Interline Publishing +91 98867 328 23 / 24 / 25   +91 80 2333 2824 Sign Up   Sign In
Interline Publishing
Skip to Reader

Procedure video

    Subscription offer
         (Unlimited Download)
Amount Validity
र 100 6 months
र 200 1 year
Search By
SRM Information Security - Sem VI
No Units Titles Sub Titles Chapters
1 Unit 1 Computer & Information Security An Overview of Computer Security, Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies What is Information Security∞ Security Goals History, What is Information Security∞, Critical Characteristics of Information, NSTISSC Security Model, Components of an Information System, Securing the Components, Balancing Security and Access VIEW CHAPTERS
2 Unit 2 Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, Cipher Techniques Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, Hash FunctionMD5, SHA-1, Tiger Hash, Use of Hash Function Key management - Session and Interchange keys, Digital Signatures VIEW CHAPTERS
3 Unit 3 Access Control-Authentication And Authorization Authentication Methods, Passwords, Biometric, Single - sign on, Authentication Protocol, Kerberos, Access control Matrix, ACLs, Multiple level security model, Multilateral security, Covert channel, CAPTCHA VIEW CHAPTERS
4 Unit 4 Software Security Software Flaws, Buffer Overflow, Incomplete Mediation, Race conditions, Malware, Salami attack, Linearization Attacks, Trusting Software, Software reverse engineering, Digital Rights management, Operating System and Security VIEW CHAPTERS
5 Unit 5 Network Security & Physical Security Network security basics, TCP/IP Model and Port No, Protocol flaws, Design and Vulnerabilities, Reconnaissance of network, Packet sniffing, Session Hijacking, Spoofing, Web site and web server vulnerabilities, Denial of Service, SSL and IPSec protocol, Firewall Intrusion Detection System, and Honey pots, Email Security Planning, Risk Analysis, Organizational Policies, Physical Security VIEW CHAPTERS
About Us
Contact Us
Advertising Guidelines
Safe and Secure Payment
All major credit and debit cards are accepted.
Policies: Terms of Use | Privacy    Copyright © 2019 Interline Publishing. All rights reserved.