1.Introduction to information and network security 2.Management center of information and its physical security 3.Authentication of user 4.Security of operation system 5.Secret key encryption system 6.Advanced encryption system 7.Public key encryption system 8.Message authentication 9.Key management and certification center 10.Multimedia security 11.Security for network communication protocol 12.Network security 13.Mobile communication and wireless network security 14.Security for e-commerce 15.Security for database 16.Management of information security
|