![]() Network Security, Firewalls, and Virtual Private Networks (VPN)Ĭryptography and Network Security Third EditionĪbout the Author Atul Kahate has over 17 years of experience in Information Technology in India and abroad in various capacities. Practical Implementations of Cryptography/SecurityĨ.3 Cryptographic Solutions Using Microsoft. ![]() Computer-based Asymmetric-Key Cryptography AlgorithmsĤ.2 Brief History of Asymmetric-Key CryptographyĤ.3 An Overview of Asymmetric-Key CryptographyĤ.6 Symmetric- and Asymmetric-Key CryptographyĤ.11 Problems with the Public-Key Exchangeĥ.5 Public Key Cryptography Standards (PKCS)Ĭase Study: Cross Site Scripting Vulnerability (CSSV)Ħ.5 Secure Hyper Text Transfer Protocol (SHTTP)Ħ.10 Wireless Application Protocol (WAP) SecurityĦ.14 Link Security Versus Network SecurityĬase Study 1: Secure Inter-branch Payment TransactionsĨ. ![]() Computer-based Symmetric Key Cryptographic Algorithmsģ.3 An Overview of Symmetric-Key Cryptographyģ.5 International Data Encryption Algorithm (IDEA)Ĭase Study: Secure Multiparty CalculationĤ. Introduction to the Concepts of SecurityĢ.6 Symmetric and Asymmetric Key CryptographyĬase Study: Denial of Service (DOS) Attacksģ.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |