Cryptography and Network Security (4th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Identification

Identification (ID) payload 2nd

Identity Protection Exchange 2nd

Indeterminate variable (x)

Infinite group

Information access threats

Information Exchange 2nd

Information security

Initialization, PKIX

Integral domain

Integrity Check Value (ICV)

Interfaces, network

International-Telecommunication Union (ITU)

Internet Architecture Board (IAB) 2nd

Internet Engineering Steering Group (IESG)

Internet Engineering Task Force (IETF) 2nd 3rd

Internet Header Length (IHL)

Internet protocol (IP)

     IPv4

     IPv6

     protocol data unit (PDU)

     role of

     security (IPSec)

Internet protocol security (IPSec)

     applications of

     architecture

     Authentication Header (AH) 2nd 3rd

     benefits of

     documents

     Encapsulating Security Payload (ESP) 2nd 3rd 4th

     key management 2nd

     overview

     protocol mode

     routing applications

     security association (SA) 2nd

     services

     transport mode 2nd 3rd 4th 5th

     tunnel mode 2nd 3rd 4th 5th

Internet resources

Internet security

Internet Security Association and Key Management Protocol (ISAKMP) 2nd

     exchanges

     fields

     header formats

     payload types

Internet standards

     applicability statement (AS)

     categories

     organizations

     process of standardization

     Request for Comment (RFC) publication 2nd

     technical specifications (TS)

Intruders 2nd [See also Intrusion detection]

     base-rate fallacy 2nd

     clandestine error

     detection

     masquerader

     misfeasor

     password management

     techniques

Intrusion detection

     audit records

     base-rate fallacy 2nd

     distributed

     exchange format

     Honeypots

     rule-based 2nd

     statistical anomaly 2nd

Inverse ciphers, equivalent

IP destination address

IPv4

IPv6

Irreducible polynomial

Issuer attributes 2nd

     alternative name

     name

     unique identifier

Iterated tunneling

Категории