Powerpoint slides made by the book's authors are available here.
Please note that these slides are for the 1st edition of the textbook.
| Content | PowerPoint |
|---|---|
| Introduction | Chapter 1 PPT |
| Cryptographic Topics | Chapter 2 PPT |
| User Authentication | Chapter 3 PPT |
| Access Control | Chapter 4 PPT |
| Database Security | Chapter 5 PPT |
| Intrusion Detection | Chapter 6 PPT |
| Malicious Software | Chapter 7 PPT |
| Denial of Service | Chapter 8 PPT |
| Firewalls and Intrusion Prevention Systems | Chapter 9 PPT |
| Trusted Computing and Multilevel Security | Chapter 10 PPT |
| Buffer Overflow | Chapter 11 PPT |
| Software Security | Chapter 12 PPT |
| Physical and Infrastructure Security | Chapter 13 PPT |
| Human Factors | Chapter 14 PPT |
| Security Auditing | Chapter 15 PPT |
| IT Security Management and Risk Assessment | Chapter 16 PPT |
| IT Security Controls, Plans and Procedures | Chapter 17 PPT |
| Legal and Ethical Aspects | Chapter 18 PPT |
| Symmetric Encryption and Message Confidentiality | Chapter 19 PPT |
| Public-Key Cryptography and Message Authentication | Chapter 20 PPT |
| Internet Security Protocols and Standards | Chapter 21 PPT |
| Internet Authentication Applications | Chapter 22 PPT |
| Linux Security | Chapter 23 PPT |