Introduction to Network Security – Part 7

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given β€˜as is’. I do not take responsibilities of how they are used. Transposition Ciphers The main idea of transposition ciphers is to rearrange the order of the […]

Share

Introduction to Network Security – Part 6

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given β€˜as is’. I do not take responsibilities of how they are used. Poly-alphabetic Cipher In the previous posting, we say that the mono-alphabetic cipher instead of shifting […]

Share

Introduction to Network Security – Part 2

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given β€˜as is’. I do not take responsibilities of how they are used. Introduction To Network : The Internet The Internet is a network which connect networks around […]

Share

Introduction to Network Security – Part 1

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given β€˜as is’. I do not take responsibilities of how they are used. Network Security What do we considerate as network security? Network security is a system in […]

Share