Computer Security
(Redirected from Reverse Engineering/Other Compilers)
A Wikibookian suggests that Reverse Engineering be merged into this book or chapter. Discuss whether or not this merger should happen on the discussion page. |
A Wikibookian suggests that Basic Computer Security be merged into this book or chapter. Discuss whether or not this merger should happen on the discussion page. |
The purpose of this book is to teach all aspects of computer security to anyone interested in knowing it.
ContentsEdit
- The Basics of Computer Security
- Why is security needed?
- The OSI security architecture
- Threats
- Vulnerabilities
- The infiltrators
- How to protect yourself?
- Cryptography
- Types of encryption
- Symmetric key encryption
- Stream cipher
- Block cipher
- The Data Encryption Standard(DES)
- The Advanced Encryption Standard(AES)
- Asymmetric key encryption
- Knapsack
- RSA
- Diffie Hellman Key Exchange Algorithm
- Session key distribution
- Public key distribution
- PKI
- Hash Functions
- MD5
- SHA-1
- Tiger Hash Function
- Birthday problem
- Access Control
- Authentication
- Access Control Matrix
- Access Control List
- Security Models
- Covert channels
- Software Security
- Network Security