Introduction to the book
A comprehensive treatment of computer security technology, including algorithms, protocols, and applications. Covers cryptography, authentication, access control, database security, intrusion detection and prevention, malicious software, denial of service, firewalls, software security, physical security, human factors, auditing, legal and ethical aspects, and trusted systems. Received the 2008 TAA award for the best Computer Science and Engineering Textbook of the year. This book provides coverage of all the subject areas specified for CISSP (Certified Information Systems Security Professional) certification.
Here are the slides of the book:
" Computer Security: Principles and Practice " by William Stallings & Lawrie Brown, 1st Edition.
Chapter - 1 : Overview. (Download)
PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Chapter - 2 : Cryptographic Tools. (Download)
Chapter - 3 : User Authentication. (Download)
Chapter - 4 : Access Control. (Download)
Chapter - 5 : Database Security. (Download)
Chapter - 6 : Intrusion Detection. (Download)
Chapter - 7 : Malicious Software. (Download)
Chapter - 8 : Denial of Service. (Download)
Chapter - 9 : Firewalls and Intrusion Prevention Systems. (Download)
Chapter - 10 : Trusted Computing and Multilevel Security. (Download)
PART TWO SOFTWARE SECURITY
Chapter - 11 : Buffer Overflow. (Download)
Chapter - 12 : Other Software Security Issues. (Download)
PART THREE MANAGEMENT ISSUES
Chapter - 13 : Physical and Infrastructure Security. (Download)
Chapter - 14 : Human Factors. (Download)
Chapter - 15 : Security Auditing. (Download)
Chapter - 16 : IT Security Management and Risk Assessment. (Download)
Chapter - 17 : IT Security Controls, Plans and Procedures. (Download)
Chapter - 18 : Legal and Ethical Aspects. (Download)
PART FOUR CRYPTOGRAPHIC ALGORITHMS
Chapter - 19 : Symmetric Encryption and Message Confidentiality. (Download)
Chapter - 20 : Public-Key Cryptography and Message Authentication. (Download)
PART FIVE INTERNET SECURITY
Chapter - 21 : Internet Security Protocols and Standards. (Download)
Chapter - 22 : Internet Authentication Applications. (Download)
PART SIX OPERATING SYSTEM SECURITY
Chapter - 23 : Linux Security. (Download)
Chapter - 24 : Windows Security. (Download)
Please feel free to leave a comment if there is a dead link or a problem with the links.
sir,
ReplyDeleteplease send these slide shows and text book related "computer security principles and practices"
" gnvivek.cse588@gmail.com"
Regards,
Vivekananda GN
Sent
Delete