Table of Contents
Chapter 1: Internetworking and Layered Models
Chapter 2: TCP/IP Suite and Internet Stack Protocols
2.6 Network Management Service
2.10 Social Networking Services
2.13 Internet Security Threats
2.14 Computer Security Threats
Chapter 3: Global Trend of Mobile Wireless Technology
3.2 2G Mobile Radio Technology
3.3 2.5G Mobile Radio Technology
3.4 3G Mobile Radio Technology (Situation and Status of 3G)
3.5 3G UMTS Security-Related Encryption Algorithm
Chapter 4: Symmetric Block Ciphers
4.1 Data Encryption Standard (DES)
4.2 International Data Encryption Algorithm (IDEA)
Chapter 5: Hash Function, Message Digest, and Message Authentication Code
5.3 MD5 Message-Digest Algorithm
5.4 Secure Hash Algorithm (SHA-1)
5.5 Hashed Message Authentication Codes (HMAC)
Chapter 6: Asymmetric Public-Key Cryptosystems
6.1 Diffie–Hellman Exponential Key Exchange
6.2 RSA Public-Key Cryptosystem
6.3 ElGamal's Public-Key Cryptosystem
Get Wireless Mobile Internet Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.