Topic | PDF, 1 slide/page | PDF, 2 slides/page |
---|---|---|
Introduction | 1 | 2 |
Review of networks | 1 | 2 |
Introduction to cryptography (Ch. 2) | 1 | 2 |
Secret-key cryptography (Ch. 3) | 1 | 2 |
Hashes (Ch. 4) | 1 | 2 |
Public-key cryptography (Ch. 5) | 1 | 2 |
Number theory (Ch. 6) | 1 | 2 |
Authentication (Ch. 7) | 1 | 2 |
Authentication of people | 1 | 2 |
Security handshake pitfalls | 1 | 2 |
Kerberos 4 | 1 | 2 |
Kerberos 5 | 1 | 2 |
OS security | 1 | -- |
IP security | 1 | 2 |
Email security | 1 | 2 |
Transport-layer and web security | 1 | 2 |