User:Clemenzi/Books/CE PE Exam Study Guide II - Part 4

Information Theory, Encryption, Networking, and Security

 * Information Theory
 * Information theory
 * Channel capacity
 * Shannon–Hartley theorem
 * Nyquist–Shannon sampling theorem
 * Shannon's source coding theorem
 * Zero-order hold
 * Data compression
 * Modulation order
 * Phase-shift keying


 * Encryption
 * Hash function
 * List of hash functions
 * String searching algorithm
 * Avalanche effect
 * Rabin–Karp algorithm
 * Burst error-correcting code
 * Cryptography
 * Cryptographic hash function
 * Public-key cryptography
 * Viterbi algorithm


 * Networking
 * Computer network
 * List of network buses
 * Wide area network
 * Local area network
 * Network science
 * Non-return-to-zero
 * Manchester code
 * Ethernet
 * Internet
 * OSI model
 * Transmission Control Protocol
 * Point-to-Point Protocol
 * Exposed node problem
 * Circuit switching
 * Fiber-optic communication
 * Capacity management
 * Bandwidth management
 * Bandwidth (computing)
 * Throughput
 * Networking hardware
 * Wireless network
 * IEEE 802.11
 * Complementary code keying
 * Session Initiation Protocol
 * Message authentication code
 * Port Control Protocol
 * Network monitoring
 * Simple Network Management Protocol
 * Measuring network throughput
 * Reliability (computer networking)
 * Channel access method
 * Time division multiple access


 * Security
 * Computer security
 * Separation of protection and security
 * Information security
 * Information security management system
 * Internet security
 * Hacker (computer security)
 * DMZ (computing)
 * Firewall (computing)
 * Stateful firewall
 * Intrusion detection system
 * Denial-of-service attack
 * IP address spoofing