• Lab - Configuring Multiarea OSPFv2

    Lab - Configuring Multiarea OSPFv2

    Objectives: Build the Network and Configure Basic Device Settings, Configure a Multiarea OSPFv2 Network, Configure Interarea Summary Routes.

     10 p vlute 16/11/2015 355 1

  • Lab - Troubleshooting ACL Configuration and Placement

    Lab - Troubleshooting ACL Configuration and Placement

    Objectives: Build the Network and Configure Basic Device Settings, Troubleshoot Internal Access, Troubleshoot Remote Access.

     8 p vlute 16/11/2015 367 1

  • Lab - Configuring and Verifying Standard ACLs

    Lab - Configuring and Verifying Standard ACLs

    Objectives: Set Up the Topology and Initialize Devices; Configure Devices and Verify Connectivity; Configure and Verify Standard Numbered and Named ACLs; Modify a Standard ACL.

     9 p vlute 16/11/2015 330 1

  • Lab - Configuring and Verifying IPv6 ACLs

    Lab - Configuring and Verifying IPv6 ACLs

    Objectives: Set Up the Topology and Initialize Devices, Configure Devices and Verify Connectivity, Configure and Verify IPv6 ACLs, Edit IPv6 ACLs.

     9 p vlute 16/11/2015 350 1

  • Chapter 11: Message Integrity and Message Authentication

    Chapter 11: Message Integrity and Message Authentication

    Objectives of Chapter 11: To define message integrity; to define message authentication; to define criteria for a cryptographic hash function; to define the Random Oracle Model and its role in evaluating the security of cryptographic hash functions; to distinguish between an MDC and a MAC; to discuss some common MACs.

     7 p vlute 16/11/2015 366 1

  • Chapter 6: Lecture Data Encryption Standard (DES)

    Chapter 6: Lecture Data Encryption Standard (DES)

    Objectives of Chapter 6: To review a short history of DES; to define the basic structure of DES; to describe the details of building elements of DES; to describe the round keys generation process; to analyze DES.

     11 p vlute 16/11/2015 414 1

  • Chapter 10: Elliptic Curve Cryptography

    Chapter 10: Elliptic Curve Cryptography

    This document includes: Introduction to Elliptic Curves, Elliptic Curve Cryptosystems (ECC), Implementation of ECC in Binary Fields.

     14 p vlute 16/11/2015 461 1

  • Chapter 3: Traditional Symmetric-Key Ciphers

    Chapter 3: Traditional Symmetric-Key Ciphers

    Objectives of Chapter 3: To define the terms and the concepts of symmetric key ciphers; to emphasize the two categories of traditional ciphers: substitution and transposition ciphers; to describe the categories of cryptanalysis used to break the symmetric ciphers.

     12 p vlute 16/11/2015 347 1

  • Chapter 10: Symmetric-Key Cryptography

    Chapter 10: Symmetric-Key Cryptography

    Objectives of Chapter 7: To distinguish between two cryptosystems; to introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; to introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography; to discuss the RSA cryptosystem.

     12 p vlute 16/11/2015 335 1

  • Chapter 7: Advanced Encryption Standard (AES)

    Chapter 7: Advanced Encryption Standard (AES)

    Objectives of Chapter 7: To review a short history of AES; to define the basic structure of AES; to define the transformations used by AES; to define the key expansion process; to discuss different implementations.

     11 p vlute 16/11/2015 316 1

  • Chapter 13: Digital Signature

    Chapter 13: Digital Signature

    Objectives of Chapter 13: To define a digital signature; to define security services provided by a digital signature; to define attacks on digital signatures; to discuss some digital signature schemes, including RSA, ElGamal, Schnorr, DSS, and elliptic curve; to describe some applications of digital signatures.

     8 p vlute 16/11/2015 401 1

  • Chapter 14: Entity Authentication

    Chapter 14: Entity Authentication

    Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.

     7 p vlute 16/11/2015 468 1

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=vlute