Interline Publishing
 info@interlinepublishing.com +91 98867 328 23 / 24 / 25   +91 80 2333 2824 Sign Up   Sign In
Interline Publishing
Skip to Reader

Procedure video

    Subscription offer
         (Unlimited Download)
Amount Validity
र 100 6 months
र 200 1 year
     
Search By
 
SRM Information Security - Sem VI
No Units Titles Sub Titles Chapters
1 Unit 1 Computer & Information Security An Overview of Computer Security, Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies What is Information Security∞ Security Goals History, What is Information Security∞, Critical Characteristics of Information, NSTISSC Security Model, Components of an Information System, Securing the Components, Balancing Security and Access VIEW CHAPTERS
2 Unit 2 Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, Cipher Techniques Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, Hash FunctionMD5, SHA-1, Tiger Hash, Use of Hash Function Key management - Session and Interchange keys, Digital Signatures VIEW CHAPTERS
3 Unit 3 Access Control-Authentication And Authorization Authentication Methods, Passwords, Biometric, Single - sign on, Authentication Protocol, Kerberos, Access control Matrix, ACLs, Multiple level security model, Multilateral security, Covert channel, CAPTCHA VIEW CHAPTERS
4 Unit 4 Software Security Software Flaws, Buffer Overflow, Incomplete Mediation, Race conditions, Malware, Salami attack, Linearization Attacks, Trusting Software, Software reverse engineering, Digital Rights management, Operating System and Security VIEW CHAPTERS
5 Unit 5 Network Security & Physical Security Network security basics, TCP/IP Model and Port No, Protocol flaws, Design and Vulnerabilities, Reconnaissance of network, Packet sniffing, Session Hijacking, Spoofing, Web site and web server vulnerabilities, Denial of Service, SSL and IPSec protocol, Firewall Intrusion Detection System, and Honey pots, Email Security Planning, Risk Analysis, Organizational Policies, Physical Security VIEW CHAPTERS
 
Home
About Us
Payments
Contact Us
Claims
Help
Advertising Guidelines
Safe and Secure Payment
All major credit and debit cards are accepted.
Policies: Terms of Use | Privacy    Copyright © 2019 Interline Publishing. All rights reserved.