Main Content
1.1.1 Computer Architecture Overview
2.1.1
1.1.2 Computer Sources of Vulnerability
2.1.2
1.1 Introduction to Computers and Computer Vulnerabilities
2.1
1.2.1 Architecture Philosophy
2.2.1
1.2.2 Elements of the Network (ISPs, Routers, Protocols and packets view)
2.2.2
1.2.3.a Cables
2.2.3.1
1.2.3.b Satellites
2.2.3.2
1.2.3 Communication Channels
2.2.3
1.2.3.c Wireless Networks
2.2.3.3
1.2.4.a Encryption (public and private keys, hash functions)
2.2.4.1
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.