
12.5 Authentication and Message Integrity
Chapter 13: 4G Wireless Internet Communication Technology
13.2 WiBro (Wireless Broadband)
13.3 UMB (Ultra Mobile Broadband)
3.22.27.45