holidaypacklist Hier klicken Kinderfahrzeuge BildBestseller Cloud Drive Photos OLED TVs Learn More madamet HI_BOSCH_COOP Hier klicken Fire Shop Kindle PrimeMusic Autorip GC FS16

Diese App beziehen

Bitte melden Sie sich vor dem Kauf an (Warum?)

Anmelden

Network Management & Security

von Ashish Kumar

Preis: Kostenloser Download Preis inkl. MwSt. falls zutreffend.
Verkauft von: Amazon Media EU Sarl
Sofort verfügbar
Unterstützte Sprachen: Englisch

Diese App braucht die Erlaubnis, den Zugang:

  • Netzwerk-Sockets öffnen
  • Auf Informationen über Netzwerke zugreifen
Alle Applikationsrechte
Apps & Spiele, die wirklich gratis sind
Entdecken Sie Amazon Underground mit Apps, Spielen und sogar In-App-Artikel im Wert von mehreren tausend Euro, die wirklich gratis sind. Mehr dazu

Mit Ihrer Bestellung erklären Sie Ihr Einverständnis mit unseren Nutzungsbedingungen


Produktinformation



Highlights

  • This unique free application is for all students across the world. It covers 142 topics of Network management and security in detail. These 142 topics are divided in 6 units.
  • Each topic is around 600 words and is complete with diagrams, equations and other forms of graphical representations along with simple text explaining the concept in detail.
  • This USP of this application is "ultra-portability". Students can access the content on-the-go from anywhere they like.
  • Basically, each topic is like a detailed flash card and will make the lives of students simpler and easier.
  • Some of topics Covered in this application are:
  • 1. Introduction to Network security
  • 2. Security attacks
  • 3. Active and Passive attacks
  • 4. Security Services
  • 5. Security Mechanisms
  • 6. A Model Of Inter Network Security
  • 7. Internet Standards
  • 8. Internet Standards and RFC'S
  • 9. Buffer Overflow
  • 10. Format String Vulnerability
  • 11. Session Hijacking
  • 12. UDP Session Hijacking
  • 13. Route Table Modification
  • 14. Address resolution protocol attacks
  • 15. Man-in-the-middle attack
  • 16. Conventional Encryption principles
  • 17. Cryptography
  • 18. Cryptanalysis
  • 19. Substitution Encryption Techniques
  • 20. Playfair Ciphers
  • 21. Hill Cipher
  • 22. Polyalphabetic Ciphers
  • 23. Pigpen Cipher
  • 24. Transposition techniques
  • 25. Feistel Cipher Structure
  • 26. Feistel Cipher Decryption
  • 27. Conventional Encryption Algorithms
  • 28. S-DES key generation
  • 29. S-DES Encryption
  • 30. Data Encryption Standard
  • 31. Single round of DES algorithm
  • 32. Triple Data Encryption Standard
  • 33. International Data Encryption Standard
  • 34. Blowfish Algorithm
  • 35. Blowfish Encryption Decryption
  • 36. Advanced encryption standard
  • 37. S-AES Encryption and Decryption
  • 38. S-AES key expansion
  • 39. The AES Cipher
  • 40. Substitute Bytes Transformation
  • 41. ShiftRows Transformation
  • 42. MixColumns Transformation
  • 43. AddRoundKey Transformation
  • 44. AES Key Expansion
  • 45. AES Decryption
  • 46. Cipher Block modes of Operation
  • 47. Cipher Block modes of Operation
  • 48. Cipher Block Chaining Mode
  • 49. Cipher Feed Back Mode
  • 50. Output Feedback Mode
  • 51. Counter Mode
  • 52. Message authentication
  • 53. Message Authentication Code
  • 54. Message Authentication Code Based on DES
  • 55. Hash function
  • 56. MD5 Message Digest Algorithm
  • 57. MD5 Compression Function
  • 58. Secure Hash Algorithm
  • 59. RIPEMD-160
  • 60. HMAC
  • 61. Public key Cryptography
  • 62. Attack on Public-key Cryptography
  • 63. Applications for public-key cryptosystems
  • 64. RSA algorithm
  • 65. Fermat's and Euler's theorem
  • 66. Security of RSA
  • 67. Key Management
  • 68. Public-key authority
  • 69. Public-key certificates
  • 70. Public Key Distribution of Secret Keys
  • 71. Diffie-Hellman key exchange
  • 72. Man-in-the-Middle Attack on Deffie-Hellman protocol
  • 73. Elliptic curve cryptography
  • 74. Cryptography with Elliptic Curves
  • 75. Digital Signature
  • 76. Digital Signature Standard
  • 77. Kerberos
  • 78. Kerberos Version 4 Authentication Dialogue
  • 79. Overview of Kerberos
  • 80. Kerberos Realms
  • 81. Kerberos version 5
  • 82. X.509 Authentication Service
  • 83. Authentication Procedures
  • 84. X.509 Version 3
  • 85. Pretty Good Privacy
  • 86. Pretty good privacy Operation
  • 87. Cryptographic Keys and Key Rings
  • 88. PGP Message Format
  • 89. PGP Key Rings
  • 90. PGP Message Transmission and Reception
  • 91. Public Key Management
  • 92. The Use of Trust
  • 93. Operation of Trust Processing
  • 94. PGP - Web of Trust
  • 95. S/MIME
  • 96. MIME Content Types
  • 97. MIME Transfer Encodings
  • 98. MIME canonical form
  • 99. S/MIME Functionality
  • 100. S/MIME Messages
  • 101. S/MIME Certificate Processing
  • 102. Radix-64 Conversion
  • 103. IP Security Overview
  • 104. Applications of IPSec
  • 105. Benefits of IPSec
  • 106. IP Security Architecture
  • 107. Security Associations
  • 108. IPSec Authentication Header
  • 109. Anti-Replay Service
  • 110. Integrity Check Value

Produktbeschreibung

This unique free application is for all students across the world. It covers 142 topics of Network management and security in detail. These 142 topics are divided in 6 units.

Each topic is around 600 words and is complete with diagrams, equations and other forms of graphical representations along with simple text explaining the concept in detail.

This USP of this application is "ultra-portability". Students can access the content on-the-go from anywhere they like.

Basically, each topic is like a detailed flash card and will make the lives of students simpler and easier.

Some of topics Covered in this application are:

1. Introduction to Network security
2. Security attacks
3. Active and Passive attacks
4. Security Services
5. Security Mechanisms
6. A Model Of Inter Network Security
7. Internet Standards
8. Internet Standards and RFC’S
9. Buffer Overflow
10. Format String Vulnerability
11. Session Hijacking
12. UDP Session Hijacking
13. Route Table Modification
14. Address resolution protocol attacks
15. Man-in-the-middle attack
16. Conventional Encryption principles
17. Cryptography
18. Cryptanalysis
19. Substitution Encryption Techniques
20. Playfair Ciphers
21. Hill Cipher
22. Polyalphabetic Ciphers
23. Pigpen Cipher
24. Transposition techniques
25. Feistel Cipher Structure
26. Feistel Cipher Decryption
27. Conventional Encryption Algorithms
28. S-DES key generation
29. S-DES Encryption
30. Data Encryption Standard
31. Single round of DES algorithm
32. Triple Data Encryption Standard
33. International Data Encryption Standard
34. Blowfish Algorithm
35. Blowfish Encryption Decryption
36. Advanced encryption standard
37. S-AES Encryption and Decryption
38. S-AES key expansion
39. The AES Cipher
40. Substitute Bytes Transformation
41. ShiftRows Transformation
42. MixColumns Transformation
43. AddRoundKey Transformation
44. AES Key Expansion
45. AES Decryption
46. Cipher Block modes of Operation
47. Cipher Block modes of Operation
48. Cipher Block Chaining Mode
49. Cipher Feed Back Mode
50. Output Feedback Mode
51. Counter Mode
52. Message authentication
53. Message Authentication Code
54. Message Authentication Code Based on DES
55. Hash function
56. MD5 Message Digest Algorithm
57. MD5 Compression Function
58. Secure Hash Algorithm
59. RIPEMD-160
60. HMAC
61. Public key Cryptography
62. Attack on Public-key Cryptography
63. Applications for public-key cryptosystems
64. RSA algorithm
65. Fermat's and Euler's theorem
66. Security of RSA
67. Key Management
68. Public-key authority
69. Public-key certificates
70. Public Key Distribution of Secret Keys
71. Diffie-Hellman key exchange
72. Man-in-the-Middle Attack on Deffie-Hellman protocol
73. Elliptic curve cryptography
74. Cryptography with Elliptic Curves
75. Digital Signature
76. Digital Signature Standard
77. Kerberos
78. Kerberos Version 4 Authentication Dialogue
79. Overview of Kerberos
80. Kerberos Realms
81. Kerberos version 5
82. X.509 Authentication Service
83. Authentication Procedures
84. X.509 Version 3
85. Pretty Good Privacy
86. Pretty good privacy Operation
87. Cryptographic Keys and Key Rings
88. PGP Message Format
89. PGP Key Rings
90. PGP Message Transmission and Reception
91. Public Key Management
92. The Use of Trust
93. Operation of Trust Processing
94. PGP - Web of Trust
95. S/MIME
96. MIME Content Types
97. MIME Transfer Encodings
98. MIME canonical form
99. S/MIME Functionality
100. S/MIME Messages
101. S/MIME Certificate Processing
102. Radix-64 Conversion
103. IP Security Overview
104. Applications of IPSec
105. Benefits of IPSec
106. IP Security Architecture
107. Security Associations
108. IPSec Authentication Header
109. Anti-Replay Service
110. Integrity Check Value

Technische Details

Größe: 2,1MB
Version: 1.0
Entwickelt von: Ashish Kumar ( Datenschutzrichtlinie Klicken, um das vollständige Ergebnis in einem neuen Fenster anzuzeigen )
Anwendungsberechtigungen: ( Helfen Sie mir zu verstehen, was Berechtigungen bedeuten )
  • Netzwerk-Sockets öffnen
  • Auf Informationen über Netzwerke zugreifen
  • Informationen über die aktuell oder kürzlich ausgeführten Aufgaben erhalten: eine Miniaturbild-Darstellung der Aufgaben, welche Aktivitäten darin ausgeführt werden usw.
  • Fenster mit dem Typ TYPE_SYSTEM_ALERT öffnen, der über allen anderen Anwendungen gezeigt wird
  • Auf Informationen über Wi-Fi-Netzwerke zugreifen
  • Nur-Lesen-Zugriff auf Telefonstatus
Mindestanforderungen an das Betriebssystem: Android 2.2
Geschätzte Downloadzeit: Weniger als 30 Sekunden

Kundenrezensionen

4.0 von 5 Sternen
5 Sterne
0
4 Sterne
1
3 Sterne
0
2 Sterne
0
1 Sterne
0
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel

Top-Kundenrezensionen

Verifizierter Kauf
Gut übersichtlich , ist zu gebrauchen . Noch ist mein Langzeittesten nicht abgeschlossen daher 4 Sterne . Wenn ich es eine längere Zeit getestet habe . Werden wir sehen , ob es den 1 Stern noch bekommt oder nicht
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Ähnliche Artikel finden