The Wikimedia Foundation's book rendering service has been withdrawn. Please upload your Wikipedia book to one of the external rendering services. |
You can still create and edit a book design using the Book Creator and upload it to an external rendering service:
|
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance). Edit this book: Book Creator · Wikitext Order a printed copy from: PediaPress [ About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] [ Recent Changes ] |
Cryptology and Security Fundamentals edit
from wikipedia.org - Created by Shepherd edit
- Cryptology
- Stream Cipher Algorithms
- RC4
- A5/1
- A5/2
- Block Cipher Algorithms
- Substitution–permutation network
- Feistel cipher
- Data Encryption Standard
- DES supplementary material
- Advanced Encryption Standard
- Camellia (cipher)
- Hill cipher
- Blowfish (cipher)
- Playfair cipher
- RC2
- Block cipher mode of operation
- Secure Communication and Mobile Networks
- Point-to-point (telecommunications)
- Point-to-multipoint communication
- Peer-to-peer
- Friend-to-friend
- Instant messaging
- End-to-end encryption
- Network switching subsystem
- Attack Scenes
- Second Layer Attacks
- MAC flooding
- VLAN hopping
- Spanning Tree Protocol
- MAC spoofing
- ARP spoofing