Main Content
1.1.1 Computer Architecture Overview
2.1.1
1.1.2 Computer Sources of Vulnerability
2.1.2
1.1 Introduction to Computers and Computer Vulnerabilities
2.1
1.2.1 Architecture Philosophy
2.2.1
1.2.2 Elements of the Network (ISPs, Routers, Protocols and packets view)
2.2.2
1.2.3.a Cables
2.2.3.1
1.2.3.b Satellites
2.2.3.2
1.2.3 Communication Channels
2.2.3
1.2.3.c Wireless Networks
2.2.3.3
1.2.4.a Encryption (public and private keys, hash functions)
2.2.4.1
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.