Computer Security and the Internet: Tools and Jewels

Contents (published version, 1st Edition: 25 Sep 2019) → 2nd Edition is further below

  • Frontmatter (Table of Contents; Foreword by Peter G. Neumann; Preface) pdf
  • Chapter 1: Basic Concepts and Principles pdf
  • Chapter 2: Cryptographic Building Blocks pdf
  • Chapter 3: User Authentication pdf
  • Chapter 4: Authentication Protocols and Key Establishment pdf
  • Chapter 5: Operating Systems Security and Access Control pdf
  • Chapter 6: Software Security - Exploits and Privilege Escalation pdf
  • Chapter 7: Malicious Software pdf
  • Chapter 8: Public-Key Certificate Management and Use Cases pdf
  • Chapter 9: Web and Browser Security pdf
  • Chapter 10: Firewalls and Tunnels pdf
  • Chapter 11: Intrusion Detection and Network-Based Attacks pdf
  • Chapter 12: Wireless LAN Security: 802.11 and Wi-Fi (see :clubs: below)
  • Chapter 13: Bitcoin, Blockchains and Ethereum (see :spades: below)
  • Epilogue pdf
  • Index pdf
    Bibliographic end notes and references conclude each chapter

new Chapters 12 and 13 are entirely new in the 2nd Edition (not in 1st Edition).

Read in full here:

https://people.scs.carleton.ca/~paulv/toolsjewels.html

This thread was posted by one of our members via one of our news source trackers.

Corresponding tweet for this thread:

Share link for this tweet.