Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Man Young Rhee
Wireless Mobile Internet Security, 2nd Edition
Cover
Title Page
Copyright
Preface
About the Author
Acknowledgments
Chapter 1: Internetworking and Layered Models
1.1 Networking Technology
1.2 Connecting Devices
1.3 The OSI Model
1.4 TCP/IP Model
Chapter 2: TCP/IP Suite and Internet Stack Protocols
2.1 Network Layer Protocols
2.2 Transport Layer Protocols
2.3 World Wide Web
2.4 File Transfer
2.5 E-Mail
2.6 Network Management Service
2.7 Converting IP Addresses
2.8 Routing Protocols
2.9 Remote System Programs
2.10 Social Networking Services
2.11 Smart IT Devices
2.12 Network Security Threats
2.13 Internet Security Threats
2.14 Computer Security Threats
Chapter 3: Global Trend of Mobile Wireless Technology
3.1 1G Cellular Technology
3.2 2G Mobile Radio Technology
3.3 2.5G Mobile Radio Technology
3.4 3G Mobile Radio Technology (Situation and Status of 3G)
3.5 3G UMTS Security-Related Encryption Algorithm
Chapter 4: Symmetric Block Ciphers
4.1 Data Encryption Standard (DES)
4.2 International Data Encryption Algorithm (IDEA)
4.3 RC5 Algorithm
4.4 RC6 Algorithm
4.5 AES (Rijndael) Algorithm
Chapter 5: Hash Function, Message Digest, and Message Authentication Code
5.1 DMDC Algorithm
5.2 Advanced DMDC Algorithm
5.3 MD5 Message-Digest Algorithm
5.4 Secure Hash Algorithm (SHA-1)
5.5 Hashed Message Authentication Codes (HMAC)
Chapter 6: Asymmetric Public-Key Cryptosystems
6.1 Diffie–Hellman Exponential Key Exchange
6.2 RSA Public-Key Cryptosystem
6.3 ElGamal's Public-Key Cryptosystem
6.4 Schnorr's Public-Key Cryptosystem
6.5 Digital Signature Algorithm
6.6 The Elliptic Curve Cryptosystem (ECC)
Chapter 7: Public-Key Infrastructure
7.1 Internet Publications for Standards
7.2 Digital Signing Techniques
7.3 Functional Roles of PKI Entities
7.4 Key Elements for PKI Operations
7.5 X.509 Certificate Formats
7.6 Certificate Revocation List
7.7 Certification Path Validation
Chapter 8: Network Layer Security
8.1 IPsec Protocol
8.2 IP Authentication Header
8.3 IP ESP
8.4 Key Management Protocol for IPsec
Chapter 9: Transport Layer Security: SSLv3 and TLSv1
9.1 SSL Protocol
9.2 Cryptographic Computations
9.3 TLS Protocol
Chapter 10: Electronic Mail Security: PGP, S/MIME
10.1 PGP
10.2 S/MIME
Chapter 11: Internet Firewalls for Trusted Systems
11.1 Role of Firewalls
11.2 Firewall-Related Terminology
11.3 Types of Firewalls
11.4 Firewall Designs
11.5 IDS Against Cyber Attacks
11.6 Intrusion Detections Systems
Chapter 12: SET for E-Commerce Transactions
12.1 Business Requirements for SET
12.2 SET System Participants
12.3 Cryptographic Operation Principles
12.4 Dual Signature and Signature Verification
12.5 Authentication and Message Integrity
12.6 Payment Processing
Chapter 13: 4G Wireless Internet Communication Technology
13.1 Mobile WiMAX
13.2 WiBro (Wireless Broadband)
13.3 UMB (Ultra Mobile Broadband)
13.4 LTE (Long Term Evolution)
Acronyms
Bibliography
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Table of Contents
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset