Tìm kiếm tài liệu miễn phí

Trang 5 - An ninh - Bảo mật (5.223)

Ebook Ajax security: Part 1

(BQ) Part 2 book "Ajax security" has contents: Attacking client side storage, offline ajax applications, request origin issues, web mashups and aggregators, web mashups and aggregators, javascript worms, testing ajax applications, analysis of ajax frameworks.


Ebook Wavelets and subband coding: Part 1

(BQ) Part 1 book "Wavelets and subband coding" has contents: Wavelets, filter banks and multiresolution signal processing; fundamentals of signal decompositions; discrete time bases and filter banks.


Lecture Corrective action and root cause analysis

Lecture Corrective action and root cause analysis has contents: What needs corrective action, nonconforming work, complaints, proficiency test failures, equipment failure, the corrective action process, correct the immediate problem,...


Cấu trúc môđun của tập điểm có bậc hữu hạn trên đường cong elliptic và ứng dụng trong mật mã

Mục đích chính của bài báo này là mô tả cấu trúc môđun của tập hợp những điểm P nằm trên đường cong elliptic thỏa mãn điều kiện nP=O. Trong đó, P là điểm có bậc hữu hạn trên đường cong elliptic E không kỳ dị, phương trình của đường cong elliptic E được cho bởi dạng Weierstrass trên trường Zp (là số nguyên tố lớn hơn 3), O là điểm tại vô cùng.


Sinh số nguyên tố lớn dùng trong mật mã

Bài báo này mô tả phương pháp sinh ngẫu nhiên các số nguyên tố mạnh để sử dụng trong các hệ mật mã công khai và chữ ký số dựa trên RSA. Cụ thể, thuật toán Rabin-Miller và thuật toán Gordon sẽ được trình bày một cách chi tiết.


Về một hệ chữ ký số

Một hệ chữ ký số gồm 02 thành phần: Một thuật toán ký và một thuật toán xác minh chữ ký. Trong bài viết này, chúng tôi trình bày kết quả tìm hiểu và triển khai một hệ chữ ký số. Mời các bạn cùng tham khảo nội dung chi tiết.


Hạ tầng cơ sở khóa công khai

Trong giải pháp chữ ký số, hạ tầng cơ sở khóa công khai (Public Key Infrastructure – PKI) là hệ thống vừa mang tính tiêu chuẩn, vừa mang tính công nghệ cho phép người dùng trong một mạng công cộng không bảo mật (như Internet), có thể trao đổi thông tin một cách an toàn thông qua việc sử dụng một cặp khóa bí mật và công khai được chứng nhận bởi một nhà cung cấp chứng nhận số CA được tín nhiệm. Mời các bạn tham khảo nội dung chi tiết.


Hàm băm mật mã

Với mong muốn làm chủ mã nguồn, làm chủ chương trình, các tác giả đã cố gắng tìm hiểu và cài đặt hàm băm SHA-256 phục vụ cho đề tài Xây dựng hệ thống chữ ký số cho trường Đại học Thăng Long. Trong bài báo sẽ mô tả chi tiết về hàm băm này.


Lecture notes on Computer and network security: Lecture 19 - Avinash Kak

Lecture 19, proxy-server based firewalls. After studying this chapter you will be able to understand: The SOCKS protocol for anonymizing proxy servers, socksifying application clients, the dante SOCKS server, Perl and Python scripts for accessing an internet server through a SOCKS proxy, squid for controlling access to web resources (and for web caching),...


Lecture notes on Computer and network security: Lecture 23 - Avinash Kak

Lecture 23, port and vulnerability scanning, packet sniffing, intrusion detection, and penetration testing. After studying this chapter you will be able to understand: Port scanners, the nmap port scanner, vulnerability scanners, the nessus vulnerability scanner, packet sniffers, intrusion detection, the metasploit framework, the netcat utility.


Lecture notes on Computer and network security: Lecture 29 - Avinash Kak

Lecture 29 - Bots, botnets, and the DDoS attacks. In this chapter, the learning objectives are: Bots and bot masters, command and communication needs of a botnet, the IRC protocol and a command-line IRC client, freenode IRC network for open-source projects and the WeeChat IRC client, a mini bot for spewing out third-party spam, DDoS attacks and strategies for mitigating against them, some well-known bots and their exploits.


Lecture notes on Computer and network security: Lecture 30 - Avinash Kak

Lecture 30, mounting targeted attacks with trojans and social engineering - Cyber espionage. The goals of this chapter are: Can a well-engineered network be broken into? Socially engineered email lures, trojans and the gh0stRAT trojan, cyber espionage, exploiting browser vulnerabilities.


Lecture notes on Computer and network security: Lecture 7 - Avinash Kak

Lecture 7, finite fields (Part 4: Finite fields of the form GF(2n ) - Theoretical underpinnings of modern cryptography). The goals of this chapter are: To review finite fields of the form GF(2n), to show how arithmetic operations can be carried out by directly operating on the bit patterns for the elements of GF(2n), Perl and Python implementations for arithmetic in a Galois Field using my BitVector modules.


Lecture notes on Computer and network security: Lecture 9 - Avinash Kak

Lecture 9, using block and stream ciphers for secure wired and wifi communications. The goals of this chapter are: To present 2DES and its vulnerability to the meet-in-the-middle attack, to present two-key 3DES and three-key 3DES, to present the five different modes in which a block cipher can be used in practical systems for secure communications,...


Lecture notes on Computer and network security: Lecture 20 - Avinash Kak

Lecture 20: PGP, IPSec, SSL/TLS, and Tor Protocols. After studying this chapter you will be able to understand: PGP: A case study in email security, key management issues in PGP, packet-level security with IPSec, transport Layer Security with SSL/TLS, heartbeat extension to the SSL/TLS protocol, the tor protocol for anonymized routing.


Lecture notes on Computer and network security: Lecture 25 - Avinash Kak

Lecture 25, security issues in structured peer-to-peer networks. This topic will describe: What are peer-to-peer (P2P) overlay networks, distributed hash tables (DHT), the chord protocol, the pastry protocol, the kademlia protocol, the bittorrent file sharing protocol, security aspects of structured DHT-based P2P protocols.


Lecture notes on Computer and network security: Lecture 26 - Avinash Kak

Lecture 26, small-world peer-to-peer networks and their security issues. This chapter include objectives: differences between structured P2P and small-world P2P, freenet as originally envisioned by Ian Clarke, the small-world phenomenon, demonstration of the small-world phenomenon by computer simulation, decentralized routing in small-world networks,...


Lecture notes on Computer and network security: Lecture 31 - Avinash Kak

Lecture 31, filtering out spam. After studying this chapter you will be able to understand: Spam and computer security; how i read my email; the acronyms MTA, MSA, MDA, MUA, etc; structure of email messages; how spammers alter email headers; a very brief introduction to regular expressions; an overview of procmail based spam filtering; writing procmail recipes.


Lecture notes on Computer and network security: Lecture 3 - Avinash Kak

Lecture 3, block ciphers and the data encryption standard. This chapter include objectives: To introduce the notion of a block cipher in the modern context, to talk about the infeasibility of ideal block ciphers, to introduce the notion of the feistel cipher structure, to go over DES and the data encryption standard.


Lecture notes on Computer and network security: Lecture 8 - Avinash Kak

Lecture 8 - AES: The advanced encryption standard. In this chapter you will learn: Salient features of AES, the encryption key and its expansion, the overall structure of AES, the four steps in each round of processing, the substitution bytes step: subbytes and invsubbytes, the shift rows step: shiftrows and invshiftrows, the mix columns step: mixcolumns and invmixcolumns, the key expansion algorithm.


Lecture notes on Computer and network security: Lecture 11 - Avinash Kak

Lecture 11, prime numbers and discrete logarithms. The goals of this chapter are: Primality testing, fermat’s little theorem, the totient of a number, the miller-rabin probabilistic algorithm for testing for primality, python and perl implementations for the miller-rabin primality test, the AKS deterministic algorithm for testing for primality, chinese remainder theorem for modular arithmetic with large composite moduli, discrete logarithms.


Lecture notes on Computer and network security: Lecture 12 - Avinash Kak

Lecture 12, public-key cryptography and the RSA algorithm. In this chapter, the learning objectives are: To review public-key cryptography, to demonstrate that confidentiality and sender-authentication can be achieved simultaneously with public-key cryptography, to review the RSA algorithm for public-key cryptography,...


Lecture notes on Computer and network security: Lecture 14 - Avinash Kak

Lecture 14, elliptic curve cryptography and digital rights management. The goals of this chapter are: Introduction to elliptic curves, a group structure imposed on the points on an elliptic curve, geometric and algebraic interpretations of the group operator, elliptic curves on prime finite fields, Perl and Python implementations for elliptic curves on prime finite fields,...


Lecture notes on Computer and network security: Lecture 16 - Avinash Kak

Lecture 16 - TCP/IP vulnerabilities and DoS attacks: IP spoofing, SYN flooding, and the shrew DoS attack. The goals of this chapter are: To review the IP and TCP packet headers, controlling TCP traffic congestion and the shrew DoS attack, the TCP SYN flood attack for denial of service, IP source address spoofing attacks,...


Lecture notes on Computer and network security: Lecture 18 - Avinash Kak

Lecture 18, packet filtering firewalls (Linux). The goals of this chapter are: Packet-filtering vs. proxy-server firewalls; the four iptables supported by the Linux kernel: filter, nat, mangle, and raw; creating and installing new firewall rules; structure of the filter table, connection tracking and extension modules, designing your own filtering firewall.


Lecture notes on Computer and network security: Lecture 4 - Avinash Kak

Lecture 4: Finite fields (Part 1: Groups, rings, and fields theoretical underpinnings of modern cryptography). This chapter includes contents: Why study finite fields? What does it take for a set of objects to? infinite groups and abelian groups, rings, integral domain, fields.


Lecture notes on Computer and network security: Lecture 5 - Avinash Kak

Lecture 5, finite fields (Part 2: Modular arithmetic theoretical underpinnings of modern cryptography). This chapter include objectives: To review modular arithmetic, to present Euclid’s GCD algorithms, to present the prime finite field Zp, to show how Euclid’s GCD algorithm can be extended to find multiplicative inverses, Perl and Python implementations for calculating GCD and multiplicative inverses.


Lecture notes on Computer and network security: Lecture 10 - Avinash Kak

Lecture 10, key distribution for symmetric key cryptography and generating random numbers. The goals of this chapter are: Why might we need key distribution centers? Master key vs. session key, hierarchical and decentralized key distributions, generating pseudorandom numbers.


Lecture notes on Computer and network security: Lecture 15 - Avinash Kak

Lecture 15, hashing for message authentication. The goals of this chapter are: What is a hash function? Different ways to use hashing for message authentication, the one-way and collision-resistance properties of secure hash functions, the birthday paradox and the birthday attack, structure of cryptographically secure hash functions,...


Lecture notes on Computer and network security: Lecture 22 - Avinash Kak

Lecture 22 - Malware: Viruses and worms. After studying this chapter you will be able to understand: Attributes of a virus, educational examples of a virus in Perl and Python, attributes of a worm, educational examples of a worm in Perl and Python, some well-known worms of the past, the conficker and stuxnet worms, how afraid should we be of viruses and worms?


Tài liệu mới download

Từ khóa được quan tâm

Có thể bạn quan tâm

Khống chế Virus Autorun
  • 25/11/2009
  • 61.721
  • 897
Hacking Exposed ™ Web 2.0 phần 7
  • 10/11/2011
  • 36.695
  • 126
Become Hacker P2
  • 29/12/2009
  • 87.043
  • 441

Bộ sưu tập

Danh mục tài liệu