ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب TCP/IP Illustrated

دانلود کتاب TCP/IP مصور

TCP/IP Illustrated

مشخصات کتاب

TCP/IP Illustrated

ویرایش: [Volume 1. The Protocols, 2 ed.] 
نویسندگان: ,   
سری: Addison-Wesley Professional Computing series 
 
ناشر: Addison-Wesley 
سال نشر: 2012 
تعداد صفحات: [1059] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 20 Mb 

قیمت کتاب (تومان) : 45,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب TCP/IP Illustrated به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب TCP/IP مصور نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Contents
Foreword
Preface to the Second Edition
Adapted Preface to the First Edition
Chapter 1 Introduction
	1.1 Architectural Principles
		1.1.1 Packets, Connections, and Datagrams
		1.1.2 The End-to-End Argument and Fate Sharing
		1.1.3 Error Control and Flow Control
	1.2 Design and Implementation
		1.2.1 Layering
		1.2.2 Multiplexing, Demultiplexing, and Encapsulation in Layered Implementations
	1.3 The Architecture and Protocols of the TCP/IP Suite
		1.3.1 The ARPANET Reference Model
		1.3.2 Multiplexing, Demultiplexing, and Encapsulation in TCP/IP
		1.3.3 Port Numbers
		1.3.4 Names, Addresses, and the DNS
	1.4 Internets, Intranets, and Extranets
	1.5 Designing Applications
		1.5.1 Client/Server
		1.5.2 Peer-to-Peer
		1.5.3 Application Programming Interfaces (APIs)
	1.6 Standardization Process
		1.6.1 Request for Comments (RFC)
		1.6.2 Other Standards
	1.7 Implementations and Software Distributions
	1.8 Attacks Involving the Internet Architecture
	1.9 Summary
	1.10 References
Chapter 2 The Internet Address Architecture
	2.1 Introduction
	2.2 Expressing IP Addresses
	2.3 Basic IP Address Structure
		2.3.1 Classful Addressing
		2.3.2 Subnet Addressing
		2.3.3 Subnet Masks
		2.3.4 Variable-Length Subnet Masks (VLSM)
		2.3.5 Broadcast Addresses
		2.3.6 IPv6 Addresses and Interface Identifiers
	2.4 CIDR and Aggregation
		2.4.1 Prefixes
		2.4.2 Aggregation
	2.5 Special-Use Addresses
		2.5.1 Addressing IPv4/IPv6 Translators
		2.5.2 Multicast Addresses
		2.5.3 IPv4 Multicast Addresses
		2.5.4 IPv6 Multicast Addresses
		2.5.5 Anycast Addresses
	2.6 Allocation
		2.6.1 Unicast
		2.6.2 Multicast
	2.7 Unicast Address Assignment
		2.7.1 Single Provider/No Network/Single Address
		2.7.2 Single Provider/Single Network/Single Address
		2.7.3 Single Provider/Multiple Networks/Multiple Addresses
		2.7.4 Multiple Providers/Multiple Networks/Multiple Addresses (Multihoming)
	2.8 Attacks Involving IP Addresses
	2.9 Summary
	2.10 References
Chapter 3 Link Layer
	3.1 Introduction
	3.2 Ethernet and the IEEE 802 LAN/MAN Standards
		3.2.1 The IEEE 802 LAN/MAN Standards
		3.2.2 The Ethernet Frame Format
		3.2.3 802.1p/q: Virtual LANs and QoS Tagging
		3.2.4 802.1AX: Link Aggregation (Formerly 802.3ad)
	3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control
		3.3.1 Duplex Mismatch
		3.3.2 Wake-on LAN (WoL), Power Saving, and Magic Packets
		3.3.3 Link-Layer Flow Control
	3.4 Bridges and Switches
		3.4.1 Spanning Tree Protocol (STP)
		3.4.2 802.1ak: Multiple Registration Protocol (MRP)
	3.5 Wireless LANs—IEEE 802.11(Wi-Fi)
		3.5.1 802.11 Frames
		3.5.2 Power Save Mode and the Time Sync Function (TSF)
		3.5.3 802.11 Media Access Control
		3.5.4 Physical-Layer Details: Rates, Channels, and Frequencies
		3.5.5 Wi-Fi Security
		3.5.6 Wi-Fi Mesh (802.11s)
	3.6 Point-to-Point Protocol (PPP)
		3.6.1 Link Control Protocol (LCP)
		3.6.2 Multilink PPP (MP)
		3.6.3 Compression Control Protocol (CCP)
		3.6.4 PPP Authentication
		3.6.5 Network Control Protocols (NCPs)
		3.6.6 Header Compression
		3.6.7 Example
	3.7 Loopback
	3.8 MTU and Path MTU
	3.9 Tunneling Basics
		3.9.1 Unidirectional Links
	3.10 Attacks on the Link Layer
	3.11 Summary
	3.12 References
Chapter 4 ARP: Address Resolution Protocol
	4.1 Introduction
	4.2 An Example
		4.2.1 Direct Delivery and ARP
	4.3 ARP Cache
	4.4 ARP Frame Format
	4.5 ARP Examples
		4.5.1 Normal Example
		4.5.2 ARP Request to a Nonexistent Host
	4.6 ARP Cache Timeout
	4.7 Proxy ARP
	4.8 Gratuitous ARP and Address Conflict Detection (ACD)
	4.9 The arp Command
	4.10 Using ARP to Set an Embedded Device’s IPv4 Address
	4.11 Attacks Involving ARP
	4.12 Summary
	4.13 References
Chapter 5 The Internet Protocol (IP)
	5.1 Introduction
	5.2 IPv4 and IPv6 Headers
		5.2.1 IP Header Fields
		5.2.2 The Internet Checksum
		5.2.3 DS Field and ECN (Formerly Called the ToS Byte or IPv6 Traffic Class)
		5.2.4 IP Options
	5.3 IPv6 Extension Headers
		5.3.1 IPv6 Options
		5.3.2 Routing Header
		5.3.3 Fragment Header
	5.4 IP Forwarding
		5.4.1 Forwarding Table
		5.4.2 IP Forwarding Actions
		5.4.3 Examples
		5.4.4 Discussion
	5.5 Mobile IP
		5.5.1 The Basic Model: Bidirectional Tunneling
		5.5.2 Route Optimization (RO)
		5.5.3 Discussion
	5.6 Host Processing of IP Datagrams
		5.6.1 Host Models
		5.6.2 Address Selection
	5.7 Attacks Involving IP
	5.8 Summary
	5.9 References
Chapter 6 System Configuration: DHCP and Autoconfiguration
	6.1 Introduction
	6.2 Dynamic Host Configuration Protocol (DHCP)
		6.2.1 Address Pools and Leases
		6.2.2 DHCP and BOOTP Message Format
		6.2.3 DHCP and BOOTP Options
		6.2.4 DHCP Protocol Operation
		6.2.5 DHCPv6
		6.2.6 Using DHCP with Relays
		6.2.7 DHCP Authentication
		6.2.8 Reconfigure Extension
		6.2.9 Rapid Commit
		6.2.10 Location Information (LCI and LoST)
		6.2.11 Mobility and Handoff Information (MoS and ANDSF)
		6.2.12 DHCP Snooping
	6.3 Stateless Address Autoconfiguration (SLAAC)
		6.3.1 Dynamic Configuration of IPv4 Link-Local Addresses
		6.3.2 IPv6 SLAAC for Link-Local Addresses
	6.4 DHCP and DNS Interaction
	6.5 PPP over Ethernet (PPPoE)
	6.6 Attacks Involving System Configuration
	6.7 Summary
	6.8 References
Chapter 7 Firewalls and Network Address Translation (NAT)
	7.1 Introduction
	7.2 Firewalls
		7.2.1 Packet-Filtering Firewalls
		7.2.2 Proxy Firewalls
	7.3 Network Address Translation (NAT)
		7.3.1 Traditional NAT: Basic NAT and NAPT
		7.3.2 Address and Port Translation Behavior
		7.3.3 Filtering Behavior
		7.3.4 Servers behind NATs
		7.3.5 Hairpinning and NAT Loopback
		7.3.6 NAT Editors
		7.3.7 Service Provider NAT (SPNAT) and Service Provider IPv6 Transition
	7.4 NAT Traversal
		7.4.1 Pinholes and Hole Punching
		7.4.2 UNilateral Self-Address Fixing (UNSAF)
		7.4.3 Session Traversal Utilities for NAT (STUN)
		7.4.4 Traversal Using Relays around NAT (TURN)
		7.4.5 Interactive Connectivity Establishment (ICE)
	7.5 Configuring Packet-Filtering Firewalls and NATs
		7.5.1 Firewall Rules
		7.5.2 NAT Rules
		7.5.3 Direct Interaction with NATs and Firewalls: UPnP, NAT-PMP, and PCP
	7.6 NAT for IPv4/IPv6 Coexistence and Transition
		7.6.1 Dual-Stack Lite (DS-Lite)
		7.6.2 IPv4/IPv6 Translation Using NATs and ALGs
	7.7 Attacks Involving Firewalls and NATs
	7.8 Summary
	7.9 References
Chapter 8 ICMPv4 and ICMPv6: Internet Control Message Protocol
	8.1 Introduction
		8.1.1 Encapsulation in IPv4 and IPv6
	8.2 ICMP Messages
		8.2.1 ICMPv4 Messages
		8.2.2 ICMPv6 Messages
		8.2.3 Processing of ICMP Messages
	8.3 ICMP Error Messages
		8.3.1 Extended ICMP and Multipart Messages
		8.3.2 Destination Unreachable (ICMPv4 Type 3, ICMPv6 Type 1) and Packet Too Big (ICMPv6 Type 2)
		8.3.3 Redirect (ICMPv4 Type 5, ICMPv6 Type 137)
		8.3.4 ICMP Time Exceeded (ICMPv4 Type 11, ICMPv6 Type 3)
		8.3.5 Parameter Problem (ICMPv4 Type 12, ICMPv6 Type 4)
	8.4 ICMP Query/Informational Messages
		8.4.1 Echo Request/Reply (ping) (ICMPv4 Types 0/8, ICMPv6 Types 129/128)
		8.4.2 Router Discovery: Router Solicitation and Advertisement (ICMPv4 Types 9, 10)
		8.4.3 Home Agent Address Discovery Request/Reply (ICMPv6 Types 144/145)
		8.4.4 Mobile Prefix Solicitation/Advertisement (ICMPv6 Types 146/147)
		8.4.5 Mobile IPv6 Fast Handover Messages (ICMPv6 Type 154)
		8.4.6 Multicast Listener Query/Report/Done (ICMPv6 Types 130/131/132)
		8.4.7 Version 2 Multicast Listener Discovery (MLDv2) (ICMPv6 Type 143)
		8.4.8 Multicast Router Discovery (MRD) (IGMP Types 48/49/50, ICMPv6 Types 151/152/153)
	8.5 Neighbor Discovery in IPv6
		8.5.1 ICMPv6 Router Solicitation and Advertisement (ICMPv6 Types 133, 134)
		8.5.2 ICMPv6 Neighbor Solicitation and Advertisement (IMCPv6 Types 135, 136)
		8.5.3 ICMPv6 Inverse Neighbor Discovery Solicitation/Advertisement (ICMPv6 Types 141/142)
		8.5.4 Neighbor Unreachability Detection (NUD)
		8.5.5 Secure Neighbor Discovery (SEND)
		8.5.6 ICMPv6 Neighbor Discovery (ND) Options
	8.6 Translating ICMPv4 and ICMPv6
		8.6.1 Translating ICMPv4 to ICMPv6
		8.6.2 Translating ICMPv6 to ICMPv4
	8.7 Attacks Involving ICMP
	8.8 Summary
	8.9 References
Chapter 9 Broadcasting and Local Multicasting (IGMP and MLD)
	9.1 Introduction
	9.2 Broadcasting
		9.2.1 Using Broadcast Addresses
		9.2.2 Sending Broadcast Datagrams
	9.3 Multicasting
		9.3.1 Converting IP Multicast Addresses to 802 MAC/Ethernet Addresses
		9.3.2 Examples
		9.3.3 Sending Multicast Datagrams
		9.3.4 Receiving Multicast Datagrams
		9.3.5 Host Address Filtering
	9.4 The Internet Group Management Protocol (IGMP) and Multicast Listener Discovery Protocol (MLD)
		9.4.1 IGMP and MLD Processing by Group Members (“Group Member Part”)
		9.4.2 IGMP and MLD Processing by Multicast Routers (“Multicast Router Part”)
		9.4.3 Examples
		9.4.4 Lightweight IGMPv3 and MLDv2
		9.4.5 IGMP and MLD Robustness
		9.4.6 IGMP and MLD Counters and Variables
		9.4.7 IGMP and MLD Snooping
	9.5 Attacks Involving IGMP and MLD
	9.6 Summary
	9.7 References
Chapter 10 User Datagram Protocol (UDP) and IP Fragmentation
	10.1 Introduction
	10.2 UDP Header
	10.3 UDP Checksum
	10.4 Examples
	10.5 UDP and IPv6
		10.5.1 Teredo: Tunneling IPv6 through IPv4 Networks
	10.6 UDP-Lite
	10.7 IP Fragmentation
		10.7.1 Example: UDP/IPv4 Fragmentation
		10.7.2 Reassembly Timeout
	10.8 Path MTU Discovery with UDP
		10.8.1 Example
	10.9 Interaction between IP Fragmentation and ARP/ND
	10.10 Maximum UDP Datagram Size
		10.10.1 Implementation Limitations
		10.10.2 Datagram Truncation
	10.11 UDP Server Design
		10.11.1 IP Addresses and UDP Port Numbers
		10.11.2 Restricting Local IP Addresses
		10.11.3 Using Multiple Addresses
		10.11.4 Restricting Foreign IP Address
		10.11.5 Using Multiple Servers per Port
		10.11.6 Spanning Address Families: IPv4 and IPv6
		10.11.7 Lack of Flow and Congestion Control
	10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams
	10.13 UDP in the Internet
	10.14 Attacks Involving UDP and IP Fragmentation
	10.15 Summary
	10.16 References
Chapter 11 Name Resolution and the Domain Name System (DNS)
	11.1 Introduction
	11.2 The DNS Name Space
		11.2.1 DNS Naming Syntax
	11.3 Name Servers and Zones
	11.4 Caching
	11.5 The DNS Protocol
		11.5.1 DNS Message Format
		11.5.2 The DNS Extension Format (EDNS0)
		11.5.3 UDP or TCP
		11.5.4 Question (Query) and Zone Section Format
		11.5.5 Answer, Authority, and Additional Information Section Formats
		11.5.6 Resource Record Types
		11.5.7 Dynamic Updates (DNS UPDATE)
		11.5.8 Zone Transfers and DNS NOTIFY
	11.6 Sort Lists, Round-Robin, and Split DNS
	11.7 Open DNS Servers and DynDNS
	11.8 Transparency and Extensibility
	11.9 Translating DNS from IPv4 to IPv6 (DNS64)
	11.10 LLMNR and mDNS
	11.11 LDAP
	11.12 Attacks on the DNS
	11.13 Summary
	11.14 References
Chapter 12 TCP: The Transmission Control Protocol (Preliminaries)
	12.1 Introduction
		12.1.1 ARQ and Retransmission
		12.1.2 Windows of Packets and Sliding Windows
		12.1.3 Variable Windows: Flow Control and Congestion Control
		12.1.4 Setting the Retransmission Timeout
	12.2 Introduction to TCP
		12.2.1 The TCP Service Model
		12.2.2 Reliability in TCP
	12.3 TCP Header and Encapsulation
	12.4 Summary
	12.5 References
Chapter 13 TCP Connection Management
	13.1 Introduction
	13.2 TCP Connection Establishment and Termination
		13.2.1 TCP Half-Close
		13.2.2 Simultaneous Open and Close
		13.2.3 Initial Sequence Number (ISN)
		13.2.4 Example
		13.2.5 Timeout of Connection Establishment
		13.2.6 Connections and Translators
	13.3 TCP Options
		13.3.1 Maximum Segment Size (MSS) Option
		13.3.2 Selective Acknowledgment (SACK) Options
		13.3.3 Window Scale (WSCALE or WSOPT) Option
		13.3.4 Timestamps Option and Protection against Wrapped Sequence Numbers (PAWS)
		13.3.5 User Timeout (UTO) Option
		13.3.6 Authentication Option (TCP-AO)
	13.4 Path MTU Discovery with TCP
		13.4.1 Example
	13.5 TCP State Transitions
		13.5.1 TCP State Transition Diagram
		13.5.2 TIME_WAIT (2MSL Wait) State
		13.5.3 Quiet Time Concept
		13.5.4 FIN_WAIT_2 State
		13.5.5 Simultaneous Open and Close Transitions
	13.6 Reset Segments
		13.6.1 Connection Request to Nonexistent Port
		13.6.2 Aborting a Connection
		13.6.3 Half-Open Connections
		13.6.4 TIME-WAIT Assassination (TWA)
	13.7 TCP Server Operation
		13.7.1 TCP Port Numbers
		13.7.2 Restricting Local IP Addresses
		13.7.3 Restricting Foreign Endpoints
		13.7.4 Incoming Connection Queue
	13.8 Attacks Involving TCP Connection Management
	13.9 Summary
	13.10 References
Chapter 14 TCP Timeout and Retransmission
	14.1 Introduction
	14.2 Simple Timeout and Retransmission Example
	14.3 Setting the Retransmission Timeout (RTO)
		14.3.1 The Classic Method
		14.3.2 The Standard Method
		14.3.3 The Linux Method
		14.3.4 RTT Estimator Behaviors
		14.3.5 RTTM Robustness to Loss and Reordering
	14.4 Timer-Based Retransmission
		14.4.1 Example
	14.5 Fast Retransmit
		14.5.1 Example
	14.6 Retransmission with Selective Acknowledgments
		14.6.1 SACK Receiver Behavior
		14.6.2 SACK Sender Behavior
		14.6.3 Example
	14.7 Spurious Timeouts and Retransmissions
		14.7.1 Duplicate SACK (DSACK) Extension
		14.7.2 The Eifel Detection Algorithm
		14.7.3 Forward-RTO Recovery (F-RTO)
		14.7.4 The Eifel Response Algorithm
	14.8 Packet Reordering and Duplication
		14.8.1 Reordering
		14.8.2 Duplication
	14.9 Destination Metrics
	14.10 Repacketization
	14.11 Attacks Involving TCP Retransmission
	14.12 Summary
	14.13 References
Chapter 15 TCP Data Flow and Window Management
	15.1 Introduction
	15.2 Interactive Communication
	15.3 Delayed Acknowledgments
	15.4 Nagle Algorithm
		15.4.1 Delayed ACK and Nagle Algorithm Interaction
		15.4.2 Disabling the Nagle Algorithm
	15.5 Flow Control and Window Management
		15.5.1 Sliding Windows
		15.5.2 Zero Windows and the TCP Persist Timer
		15.5.3 Silly Window Syndrome (SWS)
		15.5.4 Large Buffers and Auto-Tuning
	15.6 Urgent Mechanism
		15.6.1 Example
	15.7 Attacks Involving Window Management
	15.8 Summary
	15.9 References
Chapter 16 TCP Congestion Control
	16.1 Introduction
		16.1.1 Detection of Congestion in TCP
		16.1.2 Slowing Down a TCP Sender
	16.2 The Classic Algorithms
		16.2.1 Slow Start
		16.2.2 Congestion Avoidance
		16.2.3 Selecting between Slow Start and Congestion Avoidance
		16.2.4 Tahoe, Reno, and Fast Recovery
		16.2.5 Standard TCP
	16.3 Evolution of the Standard Algorithms
		16.3.1 NewReno
		16.3.2 TCP Congestion Control with SACK
		16.3.3 Forward Acknowledgment (FACK) and Rate Halving
		16.3.4 Limited Transmit
		16.3.5 Congestion Window Validation (CWV)
	16.4 Handling Spurious RTOs—the Eifel Response Algorithm
	16.5 An Extended Example
		16.5.1 Slow Start Behavior
		16.5.2 Sender Pause and Local Congestion (Event 1)
		16.5.3 Stretch ACKs and Recovery from Local Congestion
		16.5.4 Fast Retransmission and SACK Recovery (Event 2)
		16.5.5 Additional Local Congestion and Fast Retransmit Events
		16.5.6 Timeouts, Retransmissions, and Undoing cwnd Changes
		16.5.7 Connection Completion
	16.6 Sharing Congestion State
	16.7 TCP Friendliness
	16.8 TCP in High-Speed Environments
		16.8.1 HighSpeed TCP (HSTCP) and Limited Slow Start
		16.8.2 Binary Increase Congestion Control (BIC and CUBIC)
	16.9 Delay-Based Congestion Control
		16.9.1 Vegas
		16.9.2 FAST
		16.9.3 TCP Westwood and Westwood+
		16.9.4 Compound TCP
	16.10 Buffer Bloat
	16.11 Active Queue Management and ECN
	16.12 Attacks Involving TCP Congestion Control
	16.13 Summary
	16.14 References
Chapter 17 TCP Keepalive
	17.1 Introduction
	17.2 Description
		17.2.1 Keepalive Examples
	17.3 Attacks Involving TCP Keepalives
	17.4 Summary
	17.5 References
Chapter 18 Security: EAP, IPsec, TLS, DNSSEC, and DKIM
	18.1 Introduction
	18.2 Basic Principles of Information Security
	18.3 Threats to Network Communication
	18.4 Basic Cryptography and Security Mechanisms
		18.4.1 Cryptosystems
		18.4.2 Rivest, Shamir, and Adleman (RSA) Public Key Cryptography
		18.4.3 Diffie-Hellman-Merkle Key Agreement (aka Diffie-Hellman or DH)
		18.4.4 Signcryption and Elliptic Curve Cryptography (ECC)
		18.4.5 Key Derivation and Perfect Forward Secrecy (PFS)
		18.4.6 Pseudorandom Numbers, Generators, and Function Families
		18.4.7 Nonces and Salt
		18.4.8 Cryptographic Hash Functions and Message Digests
		18.4.9 Message Authentication Codes (MACs, HMAC, CMAC, and GMAC)
		18.4.10 Cryptographic Suites and Cipher Suites
	18.5 Certificates, Certificate Authorities (CAs), and PKIs
		18.5.1 Public Key Certificates, Certificate Authorities, and X.509
		18.5.2 Validating and Revoking Certificates
		18.5.3 Attribute Certificates
	18.6 TCP/IP Security Protocols and Layering
	18.7 Network Access Control: 802.1X, 802.1AE, EAP, and PANA
		18.7.1 EAP Methods and Key Derivation
		18.7.2 The EAP Re-authentication Protocol (ERP)
		18.7.3 Protocol for Carrying Authentication for Network Access (PANA)
	18.8 Layer 3 IP Security (IPsec)
		18.8.1 Internet Key Exchange (IKEv2) Protocol
		18.8.2 Authentication Header (AH)
		18.8.3 Encapsulating Security Payload (ESP)
		18.8.4 Multicast
		18.8.5 L2TP/IPsec
		18.8.6 IPsec NAT Traversal
		18.8.7 Example
	18.9 Transport Layer Security (TLS and DTLS)
		18.9.1 TLS 1.2
		18.9.2 TLS with Datagrams (DTLS)
	18.10 DNS Security (DNSSEC)
		18.10.1 DNSSEC Resource Records
		18.10.2 DNSSEC Operation
		18.10.3 Transaction Authentication (TSIG, TKEY, and SIG(0))
		18.10.4 DNSSEC with DNS64
	18.11 DomainKeys Identified Mail (DKIM)
		18.11.1 DKIM Signatures
		18.11.2 Example
	18.12 Attacks on Security Protocols
	18.13 Summary
	18.14 References
Glossary of Acronyms
	A
	B
	C
	D
	E
	F
	G
	H
	I
	K
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W
	X
	Z
Index
	A
	B
	C
	D
	E
	F
	G
	H
	I
	J
	K
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W
	X
	Y
	Z




نظرات کاربران