Contents (published version, 1st Edition: 25 Sep 2019) → 2nd Edition is further below
- Frontmatter (Table of Contents; Foreword by Peter G. Neumann; Preface) pdf
- Chapter 1: Basic Concepts and Principles pdf
- Chapter 2: Cryptographic Building Blocks pdf
- Chapter 3: User Authentication pdf
- Chapter 4: Authentication Protocols and Key Establishment pdf
- Chapter 5: Operating Systems Security and Access Control pdf
- Chapter 6: Software Security - Exploits and Privilege Escalation pdf
- Chapter 7: Malicious Software pdf
- Chapter 8: Public-Key Certificate Management and Use Cases pdf
- Chapter 9: Web and Browser Security pdf
- Chapter 10: Firewalls and Tunnels pdf
- Chapter 11: Intrusion Detection and Network-Based Attacks pdf
- Chapter 12: Wireless LAN Security: 802.11 and Wi-Fi (see below)
- Chapter 13: Bitcoin, Blockchains and Ethereum (see below)
- Epilogue pdf
- Index pdf
Bibliographic end notes and references conclude each chapternew Chapters 12 and 13 are entirely new in the 2nd Edition (not in 1st Edition).
Read in full here:
https://people.scs.carleton.ca/~paulv/toolsjewels.html
This thread was posted by one of our members via one of our news source trackers.