Sunday 18 November 2012

Computer Security : Principles & Practice Book Slides

Introduction to the book

A comprehensive treatment of computer security technology, including algorithms, protocols, and applications. Covers cryptography, authentication, access control, database security, intrusion detection and prevention, malicious software, denial of service, firewalls, software security, physical security, human factors, auditing, legal and ethical aspects, and trusted systems. Received the 2008 TAA award for the best Computer Science and Engineering Textbook of the year. This book provides coverage of all the subject areas specified for CISSP (Certified Information Systems Security Professional) certification.

Here are the slides of the book:
" Computer Security: Principles and Practice " by William Stallings & Lawrie Brown, 1st Edition.



Chapter - 1 : Overview. (Download)
 
PART ONE  COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
 
Chapter - 2 : Cryptographic Tools. (Download)
Chapter - 3 : User Authentication. (Download)
Chapter - 4 : Access Control. (Download)
Chapter - 5 : Database Security. (Download)
Chapter - 6 : Intrusion Detection. (Download)
Chapter - 7 : Malicious Software. (Download)
Chapter - 8 : Denial of Service. (Download)
Chapter - 9 : Firewalls and Intrusion Prevention Systems. (Download)
Chapter - 10 : Trusted Computing and Multilevel Security. (Download)
 
PART TWO  SOFTWARE SECURITY
 
Chapter - 11 : Buffer Overflow. (Download)
Chapter - 12 : Other Software Security Issues. (Download)

PART THREE    MANAGEMENT ISSUES
 
Chapter - 13 : Physical and Infrastructure Security. (Download)
Chapter - 14 : Human Factors. (Download)
Chapter - 15 : Security Auditing. (Download)
Chapter - 16 : IT Security Management and Risk Assessment. (Download)
Chapter - 17 : IT Security Controls, Plans and Procedures. (Download)
Chapter - 18 : Legal and Ethical Aspects. (Download)

PART FOUR  CRYPTOGRAPHIC ALGORITHMS
 
Chapter - 19 : Symmetric Encryption and Message Confidentiality. (Download)
Chapter - 20 : Public-Key Cryptography and Message Authentication. (Download)

PART FIVE INTERNET SECURITY   

Chapter - 21 : Internet Security Protocols and Standards. (Download)
Chapter - 22 : Internet Authentication Applications. (Download)

PART SIX  OPERATING SYSTEM SECURITY
 
Chapter - 23 : Linux Security. (Download)
Chapter - 24 : Windows Security. (Download)

Please feel free to leave a comment if there is a dead link or a problem with the links.

2 comments:

  1. sir,
    please send these slide shows and text book related "computer security principles and practices"
    " gnvivek.cse588@gmail.com"
    Regards,
    Vivekananda GN

    ReplyDelete