Web Security Learning
stable

Content Index:

  • 1. Prologue
  • 2. Computer Networks and Protocols
    • 2.1. Network Basics
    • 2.2. UDP protocol
    • 2.3. TCP protocol
    • 2.4. DHCP Protocol
    • 2.5. Routing algorithm
    • 2.6. Domain Name System
    • 2.7. HTTP protocol suite
    • 2.8. Mail protocol family
    • 2.9. SSL/TLS
    • 2.10. IPsec
    • 2.11. Wi-Fi
  • 3. Information Collection
  • 4. Common vulnerability attack and defense
  • 5. Language and Framework
  • 6. Intranet penetration
  • 7. Cloud Security
  • 8. Defense Technology
  • 9. Authentication Mechanism
  • 10. Tools and Resources
  • 11. Manual Quick Check
  • 12. Others
Web Security Learning
  • »
  • 2. Computer Networks and Protocols

2. Computer Networks and Protocols¶

Content Index:

  • 2.1. Network Basics
    • 2.1.1. Composition of computer communication network
    • 2.1.2. Communication Protocol
    • 2.1.3. OSI seven-layer model
  • 2.2. UDP protocol
    • 2.2.1. Main Features
  • 2.3. TCP protocol
    • 2.3.1. Introduction
    • 2.3.2. Congestion Control
    • 2.3.3. Reference Links
  • 2.4. DHCP Protocol
    • 2.4.1. Introduction
    • 2.4.2. DCHP message format
    • 2.4.3. Reference Links
  • 2.5. Routing algorithm
    • 2.5.1. Introduction
    • 2.5.2. Functions of Routing Algorithms
    • 2.5.3. AS (Autonomous System)
    • 2.5.4. Two types of routing protocols
    • 2.5.5. RIP
    • 2.5.6. OSPF
  • 2.6. Domain Name System
    • 2.6.1. Introduction
    • 2.6.2. Terminology
    • 2.6.3. Request response
    • 2.6.4. How the Domain Name System Works
    • 2.6.5. Server Type
    • 2.6.6. DNS utilization
    • 2.6.7. Encryption Scheme
    • 2.6.8. Related Vulnerabilities
    • 2.6.9. Reference Links
  • 2.7. HTTP protocol suite
    • 2.7.1. HTTP Standards
    • 2.7.2. HTTP version
    • 2.7.3. HTTPS
    • 2.7.4. Cookie
    • 2.7.5. WebDAV
    • 2.7.6. Reference Links
  • 2.8. Mail protocol family
    • 2.8.1. Introduction
    • 2.8.2. Protection strategy
    • 2.8.3. Reference Links
  • 2.9. SSL/TLS
    • 2.9.1. Introduction
    • 2.9.2. Protocol
    • 2.9.3. Interactive process
    • 2.9.4. Version update content
    • 2.9.5. Subprotocols
    • 2.9.6. Reference Links
  • 2.10. IPsec
    • 2.10.1. Introduction
    • 2.10.2. Advantages
    • 2.10.3. Composition
    • 2.10.4. Security Association,SA
    • 2.10.5. IKE
  • 2.11. Wi-Fi
    • 2.11.1. Introduction
    • 2.11.2. Attacks
    • 2.11.3. Reference Links
Previous Next

© Copyright 2019-2022, WebSecurity.

Built with Sphinx using a theme provided by Read the Docs.