Table of Contents

Title Page

Copyright

Preface

About the Author

Acknowledgments

Chapter 1: Internetworking and Layered Models

1.1 Networking Technology

1.2 Connecting Devices

1.3 The OSI Model

1.4 TCP/IP Model

Chapter 2: TCP/IP Suite and Internet Stack Protocols

2.1 Network Layer Protocols

2.2 Transport Layer Protocols

2.3 World Wide Web

2.4 File Transfer

2.5 E-Mail

2.6 Network Management Service

2.7 Converting IP Addresses

2.8 Routing Protocols

2.9 Remote System Programs

2.10 Social Networking Services

2.11 Smart IT Devices

2.12 Network Security Threats

2.13 Internet Security Threats

2.14 Computer Security Threats

Chapter 3: Global Trend of Mobile Wireless Technology

3.1 1G Cellular Technology

3.2 2G Mobile Radio Technology

3.3 2.5G Mobile Radio Technology

3.4 3G Mobile Radio Technology (Situation and Status of 3G)

3.5 3G UMTS Security-Related Encryption Algorithm

Chapter 4: Symmetric Block Ciphers

4.1 Data Encryption Standard (DES)

4.2 International Data Encryption Algorithm (IDEA)

4.3 RC5 Algorithm

4.4 RC6 Algorithm

4.5 AES (Rijndael) Algorithm

Chapter 5: Hash Function, Message Digest, and Message Authentication Code

5.1 DMDC Algorithm

5.2 Advanced DMDC Algorithm

5.3 MD5 Message-Digest Algorithm

5.4 Secure Hash Algorithm (SHA-1)

5.5 Hashed Message Authentication Codes (HMAC)

Chapter 6: Asymmetric Public-Key Cryptosystems

6.1 Diffie–Hellman Exponential Key Exchange

6.2 RSA Public-Key Cryptosystem

6.3 ElGamal's Public-Key Cryptosystem

6.4 Schnorr's Public-Key Cryptosystem

6.5 Digital Signature Algorithm

6.6 The Elliptic Curve Cryptosystem (ECC)

Chapter 7: Public-Key Infrastructure

7.1 Internet Publications for Standards

7.2 Digital Signing Techniques

7.3 Functional Roles of PKI Entities

7.4 Key Elements for PKI Operations

7.5 X.509 Certificate Formats

7.6 Certificate Revocation List

7.7 Certification Path Validation

Chapter 8: Network Layer Security

8.1 IPsec Protocol

8.2 IP Authentication Header

8.3 IP ESP

8.4 Key Management Protocol for IPsec

Chapter 9: Transport Layer Security: SSLv3 and TLSv1

9.1 SSL Protocol

9.2 Cryptographic Computations

9.3 TLS Protocol

Chapter 10: Electronic Mail Security: PGP, S/MIME

10.1 PGP

10.2 S/MIME

Chapter 11: Internet Firewalls for Trusted Systems

11.1 Role of Firewalls

11.2 Firewall-Related Terminology

11.3 Types of Firewalls

11.4 Firewall Designs

11.5 IDS Against Cyber Attacks

11.6 Intrusion Detections Systems

Chapter 12: SET for E-Commerce Transactions

12.1 Business Requirements for SET

12.2 SET System Participants

12.3 Cryptographic Operation Principles

12.4 Dual Signature and Signature Verification

12.5 Authentication and Message Integrity

12.6 Payment Processing

Chapter 13: 4G Wireless Internet Communication Technology

13.1 Mobile WiMAX

13.2 WiBro (Wireless Broadband)

13.3 UMB (Ultra Mobile Broadband)

13.4 LTE (Long Term Evolution)

Acronyms

Bibliography

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.22.27.45