Security Principle and Practice Mark Stamp
Chapter 1 Introduction
Chapter 2 Crypto Basics
Chapter 3 Symmetric key crypto
Chapter 4 Public key crypto
Chapter 5 Hash funcitons and other topics
Chapter 7 Authentication
Chapter 8 Authorizationl
Chapter 9 Simple Authentication Protocol
Chapter 10 Real-world security protocols
Chapter 11 Software Flaws and Malware
Chapter 12 Insecurity in software
Chapter 13 Operating systems and security