Table of Contents

Title Page

Copyright

Preface

About the Author

Acknowledgments

Chapter 1: Internetworking and Layered Models

1.1 Networking Technology

1.2 Connecting Devices

1.3 The OSI Model

1.4 TCP/IP Model

Chapter 2: TCP/IP Suite and Internet Stack Protocols

2.1 Network Layer Protocols

2.2 Transport Layer Protocols

2.3 World Wide Web

2.4 File Transfer

2.5 E-Mail

2.6 Network Management Service

2.7 Converting IP Addresses

2.8 Routing Protocols

2.9 Remote System Programs

2.10 Social Networking Services

2.11 Smart IT Devices

2.12 Network Security Threats

2.13 Internet Security Threats

2.14 Computer Security Threats

Chapter 3: Global Trend of Mobile Wireless Technology

3.1 1G Cellular Technology

3.2 2G Mobile Radio Technology

3.3 2.5G Mobile Radio Technology

3.4 3G Mobile Radio Technology (Situation and Status of 3G)

3.5 3G UMTS Security-Related Encryption Algorithm

Chapter 4: Symmetric Block Ciphers

4.1 Data Encryption Standard (DES)

4.2 International Data Encryption Algorithm (IDEA)

4.3 RC5 Algorithm

4.4 RC6 Algorithm

4.5 AES (Rijndael) Algorithm

Chapter 5: Hash Function, Message Digest, and Message Authentication Code

5.1 DMDC Algorithm

5.2 Advanced DMDC Algorithm

5.3 MD5 Message-Digest Algorithm

5.4 Secure Hash Algorithm (SHA-1)

5.5 Hashed Message Authentication Codes (HMAC)

Chapter 6: Asymmetric Public-Key Cryptosystems

6.1 Diffie–Hellman Exponential Key Exchange

6.2 RSA Public-Key Cryptosystem

6.3 ElGamal's Public-Key Cryptosystem

6.4 Schnorr's Public-Key Cryptosystem

6.5 ...

Get Wireless Mobile Internet Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.