Table of Contents
Chapter 1: Internetworking and Layered Models
Chapter 2: TCP/IP Suite and Internet Stack Protocols
2.6 Network Management Service
2.10 Social Networking Services
2.13 Internet Security Threats
2.14 Computer Security Threats
Chapter 3: Global Trend of Mobile Wireless Technology
3.2 2G Mobile Radio Technology
3.3 2.5G Mobile Radio Technology
3.4 3G Mobile Radio Technology (Situation and Status of 3G)
3.5 3G UMTS Security-Related Encryption Algorithm
Chapter 4: Symmetric Block Ciphers
4.1 Data Encryption Standard (DES)
4.2 International Data Encryption Algorithm (IDEA)
Chapter 5: Hash Function, Message Digest, and Message Authentication Code
5.3 MD5 Message-Digest Algorithm
5.4 Secure Hash Algorithm (SHA-1)
5.5 Hashed Message Authentication Codes (HMAC)
Chapter 6: Asymmetric Public-Key Cryptosystems
6.1 Diffie–Hellman Exponential Key Exchange
6.2 RSA Public-Key Cryptosystem
6.3 ElGamal's Public-Key Cryptosystem
Get Wireless Mobile Internet Security, 2nd Edition now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.