Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.(Source : Wikipedia)
Here are the original slides for the book :
" Cryptography and Network Security " by William Stallings.
Chapter 1 – Introduction. (
Download)
Part One: Symmetric Ciphers
Chapter 2 – Classical Encryption Techniques. (
Download)
Chapter 3 – Block Ciphers and the Data Encryption Standard. (
Download)
Chapter 4 – Finite Fields. (
Download)
Chapter 5 – Advanced Encryption Standard. (
Download)
Chapter 6 – More on Symmetric Ciphers. (
Download)
Chapter 7 – Confidentiality Using Symmetric Encryption. (
Download)
Part Two: Public-Key Encryption and Hash
Functions
Chapter 8 – Introduction to Number Theory. (
Download)
Chapter 9 – Public-Key Cryptography and RSA. (
Download)
Chapter 10 – Key Management; Other Public-Key Crypto-systems. (
Download)
Chapter 11 – Message Authentication and Hash Functions. (
Download)
Chapter 12 – Hash and MAC Algorithms. (
Download)
Chapter 13 – Digital Signatures and Authentication Protocols. (
Download)
Part Three: Network Security Applications
Chapter 14 – Authentication Applications. (
Download)
Chapter 15 – Electronic Mail Security. (
Download)
Chapter 16 – IP Security. (
Download)
Chapter 17 – Web Security. (
Download)
Part Four: System Security
Chapter 18 – Intruders. (
Download)
Chapter 19 – Malicious Software. (
Download)
Chapter 20 – Firewalls. (
Download)
Please feel free to leave a comment if there is a dead link or a problem with the links.