Tài liệu Thư viện số
Danh mục TaiLieu.VN
Kết quả 325-336 trong khoảng 405
Lab - Configuring Multiarea OSPFv2
Objectives: Build the Network and Configure Basic Device Settings, Configure a Multiarea OSPFv2 Network, Configure Interarea Summary Routes.
10 p vlute 16/11/2015 355 1
Lab - Troubleshooting ACL Configuration and Placement
Objectives: Build the Network and Configure Basic Device Settings, Troubleshoot Internal Access, Troubleshoot Remote Access.
8 p vlute 16/11/2015 367 1
Lab - Configuring and Verifying Standard ACLs
Objectives: Set Up the Topology and Initialize Devices; Configure Devices and Verify Connectivity; Configure and Verify Standard Numbered and Named ACLs; Modify a Standard ACL.
9 p vlute 16/11/2015 330 1
Lab - Configuring and Verifying IPv6 ACLs
Objectives: Set Up the Topology and Initialize Devices, Configure Devices and Verify Connectivity, Configure and Verify IPv6 ACLs, Edit IPv6 ACLs.
9 p vlute 16/11/2015 350 1
Chapter 11: Message Integrity and Message Authentication
Objectives of Chapter 11: To define message integrity; to define message authentication; to define criteria for a cryptographic hash function; to define the Random Oracle Model and its role in evaluating the security of cryptographic hash functions; to distinguish between an MDC and a MAC; to discuss some common MACs.
7 p vlute 16/11/2015 366 1
Chapter 6: Lecture Data Encryption Standard (DES)
Objectives of Chapter 6: To review a short history of DES; to define the basic structure of DES; to describe the details of building elements of DES; to describe the round keys generation process; to analyze DES.
11 p vlute 16/11/2015 414 1
Chapter 10: Elliptic Curve Cryptography
This document includes: Introduction to Elliptic Curves, Elliptic Curve Cryptosystems (ECC), Implementation of ECC in Binary Fields.
14 p vlute 16/11/2015 461 1
Chapter 3: Traditional Symmetric-Key Ciphers
Objectives of Chapter 3: To define the terms and the concepts of symmetric key ciphers; to emphasize the two categories of traditional ciphers: substitution and transposition ciphers; to describe the categories of cryptanalysis used to break the symmetric ciphers.
12 p vlute 16/11/2015 347 1
Chapter 10: Symmetric-Key Cryptography
Objectives of Chapter 7: To distinguish between two cryptosystems; to introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; to introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography; to discuss the RSA cryptosystem.
12 p vlute 16/11/2015 335 1
Chapter 7: Advanced Encryption Standard (AES)
Objectives of Chapter 7: To review a short history of AES; to define the basic structure of AES; to define the transformations used by AES; to define the key expansion process; to discuss different implementations.
11 p vlute 16/11/2015 316 1
Objectives of Chapter 13: To define a digital signature; to define security services provided by a digital signature; to define attacks on digital signatures; to discuss some digital signature schemes, including RSA, ElGamal, Schnorr, DSS, and elliptic curve; to describe some applications of digital signatures.
8 p vlute 16/11/2015 401 1
Chapter 14: Entity Authentication
Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.
7 p vlute 16/11/2015 468 1