Contents
1. Application Layer
1. Introduction
2. Domain Name System
2.1 Name Space
2.2 Domain Name Space
2.3 Distribution of Name Space
2.4 DNS in the Internet
2.5 Resolution
3. E-mail
3.1 Architecture
3.2 User Agent
3.4 Message Transfer Agent: SMTP
3.3 MIME
3.5 Message Access Agent: POP and IMAP
4. File Transfer Protocol
4.1 Communication Over Control Connection
4.2 Communication over Data Connection
4.3 Anonymous FTP
2. Multimedia
1. Introduction
2. Digitizing Audio and Video
2.1 Digitizing Audio
2.2 Digitizing Video
3. Audio and Video Compression5
3.1 Audio Compression
3.2 Video Compression
4. Streaming Stored Audio/Video
4.1 First Approach: Using a Web Server
4.2 Second Approach: Using a Web Server with a Metafile
4.3 Third Approach: Using a Media Server
4.4 Fourth Approach: Using a Media Server and RTSP
5. Streaming Live Audio/Video
6. Real-Time Interactive Audio/Video
7. Real-time Transport Protocol (RTP)
8. Real-Time Control Protocol (RTCP)
9. Voice over IP (VoIP)
9.1 Session Initiation Protocol (SIP)
3. Cryptography and Network Security
1. Introduction
2. Terminology
3. Encryption Model
4. Symmetric Key Cryptography
4.1 Traditional Ciphers
4.2 Simple Modern Ciphers
4.3 Modern Block Cipher
4.4 Modern Round Cipher
4.4 Modes of Operation
5. Asymmetric Key Cryptography
6. Security Services
6.1 Message Confidentiality
6.2 Message Integrity
6.3 Message Authentication
6.4 Digital Signature
6.5 Entity Authentication
4. Security in the Internet
1. Introduction
2. IPSecurity (IPSec)
2.1 IPSec Modes
2.2 Two Security Protocols
2.3 Services Provided by IPSec
2.4 Security Association
2.5 Internet Key Exchange (IKE)
2.6 Virtual Private Network (VPN)
3. SSL/TLS
3.1 SSL Services
3.2 Security Parameters
3.3 Sessions and Connections
3.4 Four Protocols
3.5 Transport Layer Security (TLS)
4. PGP (Pretty Good Privacy)
4.1 Security Parameters
4.2 Services
4.3 PGP Algorithms
4.4 Key Rings
4.5 PGP Certificates
5. Firewalls
5.1 Packet Filter Firewall
5.2 Proxy Firewall
Reviews
Clear filtersThere are no reviews yet.