Table of Contents

Title Page

Copyright

Preface

About the Author

Acknowledgments

Chapter 1: Internetworking and Layered Models

1.1 Networking Technology

1.2 Connecting Devices

1.3 The OSI Model

1.4 TCP/IP Model

Chapter 2: TCP/IP Suite and Internet Stack Protocols

2.1 Network Layer Protocols

2.2 Transport Layer Protocols

2.3 World Wide Web

2.4 File Transfer

2.5 E-Mail

2.6 Network Management Service

2.7 Converting IP Addresses

2.8 Routing Protocols

2.9 Remote System Programs

2.10 Social Networking Services

2.11 Smart IT Devices

2.12 Network Security Threats

2.13 Internet Security Threats

2.14 Computer Security Threats

Chapter 3: Global Trend of Mobile Wireless Technology

3.1 1G Cellular Technology

3.2 2G Mobile Radio Technology

3.3 2.5G Mobile Radio Technology

3.4 3G Mobile Radio Technology (Situation and Status of 3G)

3.5 3G UMTS Security-Related Encryption Algorithm

Chapter 4: Symmetric Block Ciphers

4.1 Data Encryption Standard (DES)

4.2 International Data Encryption Algorithm (IDEA)

4.3 RC5 Algorithm

4.4 RC6 Algorithm

4.5 AES (Rijndael) Algorithm

Chapter 5: Hash Function, Message Digest, and Message Authentication Code

5.1 DMDC Algorithm

5.2 Advanced DMDC Algorithm

5.3 MD5 Message-Digest Algorithm

5.4 Secure Hash Algorithm (SHA-1)

5.5 Hashed Message Authentication Codes (HMAC)

Chapter 6: Asymmetric Public-Key Cryptosystems

6.1 Diffie–Hellman Exponential Key Exchange

6.2 RSA Public-Key Cryptosystem

6.3 ElGamal's Public-Key Cryptosystem

6.4 Schnorr's Public-Key Cryptosystem

6.5 ...

Get Wireless Mobile Internet Security, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.