´ë·®±¸¸ÅȨ >
ÄÄÇ»ÅÍ/ÀÎÅͳÝ
>
IT Àü¹®¼­
>
³×Æ®¿öÅ©
>
³×Æ®¿öÅ© ÀϹÝ

5G Network Security :In the Blockchain Internet of Things
Á¤°¡ 49,000¿ø
ÆǸŰ¡ 49,000¿ø (0% , 0¿ø)
I-Æ÷ÀÎÆ® 1,470P Àû¸³(3%)
ÆǸŻóÅ ÆǸÅÁß
ºÐ·ù ³×Æ®¿öÅ© ÀϹÝ
ÀúÀÚ Moon Seog Jun
ÃâÆÇ»ç/¹ßÇàÀÏ Áø»ù¹Ìµð¾î / 2021.10.20
ÆäÀÌÁö ¼ö 340 page
ISBN 9791191419108
»óÇ°ÄÚµå 354219022
°¡¿ëÀç°í Àç°íºÎÁ·À¸·Î ÃâÆÇ»ç ¹ßÁÖ ¿¹Á¤ÀÔ´Ï´Ù.
 
ÁÖ¹®¼ö·® :
´ë·®±¸¸Å Àü¹® ÀÎÅÍÆÄÅ© ´ë·®ÁÖ¹® ½Ã½ºÅÛÀ» ÀÌ¿ëÇÏ½Ã¸é °ßÀû¿¡¼­ºÎÅÍ ÇàÁ¤¼­·ù±îÁö Æí¸®ÇÏ°Ô ¼­ºñ½º¸¦ ¹ÞÀ¸½Ç ¼ö ÀÖ½À´Ï´Ù.
µµ¼­¸¦ °ßÀûÇÔ¿¡ ´ãÀ¸½Ã°í ½Ç½Ã°£ °ßÀûÀ» ¹ÞÀ¸½Ã¸é ±â´Ù¸®½Ç ÇÊ¿ä¾øÀÌ ÇÒÀιÞÀ¸½Ç ¼ö ÀÖ´Â °¡°ÝÀ» È®ÀÎÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.
¸ÅÁÖ ¹ß¼ÛÇØ µå¸®´Â ÀÎÅÍÆÄÅ©ÀÇ ½Å°£¾È³» Á¤º¸¸¦ ¹Þ¾Æº¸½Ã¸é »óÇ°ÀÇ ¼±Á¤À» ´õ¿í Æí¸®ÇÏ°Ô ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

 ´ë·®±¸¸ÅȨ  > ÄÄÇ»ÅÍ/ÀÎÅÍ³Ý  > IT Àü¹®¼­  > ³×Æ®¿öÅ©  > ³×Æ®¿öÅ© ÀϹÝ
 ´ë·®±¸¸ÅȨ  > ÄÄÇ»ÅÍ/ÀÎÅÍ³Ý  > IT Àü¹®¼­  > ³×Æ®¿öÅ©  > º¸¾È/ÇØÅ·

 
¸ñÂ÷
Chapter 1. Introduction in Cryptography 1.1 Ancient Cryptographic Methods 1.2 B.C. 400 Scytale Cipher 1.3 Julius Caesar Cipher 1.4 Morse Codes equivalent to Computer's Binary Code 1.5 Vigenere Cipher 1.6 Pigpen Cipher 1.7 Playfair Cipher 1.8 Modern Cryptographic Technology: Enigma Machine 1.9 3-Rail Fence Transposition in Cryptography 1.10 Columnar Transposition 1.11 Running Key Cipher 1.12 One-Time Pad (OTP) Cipher 1.13 What is the Purpose of Cryptography? 1.14 References 1.15 Exercises Chapter 2. Symmetric Cryptosystem 2.1 What is Cryptosystem? 2.2 Symmetric Key Cryptosystem 2.3 DES Algorithm 2.4 Triple DES Algorithm 2.5 AES Encryption Algorithm 2.6 Rijndael Algorithm 2.6.1 Add Round Key 2.6.2 SubByte Transformation 2.6.3 ShiftRow Transformation 2.6.4 MixColumn Multiplication 2.7 Block Cipher Operation Modes 2.7.1 ECB Mode 2.7.2 CBC Mode 2.7.3 OFB Mode 2.7.4 CFB Mode 2.7.5 CTR Mode 2.8 References 2.9 Exercises Chapter 3. Public Key and Digital Signature 3.1 Public Key Cryptography 3.2 RSA Encryption Algorithm 3.3 A Practical Credit Card for RSA Algorithm 3.4 Diffie-Hellman Key Exchange Algorithm 3.5 Digital Signature Algorithm 3.6 RSA Digital Signature Algorithm 3.7 PGP Authentication and Confidentiality 3.8 S/MIME Algorithm 3.9 Information Security Threat Characteristics 3.9.1 Confidentiality 3.9.2 Integrity 3.9.2 Availability 3.10 References 3.11 Exercises Chapter 4. Public Key Infrastructure (PKI) 4.1 Traditional Credit Card Payment 4.2 X.509 v.3 Certificate 4.3 Digital Certificate Verification 4.4 Hierarchical Public Key Infrastructure (PKI) 4.5 Certificate, CRL, and OCSP 4.6 Hybrid and Cross Certificate PKI 4.7 PKI Message Authentication 4.8 Wired vs. Wireless PKI Comparisons 4.9 QR Code Generation and Verification 4.10 Reed-Solomon Error Correction for QR Codes 4.11 References 4.12 Exercises Chapter 5. Network Layer Security (Ipsec) 5.1 What is an Ipsec? 5.2 Ipsec Protocol in Network Layer 5.3 AH Protocol 5.4 ESP Protocol 5.5 Ipsec Tunnel and Transport Mode 5.6 Internet Key Exchange (IKE) Algorithm 5.7 Virtual Private Network (VPN) 5.8 IKEv2 Ipsec Protocol in IoT 5.9 References 5.10 Exercises Chapter 6. Blockchain Security 6.1 What is a Blockchain? 6.2 What is a Merkle Tree? 6.3 Blockchain Structure in a P2P Network 6.4 Bitcoin Address and QR Code Generation 6.5 Elliptic Curve(ECC) Encryption Algorithm. 6.6 Blockchain Cryptographic Verification 6.7 Blockchain Consesus Algothm 6.8 Blockchain Internet of Things(BIoT) 6.9 References 6.10 Exercises Chapter 7. SSL/TLS Protocol 7.1 What is a SSL/TLS Protocol? 7.2 SSL/TLS Handshake Protocol 7.3 IPSec vs SSL VPN Comparison 7.4 Wireless Transport Layer Security (WTLS) 7.5 IEEE 802.11.x Wireless (Wi-Fi) Standards 7.6 Wireless LANs (WEP, WPA, and WPA2) 7.7 References 7.8 Exercises Chapter 8. Network Management Security (NMS) 8.1 Simple Network Management Protocol (SNMP) 8.2 SNMP Manager and Agents 8.3 SNMPv3 Engine and Application Programs 8.4 MIB and OID 8.4.1 VACM Algorithm for Access Control 8.4.2 What is the Difference Between SNMP Trap and Syslog? 8.5 Semantic RDF Graph Database for NMS 8.6 References 8.7 Exercises Chapter 9. Intrusion Detection System (IDS) 9.1 What is an Intrusion Detection System (IDS)? 9.2 Host-based and Network-based IDS 9.3 Misuse-based and Anomaly-based IDS 9.4 Snort Intrusion Detection System 9.5 Other Intrusion Detection System(IDS) Tools 9.5.1 Kismet IDS 9.5.2 Zeek IDS 9.5.3 Open Data Loss Prevention (DLP) IDS 9.5.4 Sagan IDS 9.5.5 Security Onion IDS 9.6 References 9.7 Exercises Chapter 10. Virus and Anti-Virus Codes 10.1 What is a Computer Virus? 10.2 Computer Worm Virus 10.3 Trojan Horse Virus 10.4 Backdoor Virus 10.5 Botnets Virus 10.6 Malware Infection Route and Symptoms 10.7 Anti-Virus Treatment System 10.8 Distributed Denial of Service (DDoS) 10.9 Advanced Persistent Threat (APT) 10.10 References 10.11 Exercises Chapter 11. Firewall Systems 11.1 What is a Firewall System? 11.2 Packet Filtering 11.3 Network Address Translation (NAT) 11.4 Application Layer Firewall 11.5 Firewall Confiration 11.5.1 Packet Filtering Firewall 11.5.2 Dual Homed Firewall 11.5.3 Screen Host Firewall 11.5.4 Screen Subnet Firewall 11.6 Packet Penetration Tools for Auditing Firewall 11.6.1 Hping3 Tool 11.6.2 Traceroute Tool 11.6.3 Nmap Tool 11.6.4 Netcat Tool 11.7 Common Criteria (CC) Assurence Levels 11.8 References 11.9 Exercises Appendix: INDEX

ÀúÀÚ
Moon Seog Jun
Ãâ°£ÇÑ ´ëÇ¥ÀÛÀ¸·Î´Â [5G Network Security :In the Blockchain Internet of Things]°¡ ÀÖ´Ù.

ÀÌ ÃâÆÇ»çÀÇ °ü·Ã»óÇ°
Â÷±ÙÂ÷±Ù µû¶óÇÏ´Â AUTODESK INVENTOR | Áø»ù¹Ìµð¾î
¼Ò¹æ À¯Ã¼¿ªÇÐ | Áø»ù¹Ìµð¾î
±âÃÊ À¯Ã¼¿ªÇÐ | Áø»ù¹Ìµð¾î
12th International Symposium on Display Holography-ISDH 2023 | À̽ÂÇö | Áø»ù¹Ìµð¾î
°æ¿µÀÇ ÇÙ½É ¼ÒºñÀÚ Á߽ɰ濵 | ±èÅ¿µ,¹éº´¼º,±èÁ¤È£,¼Õö¿Á,¿ÀÈï¿í ¿Ü | Áø»ù¹Ìµð¾î
 
µµ¼­¸¦ ±¸ÀÔÇϽŠ°í°´ ¿©·¯ºÐµéÀÇ ¼­ÆòÀÔ´Ï´Ù.
ÀÚÀ¯·Î¿î ÀÇ°ß ±³È¯ÀÌ °¡´ÉÇÕ´Ï´Ù¸¸, ¼­ÆòÀÇ ¼º°Ý¿¡ ¸ÂÁö ¾Ê´Â ±ÛÀº »èÁ¦µÉ ¼ö ÀÖ½À´Ï´Ù.

µî·ÏµÈ ¼­ÆòÁß ºÐ¾ß¿Í »ó°ü¾øÀÌ ¸ÅÁÖ ¸ñ¿äÀÏ 5ÆíÀÇ ¿ì¼öÀÛÀ» ¼±Á¤ÇÏ¿©, S-Money 3¸¸¿øÀ» Àû¸³Çص帳´Ï´Ù.
ÃÑ 0°³ÀÇ ¼­ÆòÀÌ ÀÖ½À´Ï´Ù.