TAILIEUCHUNG - Webmaster's Guide to the Wireless Internet part 48

Webmaster's Guide to the Wireless Internet part 48. The Webmaster’s Guide to the Wireless Internet provides the Wireless Webmaster with all of the tools necessary to build the next generation Internet. Packed with the essential information they need to design, develop, and secure robust, e-commerce enabled wireless Web sites. This book is written for advanced Webmasters who are experienced with conventional Web site design and are now faced with the challenge of creating sites that fit on the display of a Web enabled phone or PDA | 442 Chapter 10 Securing Your Wireless Web cyclic redundancy check CRC algorithm which represents the integrity of information as a number. Privacy Privacy means that information communicated between two people or computers is inscrutable to third parties. Encrypting information so that only the sender and recipient understand it ensures privacy. Public Key In public-key cryptography the sender and recipient each get two keys a private key and a public key. The public key is made accessible while the private key remains secret. The sender of a message encrypts the information using the recipient s public key but the information can only be decrypted using the recipient s private key. Secret Key In secret key cryptography the sender and recipient use the same method of encrypting and decrypting information. A shared piece of information or secret known only to a message s sender and recipient can be used to encrypt and decrypt the message. This is known as secret key or symmetric cryptography. Trojan A program that appears to be legitimate but is designed to have destructive effects on the programs and data of the computer onto which the Trojan program has been loaded. Virus A program that replicates itself by infecting other programs. Viruses are typically programmed to append their executable code to other programs resulting in their propagation. Worm A malicious program that replicates itself over a network and that typically fills all of the storage space or network capacity. Worms typically exploit a specific vulnerability such as a buffer overflow in a particular network application in order to execute their own code on remote machines. WTLS and Point-to-Point Security Models The term point-to-point security describes an approach where information is protected at each leg of the journey from a user to a Web server by the appropriate security technology for each part of the communication. As we have seen this approach has inherent weaknesses at the points where

TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
309    143    0    28-12-2024
54    153    1    28-12-2024
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.