encryption mode 2 mode 1 counter binary tree ssl block ciphers pai baud rate digital signature unit_1_sepm unit 1_sepm aes ivt 8051 strength linear physical terminology segments address spaces queue stack dll address translation in 80386 data structure data structures protection page level protection segment descriptors logical linear to physical address translation types of segment descriptors multitasking pte pdt paging task switching tss descriptor task state segment tss tr task register shiftrows subbytes advanced encryption standard key generation single round structure des- history feistel cipher structure idle block cipher block cipher diffie-hellman key exchange secrete key public-key certificates public-key authority publicly available directory public announcement distribution of public keys rsa example components of public key crypt public key cryptography rsa stream ciphers rail fence transposition multiple stage transposition row transposition services mechanism fundamentals general tree bt dfs single bit instrctions examples serial parallel synchronous asynchrous data transfer data framing sfrs sbuf scon pcon serial mode doubling baud rate ri ti unit 1_ sepm unit 2_sepm 8051 interfacing interrupt handler types of interrupts in 8051 isr ip ie interrupt timer interrupt port 1 port 0 port 3 port 2 ways of accessing ports bit addressability gdt ldt interrupts exceptions aborts faults traps types of interrypts real mode protected mode 80386 exception processing protecction in 80386 call gate call gate structure conforming code segment serial port programming transfer data receive data mode 1 programming mode 2 programming counter programming timer timer 0 register timer 1 register tmod tcon operating modes of timers 8051 microcontroller unit 5 interrupt in 80386 idt initial stages of attacks phishing password cracking strong password weak password guidelines to prevent password keylogger hardware keyloggers software keylogger anti keyloggers spywares virus worm dos ddos tools to launch dos tools to launch ddos pornographic offenses password sniffing identity theft credit card frauds internet time theft hacking salami attack logic bomb trojan horse industrial spying how criminals plan attack? social engineering human-based social engineering computer-based social cyberstalking types of stalkers how stalking works feature selection feature construction transformation feature selection techniques filter feature selection wrapper method embedded method curse of dimensionality dataset preparation training vs. testing dataset bias variance underfitting overfitting dataset validation techniques hold-out kfold cross validation tools to prevent dos/ ddos sql injection cyber laws indian context the indian it act-challenges challenges to indian law cybercrime scenario in india indian it act introduction to ml real life applications introduction to data types of ml supervised machine learning unsupervised machine learning semi-supervised ml reinforcement learning feature message digest algorithm md5 md5 working md5 solved example digital certificate certification authority contents of digital certificat digital certificate versions certificate types kerberos protocol working version 5 private key management guidelines key updates mechanism to protect key ipsec traversal mixcolumns addroundkey decryption gf polynomial theorem example all rounds secure hash algorithm sha sha-1 purpose sha applications sha working cryptographic hash function requirements of cryptographic applications of cryptographic two simple hash functions cyberspace cybercrime and information sec cybercriminals types legal perspective global perspective indian perspective crime types of crimes cybercrime against individuals cybercrime against property cybercrime against organizatio cybercrime against society email spoofing spamming cyberdefamation computer sabotage ah esp authentication header encapsulating security payload tunnel mode transport mode security association ike internet key exchange proocol introduction to ssl handshake protocol record layer protocol introduction to cybercrime cybercrime definitions attacks cyberterrorism leave-one-out cv
Ver más