Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
9.1.3.
Łączedanych.................................................................53
9.1.4.
Kanałtransmisji...............................................................53
9.1.5.
Adresowanie.................................................................54
9.1.5.1.Adresfizycznyśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś54
9.1.5.2.Koddostępuśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś54
9.1.6.
Adresurządzeniaaktywnego....................................................54
9.1.7.
Pakiety......................................................................54
9.1.8.
Korekcjabłędów..............................................................55
9.1.9.
Bezpieczeństwo...............................................................56
9.1.9.1.Autentyfikacjaśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś56
9.2.
Siecilokalneoparteostandard802.11.................................................56
9.2.1.
Elementyarchitekturyikonfiguracjesiecizgodnezestandardem802.11................57
9.2.2.
Metodadostępudołącza........................................................60
9.2.3.
Formatramki.................................................................62
9.2.4.
Zasięgiodpornośćnazakłóceniaurządzeńzgodnychzestandardem802.11.............62
9.2.5.
Bezpieczeństwoiautentyfikacja.................................................63
10.SiecioparteoprotokółWAP..................................65
10.1.ModelWAPamodelInternetu.......................................................66
10.2.ArchitekturaWAP..................................................................67
10.3.Bezprzewodoweśrodowiskoaplikacyjne(WAE)........................................68
10.4.ProtokołyWAP....................................................................68
10.5.Ograniczonemożliwościsieci........................................................70
10.6.OpisbibliotekstandardowychWMLScript.............................................71
11.Podstawowepojęciakryptografi...............................75
11.1.Kryptografiasymetryczna...........................................................77
11.2.Funkcjeskrótu....................................................................77
11.3.Kryptografiazkluczemjawnym......................................................78
12.Klasycznealgorytmykryptografczne...........................79
12.1.Steganografia.....................................................................79
12.2.Szyfrypodstawieniowe.............................................................79
12.3.Szyfryprzestawienowe.............................................................80
12.4.Szyfrjednokrotny..................................................................81
12.5.Systemkryptograficzny.............................................................82
12.6.Symetrycznealgorytmykryptograficzne...............................................83
12.6.1.AlgorytmIDEA...............................................................83
12.6.1.1.Operacjepojedynczegocykluśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś84
12.6.1.2.Operacjenapodkluczachśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś84
12.6.1.3.DeszyfrowanieIDEAśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś85
12.6.2.AlgorytmDES................................................................85
12.6.2.1.Permutacjapoczątkowaśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś86
12.6.2.2.Przekształceniakluczaśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś86
6