Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator.(Source : Wikipedia)
Chapter 1 – Introduction. (Download)
Chapter 3 – Block Ciphers and the Data Encryption Standard. (Download)
Chapter 4 – Finite Fields. (Download)
Chapter 5 – Advanced Encryption Standard. (Download)
Chapter 6 – More on Symmetric Ciphers. (Download)
Chapter 7 – Confidentiality Using Symmetric Encryption. (Download)
Chapter 9 – Public-Key Cryptography and RSA. (Download)
Chapter 10 – Key Management; Other Public-Key Crypto-systems. (Download)
Chapter 11 – Message Authentication and Hash Functions. (Download)
Chapter 12 – Hash and MAC Algorithms. (Download)
Chapter 13 – Digital Signatures and Authentication Protocols. (Download)
Chapter 15 – Electronic Mail Security. (Download)
Chapter 16 – IP Security. (Download)
Chapter 17 – Web Security. (Download)
Chapter 19 – Malicious Software. (Download)
Chapter 20 – Firewalls. (Download)
Here are the original slides for the book :
" Cryptography and Network Security " by William Stallings.Chapter 1 – Introduction. (Download)
Part One: Symmetric Ciphers
Chapter 2 – Classical Encryption Techniques. (Download)Chapter 3 – Block Ciphers and the Data Encryption Standard. (Download)
Chapter 4 – Finite Fields. (Download)
Chapter 5 – Advanced Encryption Standard. (Download)
Chapter 6 – More on Symmetric Ciphers. (Download)
Chapter 7 – Confidentiality Using Symmetric Encryption. (Download)
Part Two: Public-Key Encryption and Hash Functions
Chapter 8 – Introduction to Number Theory. (Download)Chapter 9 – Public-Key Cryptography and RSA. (Download)
Chapter 10 – Key Management; Other Public-Key Crypto-systems. (Download)
Chapter 11 – Message Authentication and Hash Functions. (Download)
Chapter 12 – Hash and MAC Algorithms. (Download)
Chapter 13 – Digital Signatures and Authentication Protocols. (Download)
Part Three: Network Security Applications
Chapter 14 – Authentication Applications. (Download)Chapter 15 – Electronic Mail Security. (Download)
Chapter 16 – IP Security. (Download)
Chapter 17 – Web Security. (Download)
Part Four: System Security
Chapter 18 – Intruders. (Download)Chapter 19 – Malicious Software. (Download)
Chapter 20 – Firewalls. (Download)
Please feel free to leave a comment if there is a dead link or a problem with the links.
nice book.
ReplyDeleteWeb Server & Application Security Testing