Wireless mobile internet security /
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies wil...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken :
John Wiley & Sons Inc.,
2013.
|
Edición: | Second edition. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Title Page; Copyright; Contents; Preface; About the Author; Acknowledgments; Chapter 1 Internetworking and Layered Models; 1.1 Networking Technology; 1.1.1 Local Area Networks (LANs); 1.1.2 Wide Area Networks (WANs); 1.2 Connecting Devices; 1.2.1 Switches; 1.2.2 Repeaters; 1.2.3 Bridges; 1.2.4 Routers; 1.2.5 Gateways; 1.3 The OSI Model; 1.4 TCP/IP Model; 1.4.1 Network Access Layer; 1.4.2 Internet Layer; 1.4.3 Transport Layer; 1.4.4 Application Layer; Chapter 2 TCP/IP Suite and Internet Stack Protocols; 2.1 Network Layer Protocols; 2.1.1 Internet Protocol (IP).
- 2.1.2 Address Resolution Protocol (ARP)2.1.3 Reverse Address Resolution Protocol (RARP); 2.1.4 Classless Interdomain Routing (CIDR); 2.1.5 IP Version 6 (IPv6 or IPng); 2.1.6 Internet Control Message Protocol (ICMP); 2.1.7 Internet Group Management Protocol (IGMP); 2.2 Transport Layer Protocols; 2.2.1 Transmission Control Protocol (TCP); 2.2.2 User Datagram Protocol (UDP); 2.3 World Wide Web; 2.3.1 Hypertext Transfer Protocol (HTTP); 2.3.2 Hypertext Markup Language (HTML); 2.3.3 Common Gateway Interface (CGI); 2.3.4 Java; 2.4 File Transfer; 2.4.1 File Transfer Protocol (FTP).
- 2.4.2 Trivial File Transfer Protocol (TFTP)2.4.3 Network File System (NFS); 2.5 E-Mail; 2.5.1 Simple Mail Transfer Protocol (SMTP); 2.5.2 Post Office Protocol Version 3 (POP3); 2.5.3 Internet Message Access Protocol (IMAP); 2.5.4 Multipurpose Internet Mail Extension (MIME); 2.6 Network Management Service; 2.6.1 Simple Network Management Protocol (SNMP); 2.7 Converting IP Addresses; 2.7.1 Domain Name System (DNS); 2.8 Routing Protocols; 2.8.1 Routing Information Protocol (RIP); 2.8.2 Open Shortest Path First (OSPF); 2.8.3 Border Gateway Protocol (BGP); 2.9 Remote System Programs; 2.9.1 TELNET.
- 2.9.2 Remote Login (Rlogin)2.10 Social Networking Services; 2.10.1 Facebook; 2.10.2 Twitter; 2.10.3 Linkedin; 2.10.4 Groupon; 2.11 Smart IT Devices; 2.11.1 Smartphones; 2.11.2 Smart TV; 2.11.3 Video Game Console; 2.12 Network Security Threats; 2.12.1 Worm; 2.12.2 Virus; 2.12.3 DDoS; 2.13 Internet Security Threats; 2.13.1 Phishing; 2.13.2 SNS Security Threats; 2.14 Computer Security Threats; 2.14.1 Exploit; 2.14.2 Password Cracking; 2.14.3 Rootkit; 2.14.4 Trojan Horse; 2.14.5 Keylogging; 2.14.6 Spoofing Attack; 2.14.7 Packet Sniffer; 2.14.8 Session Hijacking.
- Chapter 3 Global Trend of Mobile Wireless Technology3.1 1G Cellular Technology; 3.1.1 AMPS (Advanced Mobile Phone System); 3.1.2 NMT (Nordic Mobile Telephone); 3.1.3 TACS (Total Access Communications System); 3.2 2G Mobile Radio Technology; 3.2.1 CDPD (Cellular Digital Packet Data), North American Protocol; 3.2.2 GSM (Global System for Mobile Communications); 3.2.3 TDMA-136 or IS-54; 3.2.4 iDEN (Integrated Digital Enhanced Network); 3.2.5 cdmaOne IS-95A; 3.2.6 PDC (Personal Digital Cellular); 3.2.7 i-mode; 3.2.8 WAP (Wireless Application Protocol); 3.3 2.5G Mobile Radio Technology.
- 3.3.1 ECSD (Enhanced Circuit-Switched Data).