Tài liệu Thư viện số
Danh mục TaiLieu.VN
Kết quả 10609-10620 trong khoảng 12937
Lab - Configuring Basic Single-Area OSPFv2
Objectives: Build the Network and Configure Basic Device Settings, Configure and Verify OSPF Routing, Change Router ID Assignments, Configure OSPF Passive Interfaces, Change OSPF Metrics.
21 p vlute 16/11/2015 376 1
Lab - Configuring Basic Single-Area OSPFv3
Objectives: Build the Network and Configure Basic Device Settings, Configure and Verify OSPFv3 Routing, Configure OSPFv3 Passive Interfaces.
10 p vlute 16/11/2015 304 1
Lab - Troubleshooting Multiarea OSPFv2 and OSPFv3
Objectives: Build the Network and Load Device Configurations, Troubleshoot Layer 3 Connectivity, Troubleshoot OSPFv2, Troubleshoot OSPFv3.
11 p vlute 16/11/2015 368 1
Lab - Configuring Multiarea OSPFv2
Objectives: Build the Network and Configure Basic Device Settings, Configure a Multiarea OSPFv2 Network, Configure Interarea Summary Routes.
10 p vlute 16/11/2015 353 1
Lab - Troubleshooting ACL Configuration and Placement
Objectives: Build the Network and Configure Basic Device Settings, Troubleshoot Internal Access, Troubleshoot Remote Access.
8 p vlute 16/11/2015 365 1
Lab - Configuring and Verifying Standard ACLs
Objectives: Set Up the Topology and Initialize Devices; Configure Devices and Verify Connectivity; Configure and Verify Standard Numbered and Named ACLs; Modify a Standard ACL.
9 p vlute 16/11/2015 328 1
Lab - Configuring and Verifying IPv6 ACLs
Objectives: Set Up the Topology and Initialize Devices, Configure Devices and Verify Connectivity, Configure and Verify IPv6 ACLs, Edit IPv6 ACLs.
9 p vlute 16/11/2015 347 1
Chapter 11: Message Integrity and Message Authentication
Objectives of Chapter 11: To define message integrity; to define message authentication; to define criteria for a cryptographic hash function; to define the Random Oracle Model and its role in evaluating the security of cryptographic hash functions; to distinguish between an MDC and a MAC; to discuss some common MACs.
7 p vlute 16/11/2015 364 1
Chapter 6: Lecture Data Encryption Standard (DES)
Objectives of Chapter 6: To review a short history of DES; to define the basic structure of DES; to describe the details of building elements of DES; to describe the round keys generation process; to analyze DES.
11 p vlute 16/11/2015 413 1
Chapter 10: Elliptic Curve Cryptography
This document includes: Introduction to Elliptic Curves, Elliptic Curve Cryptosystems (ECC), Implementation of ECC in Binary Fields.
14 p vlute 16/11/2015 460 1
Chapter 3: Traditional Symmetric-Key Ciphers
Objectives of Chapter 3: To define the terms and the concepts of symmetric key ciphers; to emphasize the two categories of traditional ciphers: substitution and transposition ciphers; to describe the categories of cryptanalysis used to break the symmetric ciphers.
12 p vlute 16/11/2015 344 1
Chapter 10: Symmetric-Key Cryptography
Objectives of Chapter 7: To distinguish between two cryptosystems; to introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; to introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography; to discuss the RSA cryptosystem.
12 p vlute 16/11/2015 333 1