The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and
[ Security ] Ch02.
Cryptography Algorithm Types and Modes Algorithm types and modes are two key aspect of cryptography Mechanisms that decides the process of encryptio
Asymmetric Key Cryptography Problems of Symmetric Key Cryptography Number of keys Symmetric key cryptography needs a shared secret key between two p
Public Key Infrastructure
Web is now widely used by business, government, individualsBut Internet & Web. are vulnerableHave a variety of threatsIntegrityConfidentialityDenial o
Definition: The process by which the identity of someone or something gets established.Identifies a user or a resourceEstablishes trust before commun
Ch09. Firewalls
Set-UID Programs and Environment Variables
Understanding Process with GDB GDB: GNU Project Debugger It allows you to see what is going on inside another program while it executes or what anothe
Race Condition