صفحة 1 من 2 1 2 الأخيرةالأخيرة
النتائج 1 إلى 15 من 19

الموضوع: مكتبة ال crypto

  1. #1
    عضو برونزي الصورة الرمزية one-zero
    تاريخ التسجيل
    Jul 2007
    المشاركات
    8,296
    معدل تقييم المستوى
    59

    مكتبة ال crypto



    اثناء دراستك ل CCNA + Security نتعرض لدراسة عامة ليست سطحية وليست عميقة في نفس الوقت لعلم Cryptology
    اذا اردت الزيادة وفي النهاية هذا سيسهل عيك الامور في هذة الشهادة والعديد من الشهادات الاخرى ك ccsp اليك هذة المكتبة الصغيرة:

    الكتاب الاول ومن مين من مؤسسة اللي عملوها هم نفسهم اللي عملو RSA اللي بستخدمه في روترات سيسكو في حاجات كتير ابسطها SSH :
    RSA Security's Official Guide to Cryptography




    http://rapidshare.com/files/13744564..._20-_20fly.pdf


    الكتاب الثاني لسه طازة من مؤتمر تعمية كان معمول في ايطايا اول الشهر ده سبتمبر 2008 :

    Security and Cryptography for Networks




    http://rapidshare.com/files/14415749...virTuAlZin.rar


    الكتاب الثالث مبادئ وتطبيقات قرأت جزء منه و هو مكتوب بشكل انيق جدا :

    Cryptography and Network Security




    http://rapidshare.com/files/70726515...k.Security.rar

    الكناب الرابع شرح تأسيسي لكل ما تتخيل بدء من دوال الاتجاو الواحد :

    Foundations of Cryptography: A Primer




    http://rapidshare.com/files/97572112/Prime.rar

    الكتاب الخامس مش طبيعي وفي نفس الوقت من اقل الكتب في عدد صفحاته 160 صفحة فقط

    Cryptography A Very Short Introduction





    http://rapidshare.com/files/97570120...troduction.chm

    الكتاب السادس من افضل الكتب في المجال

    Decrypted Secrets: Methods and Maxims of Cryptology




    http://rapidshare.com/files/13744618...5025.27381.pdf

    الكتاب السابع موسوعة علم التعمية والتشفير

    Encyclopedia of Cryptology




    http://rapidshare.com/files/20586035...Cryptology.rar

    الكتاب الثامن يشرح هذا العلم بدون استخدام للرياضيات لتقريب المفاهيم بشكل اكبر

    Cryptology Unlocked




    http://rapidshare.com/files/78814561/Open_Cry.pdf
    [CENTER][SIZE=4]{[COLOR=red]وَإِذْ يَمْكُرُ بِكَ الَّذِينَ كَفَرُوا لِيُثْبِتُوكَ أَوْ يَقْتُلُوكَ أَوْ يُخْرِجُوكَ وَيَمْكُرُونَ وَيَمْكُرُ اللَّهُ وَاللَّهُ خَيْرُ الْمَاكِرِينَ[/COLOR]}[/SIZE][SIZE=4]…[/SIZE][SIZE=6][SIZE=4](الأنفال:30)
    [URL="http://www.facebook.com/pages/yasserauda/215036411882800"]للتواصل معي عبر الفيس بوك اضغط هنا
    [/URL][URL="http://www.youtube.com/watch?v=37LoZWjv1HE&feature=player_profilepage"][/URL][URL="http://www.facebook.com/pages/yasserauda/215036411882800"] صفحتي الخاصه على الفيس بوك
    [/URL][URL="http://www.facebook.com/pages/Mentored-Learning-New-Horizons-Dubai/234720379925819"]صفحة التعليم الارشادي على الفيس بوك
    [/URL][URL="http://www.youtube.com/user/yasserramzyauda"]قناتي على اليوتيوب
    [/URL][/SIZE][/SIZE][SIZE=3][URL="http://yasserauda.blogspot.com/"]مدونتي الخاصه[/URL][/SIZE][/CENTER]

  2. #2
    عضو برونزي الصورة الرمزية sharif_soper
    تاريخ التسجيل
    Dec 2006
    المشاركات
    2,780
    معدل تقييم المستوى
    14

    رد: مكتبة ال crypto

    السلام عليكم جزاك الله خيرا اخي مستر ياسر رمزي الف شكر ياباشا
    [B][CENTER][SIZE=5][COLOR=Navy]الحق يحتاج إلى رجلين .. رجل ينطق به ورجل يفهمه.[/COLOR][/SIZE][/CENTER]
    [/B]
    [CENTER][SIZE=4][B] [COLOR=DarkGreen]الجوع طعام الزاهدين والذكر طعام العارفين [/COLOR][/B][/SIZE][/CENTER]

  3. #3
    عضو
    تاريخ التسجيل
    Apr 2007
    المشاركات
    532
    معدل تقييم المستوى
    0

    رد: مكتبة ال crypto

    جزاك الله الف خير

    وجاري تحميل الكتب

  4. #4
    عضو الصورة الرمزية anti_world2007
    تاريخ التسجيل
    May 2008
    المشاركات
    684
    الدولة: Egypt
    معدل تقييم المستوى
    10

    رد: مكتبة ال crypto

    جميل جدا يا مستر يا سر ....بس انا حاسس اننا لازم يكون لنا فى البرمجة والرياضيات علشان ندخل المجال دة عن فهم

    Network , INFO Security , VOIP , Virtualization , Messaging
    Specialist On CISCO , Microsoft , VMware , Open Source Technology

    Visit : HotCISCOLabs.Blogspot.Com

    Contact Me On Skype : hotciscolabs
    I Like To Hear From You


  5. #5
    عضو برونزي
    تاريخ التسجيل
    Apr 2008
    المشاركات
    1,430
    معدل تقييم المستوى
    11

    رد: مكتبة ال crypto

    جزاك الله خيرا

  6. #6
    عضو برونزي الصورة الرمزية one-zero
    تاريخ التسجيل
    Jul 2007
    المشاركات
    8,296
    معدل تقييم المستوى
    59

    رد: مكتبة ال crypto

    لا علاقة بالبرمجة الا لمطوريه و الرياضيات بتاعته سهلة بس لازم تكون فاهم رياضيات حاسب الي يعني عملياتand or xor ..........الخ
    [CENTER][SIZE=4]{[COLOR=red]وَإِذْ يَمْكُرُ بِكَ الَّذِينَ كَفَرُوا لِيُثْبِتُوكَ أَوْ يَقْتُلُوكَ أَوْ يُخْرِجُوكَ وَيَمْكُرُونَ وَيَمْكُرُ اللَّهُ وَاللَّهُ خَيْرُ الْمَاكِرِينَ[/COLOR]}[/SIZE][SIZE=4]…[/SIZE][SIZE=6][SIZE=4](الأنفال:30)
    [URL="http://www.facebook.com/pages/yasserauda/215036411882800"]للتواصل معي عبر الفيس بوك اضغط هنا
    [/URL][URL="http://www.youtube.com/watch?v=37LoZWjv1HE&feature=player_profilepage"][/URL][URL="http://www.facebook.com/pages/yasserauda/215036411882800"] صفحتي الخاصه على الفيس بوك
    [/URL][URL="http://www.facebook.com/pages/Mentored-Learning-New-Horizons-Dubai/234720379925819"]صفحة التعليم الارشادي على الفيس بوك
    [/URL][URL="http://www.youtube.com/user/yasserramzyauda"]قناتي على اليوتيوب
    [/URL][/SIZE][/SIZE][SIZE=3][URL="http://yasserauda.blogspot.com/"]مدونتي الخاصه[/URL][/SIZE][/CENTER]

  7. #7
    مخالف للقوانين
    تاريخ التسجيل
    Sep 2007
    المشاركات
    4,716
    معدل تقييم المستوى
    0

    رد: مكتبة ال crypto

    merci 4 useful book

  8. #8
    عضو
    تاريخ التسجيل
    Oct 2007
    المشاركات
    479
    معدل تقييم المستوى
    0

    رد: مكتبة ال crypto

    انت نجم حقا والله يا استاذ ياسر ربنا يكرمك

  9. #9
    عضو فضي الصورة الرمزية hisham_munshar
    تاريخ التسجيل
    Nov 2006
    المشاركات
    2,595
    الدولة: Palestinian Territory
    معدل تقييم المستوى
    14

    رد: مكتبة ال crypto

    مشكور و بالتوفيق

  10. #10
    عضو فضي الصورة الرمزية محمد مندور
    تاريخ التسجيل
    Feb 2008
    المشاركات
    527
    الدولة: Egypt
    معدل تقييم المستوى
    10

    رد: مكتبة ال crypto

    بارك الله في مجهودك أخي العزيز ، وأسأل الله العظيم أن يبارك لك في وقتك وصحتك وأهلك ومالك
    إذا غـامَــرْتَ فِي شَـرَفٍ مَـرُومِ *** فَـــلا تَقنَــعْ بِـمَـا دونَ النّـجـــومِ

    فطَـعْـمُ المَـوْتِ فِي أمْـرٍ حَقِيـرٍ *** كطَعْـمِ المَـوْتِ فِي أمْـرٍ عَظيـمِ


    FB: https://www.facebook.com/Firststep2020
    [SIGPIC][/SIGPIC]

  11. #11
    عضوية جديدة
    تاريخ التسجيل
    Jul 2008
    المشاركات
    36
    معدل تقييم المستوى
    0

    رد: مكتبة ال crypto

    مشرفنا العزيز ووبو شكرا على الكتب بس عندي استفسار بسيط !! هل الكتب هذي لها علاقة ب CCNA Security ? لاني اطلعت ال Test Objective و ال Cryptology مو ماخذ حيز كبير و موجود تحت ال VPN و الشهادة في غالبها تعتمد على ال SDM ... وشكرا

  12. #12
    عضو برونزي الصورة الرمزية 7amasa7
    تاريخ التسجيل
    Dec 2007
    المشاركات
    1,304
    معدل تقييم المستوى
    0

    رد: مكتبة ال crypto

    الف اف شكر مستر ياسر

    مجموعه رائعه فعلا

    جزاك الله خيراا
    [CENTER][B][SIZE=5][COLOR=blue]لا اله الا انت سبحانك انى كنت من الظالمين[/COLOR][/SIZE][/B][/CENTER]

  13. #13
    عضو برونزي الصورة الرمزية one-zero
    تاريخ التسجيل
    Jul 2007
    المشاركات
    8,296
    معدل تقييم المستوى
    59

    رد: مكتبة ال crypto

    بالعكس اخي العزيز الموضوع هام واساسي في هذة الشهادة وباقي شهادات السكيورتي
    محتويات كتاب ال cisco press study guide ل ccna security :

    لاحظ الفصول الاخيرة بالخط البولد بتتكلم عن ايه

    Table of Contents

    Foreword

    Introduction

    Part I Network Security Concepts

    Chapter 1 Understanding Network Security Principles

    “Do I Know This Already?” Quiz

    Foundation Topics

    Exploring Security Fundamentals

    Why Network Security Is a Necessity

    Types of Threats

    Scope of the Challenge

    Nonsecured Custom Applications

    The Three Primary Goals of Network Security

    Confidentiality

    Integrity

    Availability

    Categorizing Data

    Classification Models

    Classification Roles

    Controls in a Security Solution

    Responding to a Security Incident

    Legal and Ethical Ramifications

    Legal Issues to Consider

    Understanding the Methods of Network Attacks

    Vulnerabilities

    Potential Attackers

    The Mind-set of a Hacker

    Defense in Depth

    Understanding IP Spoofing

    Launching a Remote IP Spoofing Attack with IP Source Routing

    Launching a Local IP Spoofing Attack Using a Man-in-the-Middle Attack

    Protecting Against an IP Spoofing Attack

    Understanding Confidentiality Attacks

    Understanding Integrity Attacks

    Understanding Availability Attacks

    Best-Practice Recommendations

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Chapter 2 Developing a Secure Network

    “Do I Know This Already?” Quiz

    Foundation Topics

    Increasing Operations Security

    System Development Life Cycle 49

    Initiation 49

    Acquisition and Development 49

    Implementation 50

    Operations and Maintenance 50

    Disposition 51

    Operations Security Overview 51

    Evaluating Network Security 52

    Nmap 54

    Disaster Recovery Considerations 55

    Types of Disruptions 56

    Types of Backup Sites 56

    Constructing a Comprehensive Network Security Policy 57

    Security Policy Fundamentals 57

    Security Policy Components 58

    Governing Policy 58

    Technical Policies 58

    End-User Policies 59

    More-Detailed Documents 59

    Security Policy Responsibilities 59

    Risk Analysis, Management, and Avoidance 60

    Quantitative Analysis 60

    Qualitative Analysis 61

    Risk Analysis Benefits 61

    Risk Analysis Example: Threat Identification 61

    Managing and Avoiding Risk 62

    Factors Contributing to a Secure Network Design 62

    Design Assumptions 63

    Minimizing Privileges 63

    Simplicity Versus Complexity 64

    User Awareness and Training 64

    Creating a Cisco Self-Defending Network 66

    Evolving Security Threats 66

    Constructing a Cisco Self-Defending Network 67

    Cisco Security Management Suite 69

    Cisco Integrated Security Products 70

    Exam Preparation Tasks 74

    Review All the Key Topics 74

    Complete the Tables and Lists from Memory 75

    Definition of Key Terms 75

    Chapter 3 Defending the Perimeter 77

    “Do I Know This Already?” Quiz 77

    Foundation Topics 81

    ISR Overview and Providing Secure Administrative Access 81

    IOS Security Features 81

    Cisco Integrated Services Routers 81

    Cisco 800 Series 82

    Cisco 1800 Series 83

    Cisco 2800 Series 84

    Cisco 3800 Series 84

    ISR Enhanced Features 85

    Password-Protecting a Router 86

    Limiting the Number of Failed Login Attempts 92

    Setting a Login Inactivity Timer 92

    Configuring Privilege Levels 93

    Creating Command-Line Interface Views 93

    Protecting Router Files 95

    Enabling Cisco IOS Login Enhancements for Virtual Connections 96

    Creating a Banner Message 98

    Cisco Security Device Manager Overview 99

    Introducing SDM 99

    Preparing to Launch Cisco SDM

    Exploring the Cisco SDM Interface

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Command Reference to Check Your Memory

    Chapter 4 Configuring AAA

    “Do I Know This Already?” Quiz

    Foundation Topics

    Configuring AAA Using the Local User Database

    Authentication, Authorization, and Accounting

    AAA for Cisco Routers

    Router Access Authentication

    Using AAA to Configure Local User Database Authentication

    Defining a Method List

    Setting AAA Authentication for Login

    Configuring AAA Authentication on Serial Interfaces Running PPP

    Using the aaa authentication enable default Command

    Implementing the aaa authorization Command

    Working with the aaa accounting Command

    Using the CLI to Troubleshoot AAA for Cisco Routers

    Using Cisco SDM to Configure AAA

    Configuring AAA Using Cisco Secure ACS

    Overview of Cisco Secure ACS for Windows

    Additional Features of Cisco Secure ACS 4.0 for Windows

    Cisco Secure ACS 4.0 for Windows Installation

    Overview of TACACS+ and RADIUS

    TACACS+ Authentication

    Command Authorization with TACACS+

    TACACS+ Attributes

    Authentication and Authorization with RADIUS

    RADIUS Message Types

    RADIUS Attributes

    Features of RADIUS

    Configuring TACACS+

    Using the CLI to Configure AAA Login Authentication on Cisco Routers

    Configuring Cisco Routers to Use TACACS+ Using the Cisco SDM

    Defining the AAA Servers

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Command Reference to Check Your Memory

    Chapter 5 Securing the Router

    “Do I Know This Already?” Quiz

    Foundation Topics

    Locking Down the Router

    Identifying Potentially Vulnerable Router Interfaces and Services

    Locking Down a Cisco IOS Router

    AutoSecure

    Cisco SDM One-Step Lockdown

    Using Secure Management and Reporting

    Planning for Secure Management and Reporting

    Secure Management and Reporting Architecture

    Configuring Syslog Support

    Securing Management Traffic with SNMPv3

    Enabling Secure Shell on a Router

    Using Cisco SDM to Configure Management Features

    Configuring Syslog Logging with Cisco SDM

    Configuring SNMP with Cisco SDM

    Configuring NTP with Cisco SDM

    Configuring SSH with Cisco SDM

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Command Reference to Check Your Memory

    Part II Constructing a Secure Infrastructure

    Chapter 6 Securing Layer 2 Devices

    “Do I Know This Already?” Quiz

    Foundation Topics

    Defending Against Layer 2 Attacks

    Review of Layer 2 Switch Operation

    Basic Approaches to Protecting Layer 2 Switches

    Preventing VLAN Hopping

    Switch Spoofing

    Double Tagging

    Protecting Against an STP Attack

    Combating DHCP Server Spoofing

    Using Dynamic ARP Inspection

    Mitigating CAM Table Overflow Attacks

    Spoofing MAC Addresses

    Additional Cisco Catalyst Switch Security Features

    Using the SPAN Feature with IDS

    Enforcing Security Policies with VACLs

    Isolating Traffic Within a VLAN Using Private VLANs

    Traffic Policing

    Notifying Network Managers of CAM Table Updates

    Port Security Configuration

    Configuration Recommendations

    Cisco Identity-Based Networking Services

    Introduction to Cisco IBNS

    Overview of IEEE 802.1x

    Extensible Authentication Protocols

    EAP-MD5

    EAP-TLS

    PEAP (MS-CHAPv2)

    EAP-FAST

    Combining IEEE 802.1x with Port Security Features

    Using IEEE 802.1x for VLAN Assignment

    Configuring and Monitoring IEEE 802.1x

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Command Reference to Check Your Memory

    Chapter 7 Implementing Endpoint Security

    “Do I Know This Already?” Quiz

    Foundation Topics

    Examining Endpoint Security

    Defining Endpoint Security

    Examining Operating System Vulnerabilities

    Examining Application Vulnerabilities

    Understanding the Threat of Buffer Overflows

    Buffer Overflow Defined

    The Anatomy of a Buffer Overflow Exploit

    Understanding the Types of Buffer Overflows

    Additional Forms of Attack

    Securing Endpoints with Cisco Technologies

    Understanding IronPort

    The Architecture Behind IronPort

    Examining the Cisco NAC Appliance

    Working with the Cisco Security Agent

    Understanding Cisco Security Agent Interceptors

    Examining Attack Response with the Cisco Security Agent

    Best Practices for Securing Endpoints

    Application Guidelines

    Apply Application Protection Methods

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Chapter 8 Providing SAN Security

    “Do I Know This Already?” Quiz

    Foundation Topics

    Overview of SAN Operations

    Fundamentals of SANs

    Organizational Benefits of SAN Usage

    Understanding SAN Basics

    Fundamentals of SAN Security

    Classes of SAN Attacks

    Implementing SAN Security Techniques

    Using LUN Masking to Defend Against Attacks

    Examining SAN Zoning Strategies

    Examining Soft and Hard Zoning

    Understanding World Wide Names

    Defining Virtual SANs

    Combining VSANs and Zones

    Identifying Port Authentication Protocols

    Understanding DHCHAP

    CHAP in Securing SAN Devices

    Working with Fibre Channel Authentication Protocol

    Understanding Fibre Channel Password Authentication Protocol

    Assuring Data Confidentiality in SANs

    Incorporating Encapsulating Security Payload (ESP)

    Providing Security with Fibre Channel Security Protocol

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Chapter 9 Exploring Secure Voice Solutions

    “Do I Know This Already?” Quiz

    Foundation Topics

    Defining Voice Fundamentals

    Defining VoIP

    The Need for VoIP

    VoIP Network Components

    VoIP Protocols

    Identifying Common Voice Vulnerabilities

    Attacks Targeting Endpoints

    VoIP Spam

    Vishing and Toll Fraud

    SIP Attack Targets

    Securing a VoIP Network

    Protecting a VoIP Network with Auxiliary VLANs

    Protecting a VoIP Network with Security Appliances

    Hardening Voice Endpoints and Application Servers

    Summary of Voice Attack Mitigation Techniques

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Chapter 10 Using Cisco IOS Firewalls to Defend the Network

    “Do I Know This Already?” Quiz

    Foundation Topics

    Exploring Firewall Technology

    The Role of Firewalls in Defending Networks

    The Advance of Firewall Technology

    Transparent Firewalls

    Application Layer Firewalls

    Benefits of Using Application Layer Firewalls

    Working with Application Layer Firewalls

    Application Firewall Limitations

    Static Packet-Filtering Firewalls

    Stateful Packet-Filtering Firewalls

    Stateful Packet Filtering and the State Table

    Disadvantages of Stateful Filtering

    Uses of Stateful Packet-Filtering Firewalls

    Application Inspection Firewalls

    Application Inspection Firewall Operation

    Effective Use of an Application Inspection Firewall

    Overview of the Cisco ASA Adaptive Security Appliance

    The Role of Firewalls in a Layered Defense Strategy

    Creating an Effective Firewall Policy

    Using ACLs to Construct Static Packet Filters

    The Basics of ACLs

    Cisco ACL Configuration

    Working with Turbo ACLs

    Developing ACLs

    Using the CLI to Apply ACLs to the Router Interface

    Considerations When Creating ACLs

    Filtering Traffic with ACLs

    Preventing IP Spoofing with ACLs

    Restricting ICMP Traffic with ACLs

    Configuring ACLs to Filter Router Service Traffic

    vty Filtering

    SNMP Service Filtering

    RIPv2 Route Filtering

    Grouping ACL Functions

    Implementing a Cisco IOS Zone-Based Firewall

    Understanding Cisco IOS Firewalls

    Traffic Filtering

    Traffic Inspection

    The Role of Alerts and Audit Trails

    Classic Firewall Process

    SPI and CBAC

    Examining the Principles Behind Zone-Based Firewalls

    Changes to Firewall Configuration

    Zone Membership Rules

    Understanding Security Zones

    Zones and Inspection

    Security Zone Restrictions

    Working with Zone Pairs

    Security Zone Firewall Policies

    Class Maps

    Verifying Zone-Based Firewall Configuration

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Command Reference to Check Your Memory

    Chapter 11 Using Cisco IOS IPS to Secure the Network

    “Do I Know This Already?” Quiz

    Foundation Topics

    Examining IPS Technologies

    IDS Versus IPS

    IDS and IPS Device Categories

    Detection Methods

    Network-Based Versus Host-Based IPS

    Deploying Network-Based and Host-Based Solutions

    IDS and IPS Appliances

    Cisco IDS 4215 Sensor

    Cisco IPS 4240 Sensor

    Cisco IPS 4255 Sensor

    Cisco IPS 4260 Sensor

    Signatures

    Exploit Signatures

    Connection Signatures

    String Signatures

    Denial-of-Service Signatures

    Signature Definition Files

    Alarms

    Using SDM to Configure Cisco IOS IPS

    Launching the Intrusion Prevention Wizard

    IPS Policies Wizard

    Creating IPS Rules

    Manipulating Global IPS Settings

    Signature Configuration

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Part III Extending Security and Availability with Cryptography and VPNs

    Chapter 12 Designing a Cryptographic Solution

    “Do I Know This Already?” Quiz

    Foundation Topics

    Introducing Cryptographic Services

    Understanding Cryptology

    Cryptography Through the Ages

    The Substitution Cipher

    The Vigenère Cipher

    Transposition Ciphers

    Working with the One-Time Pad

    The Encryption Process

    Cryptanalysis

    Understanding the Features of Encryption Algorithms

    Symmetric and Asymmetric Encryption Algorithms

    Encryption Algorithms and Keys

    Symmetric Encryption Algorithms

    Asymmetric Encryption Algorithms

    The Difference Between Block and Stream Ciphers

    Block Ciphers

    Stream Ciphers

    Exploring Symmetric Encryption

    Functionality of Symmetric Encryption Algorithms

    Key Lengths

    Features and Functions of DES

    Working with the DES Key

    Modes of Operation for DES

    Working with DES Stream Cipher Modes

    Usage Guidelines for Working with DES

    Understanding How 3DES Works

    Encrypting with 3DES

    AES

    The Rijndael Cipher

    Comparing AES and 3DES

    Availability of AES in the Cisco Product Line

    SEAL

    SEAL Restrictions

    The Rivest Ciphers

    Understanding Security Algorithms

    Selecting an Encryption Algorithm

    Understanding Cryptographic Hashes

    Working with Hashing

    Designing Key Management

    Components of Key Management

    Understanding Keyspaces

    Issues Related to Key Length

    SSL VPNs

    Establishing an SSL Tunnel

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Chapter 13 Implementing Digital Signatures

    “Do I Know This Already?” Quiz

    Foundation Topics

    Examining Hash Algorithms

    Exploring Hash Algorithms and HMACs

    Anatomy of a Hash Function

    Application of Hash Functions

    Cryptographic Hash Functions

    Application of Cryptographic Hashes

    HMAC Explained

    MD5 Features and Functionality

    Origins of MD5

    Vulnerabilities of MD5

    Usage of MD5

    SHA-1 Features and Functionality

    Overview of SHA-1

    Vulnerabilities of SHA-1

    Usage of SHA-1

    Using Digital Signatures

    Understanding Digital Signatures

    Digital Signature Scheme

    Authentication and Integrity

    Examining RSA Signatures

    Exploring the History of RSA

    Understanding How RSA Works

    Encrypting and Decrypting Messages with RSA

    Signing Messages with RSA

    Vulnerabilities of RSA

    Exploring the Digital Signature Standard

    Using the DSA Algorithm

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Chapter 14 Exploring PKI and Asymmetric Encryption

    “Do I Know This Already?” Quiz

    Foundation Topics

    Understanding Asymmetric Algorithms

    Exploring Asymmetric Encryption Algorithms

    Using Public-Key Encryption to Achieve Confidentiality

    Providing Authentication with a Public Key

    Understanding the Features of the RSA Algorithm

    Working with RSA Digital Signatures

    Guidelines for Working with RSA

    Examining the Features of the Diffie-Hellman Key Exchange Algorithm

    Steps of the Diffie-Hellman Key Exchange Algorithm

    Working with a PKI

    Examining the Principles Behind a PKI

    Understanding PKI Terminology

    Components of a PKI

    Classes of Certificates

    Examining the PKI Topology of a Single Root CA

    Examining the PKI Topology of Hierarchical CAs

    Examining the PKI Topology of Cross-Certified CAs

    Understanding PKI Usage and Keys

    Working with PKI Server Offload

    Understanding PKI Standards

    Understanding X.509v3

    Understanding Public Key Cryptography Standards (PKCS)

    Understanding Simple Certificate Enrollment Protocol (SCEP)

    Exploring the Role of Certificate Authorities and Registration Authorities in a PKI

    Examining Identity Management

    Retrieving the CA Certificate

    Understanding the Certificate Enrollment Process

    Examining Authentication Using Certificates

    Examining Features of Digital Certificates and CAs

    Understanding the Caveats of Using a PKI

    Understanding How Certificates Are Employed

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Chapter 15 Building a Site-to-Site IPsec VPN Solution

    “Do I Know This Already?” Quiz

    Foundation Topics

    Exploring the Basics of IPsec

    Introducing Site-to-Site VPNs

    Overview of IPsec

    IKE Modes and Phases

    Authentication Header and Encapsulating Security Payload

    Cisco VPN Product Offerings

    Cisco VPN-Enabled Routers and Switches

    Cisco VPN 3000 Series Concentrators

    Cisco ASA 5500 Series Appliances

    Cisco 500 Series PIX Security Appliances

    Hardware Acceleration Modules

    VPN Design Considerations and Recommendations

    Best-Practice Recommendations for Identity and IPsec Access Control

    Best-Practice Recommendations for IPsec

    Best-Practice Recommendations for Network Address Translation

    Best-Practice Recommendations for Selecting a Single-Purpose Versus

    Multipurpose Device

    Constructing an IPsec Site-to-Site VPN

    The Five Steps in the Life of an IPsec Site-to-Site VPN

    The Five Steps of Configuring an IPsec Site-to-Site VPN

    Configuring an IKE Phase 1 Tunnel

    Configuring an IKE Phase 2 Tunnel

    Applying Crypto Maps

    Using Cisco SDM to Configure IPsec on a Site-to-Site VPN

    Introduction to the Cisco SDM VPN Wizard

    Quick Setup

    Step-by-Step Setup

    Configuring Connection Settings

    Selecting an IKE Proposal

    Selecting a Transform Set

    Selecting Traffic to Protect in the IPsec Tunnel

    Applying the Generated Configuration

    Monitoring the Configuration

    Exam Preparation Tasks

    Review All the Key Topics

    Complete the Tables and Lists from Memory

    Definition of Key Terms

    Command Reference to Check Your Memory

    Part IV Final Preparation

    Chapter 16 Final Preparation

    Exam Engine and Questions on the CD

    Install the Software from the CD

    Activate and Download the Practice Exam

    Activating Other Exams

    Study Plan

    Recall the Facts

    Use the Exam Engine

    Choosing Study or Simulation Mode

    Passing Scores for the IINS Exam

    Part V Appendixes

    Appendix A Answers to “Do I Know This Already?” Questions

    Appendix B Glossary

    Appendix C CCNA Security Exam Updates: Version 1.0

    Appendix D Memory Tables (CD only)

    Appendix E Memory Tables Answer Key (CD only)



    1587202204 TOC 5/19/2008
    [CENTER][SIZE=4]{[COLOR=red]وَإِذْ يَمْكُرُ بِكَ الَّذِينَ كَفَرُوا لِيُثْبِتُوكَ أَوْ يَقْتُلُوكَ أَوْ يُخْرِجُوكَ وَيَمْكُرُونَ وَيَمْكُرُ اللَّهُ وَاللَّهُ خَيْرُ الْمَاكِرِينَ[/COLOR]}[/SIZE][SIZE=4]…[/SIZE][SIZE=6][SIZE=4](الأنفال:30)
    [URL="http://www.facebook.com/pages/yasserauda/215036411882800"]للتواصل معي عبر الفيس بوك اضغط هنا
    [/URL][URL="http://www.youtube.com/watch?v=37LoZWjv1HE&feature=player_profilepage"][/URL][URL="http://www.facebook.com/pages/yasserauda/215036411882800"] صفحتي الخاصه على الفيس بوك
    [/URL][URL="http://www.facebook.com/pages/Mentored-Learning-New-Horizons-Dubai/234720379925819"]صفحة التعليم الارشادي على الفيس بوك
    [/URL][URL="http://www.youtube.com/user/yasserramzyauda"]قناتي على اليوتيوب
    [/URL][/SIZE][/SIZE][SIZE=3][URL="http://yasserauda.blogspot.com/"]مدونتي الخاصه[/URL][/SIZE][/CENTER]

  14. #14
    عضو
    تاريخ التسجيل
    Feb 2008
    المشاركات
    116
    معدل تقييم المستوى
    0

    رد: مكتبة ال crypto

    اقسم باللة انت راجل معلم وبرنس

  15. #15
    عضوية جديدة
    تاريخ التسجيل
    Jul 2008
    المشاركات
    36
    معدل تقييم المستوى
    0

    رد: مكتبة ال crypto



    شكرا جدا للأيضاح و المجهود الرائع ...

صفحة 1 من 2 1 2 الأخيرةالأخيرة

المواضيع المتشابهه

  1. ممكن شرح crypto key generate rsa
    بواسطة the_way2allah في المنتدى الأرشيف
    مشاركات: 4
    آخر مشاركة: 05-08-2010, 14:31
  2. ((((مكتبة التعريفات ))))
    بواسطة العمرين في المنتدى السوفتوير العام
    مشاركات: 99
    آخر مشاركة: 25-12-2009, 22:41
  3. مكتبة صور :: PNG ::
    بواسطة smartf في المنتدى البرمجه والتصميمات الفنيه ( الجرافيكس )
    مشاركات: 13
    آخر مشاركة: 26-09-2007, 12:55
  4. مكتبة كتب كبيرة
    بواسطة hamody في المنتدى الأرشيف
    مشاركات: 19
    آخر مشاركة: 25-04-2006, 13:20
  5. مكتبة البرمجة ... حمل ما شئت
    بواسطة علي2060 في المنتدى الأرشيف
    مشاركات: 1
    آخر مشاركة: 22-12-2004, 11:35

الكلمات الدلالية لهذا الموضوع

المفضلات

ضوابط المشاركة

  • لا تستطيع إضافة مواضيع جديدة
  • لا تستطيع الرد على المواضيع
  • لا تستطيع إرفاق ملفات
  • لا تستطيع تعديل مشاركاتك
  •