NetworkSec - Fast API
NetworkSec - Fast API NetworkSec - Fast API Overview Requirements Installation Example Create it Run it Check it ...
NetworkSec - Fast API NetworkSec - Fast API Overview Requirements Installation Example Create it Run it Check it ...
Cipher code playfair Cipher 普莱费尔密码 Hill Cipher 希尔密码 Vigenere cipher 维吉尼亚密码 Caesar Cipher 凱撒密碼 Cipher code Classical encryption technique substitution...
[toc] PKI Public Key Infrastructure public key encryption’s major strength: ability to facilitate communication between parties previously unknown to each other. facilitate the se...
[toc] Digital certificates Basic Digital certificates electronic credentials Most commonly they contain a public key and the identity of the owner. used to assert the onl...
[toc] Digital Certificate type of Digital Certificate Certificate Attributes Four main types of certificates are used: End-entity certificates CA certificates Cross...
[toc] Digital Certificates Verification Trust and Certificate Verification When a user chooses to trust a CA download that CA’s digital certificate and public key, stored on he...
[toc] ref: Authority Registration authorities (RAs): assist Certificate authorities (CAs) RA help offload work from the CA. verify users’ identities prior to iss...
Trusted Computing basic 发展 信任是安全的基础 关键技术 Trusted Platform Module (TPMs) 安全芯片 verificat...
[toc] Hashing Algorithms Hashing: verify integrity with hashing. an algorithm performed on data to produce a number called a hash (checksum). Hash: conjunction with a message digest, ...
Cryptography - Symmetric Encryption strength weaknesses Symmetric Block Cipher / stream cipher Block Cipher Data Encryption Standard (DES...
Cryptography - SSL/TLS Encryption Overview SSL/TLS vs SSH Cryptography - SSL/TLS Encryption Overview SSL/TLS uses both asymmetric and symmetric encryption to pro...
Cryptography - Asymmetric Encryption major advantage disadvantage: Algorithms: pretty good privacy (PGP): Diffie-Hellman (DH) RSA (Rivest–Shamir...
Certification - CompTIA Security+ Book Sum Chapter 1 Exam Topic Review Understanding Core Security Goals Introducing Basic Risk Concepts Underst...
Index Numbers 3DES, 438 A AAA protocols, 216 ABAC (access control model), 129-130 accept (risk response), 347 acceptable use policy/rules of behavior, 475 access control models, 122-130 ABAC, 129-...
[toc] C++ C++ basic 一种中级语言, 由 Bjarne Stroustrup 于 1979 年在贝尔实验室开始设计开发的。 C++ 进一步扩充和完善了 C 语言,是一种面向对象的程序设计语言。 C++ 可运行于多种平台上,如 Windows、MAC 操作系统以及 UNIX 的各种版本。 面向对象程序设计 C++ 完全支持面向对象的程序设计...