Security   Principle and Practice  Mark Stamp

Chapter 1 Introduction

Chapter 2 Crypto Basics

Chapter 3 Symmetric key crypto

Chapter 4 Public key crypto

Chapter 5 Hash funcitons and other topics

Chapter 7 Authentication

Chapter 8 Authorizationl

Chapter 9 Simple Authentication Protocol

Chapter 10 Real-world security protocols

Chapter 11 Software Flaws and Malware

Chapter 12 Insecurity in software

Chapter 13 Operating systems and security