The TCP/IP Protocols and Attacks
- Internet Architecture and IP Addresses
- Packet Sniffing and Spoofing (Chapter 15)
- ARP Protocol and ARP Cache Poisoning
- IP and ICMP Protocol and Attacks
- UDP Protocol and Attacks
- TCP Protocol and Attacks (Chapter 16)
- Firewall (Chapter 17)
- DNS and Attacks (Chapter 18)
- VPN: Virtual Private Network (Chapter 19)
Cryptography and Applications
- Secret-Key Encryption (Chapter 21)
- One-way Hash Function (Chapter 22)
- Public-Key Encryption and Digital Signature (Chapter 23)
- PKI: Public-Key Infrastructure (Chapter 24)
- TLS: Transport Layer Security (Chapter 25)
- Bitcoin and Blockchain (Chapter 26)
- Case Study: Mistakes in Using Cryptography
Security of Routing Protocols and BGP