Powerpoint slides made by the book's authors are available here.
Please note that these slides are for the 1st edition of the textbook.
| Content | PowerPoint | 
|---|---|
| Introduction | Chapter 1 PPT | 
| Cryptographic Topics | Chapter 2 PPT | 
| User Authentication | Chapter 3 PPT | 
| Access Control | Chapter 4 PPT | 
| Database Security | Chapter 5 PPT | 
| Intrusion Detection | Chapter 6 PPT | 
| Malicious Software | Chapter 7 PPT | 
| Denial of Service | Chapter 8 PPT | 
| Firewalls and Intrusion Prevention Systems | Chapter 9 PPT | 
| Trusted Computing and Multilevel Security | Chapter 10 PPT | 
| Buffer Overflow | Chapter 11 PPT | 
| Software Security | Chapter 12 PPT | 
| Physical and Infrastructure Security | Chapter 13 PPT | 
| Human Factors | Chapter 14 PPT | 
| Security Auditing | Chapter 15 PPT | 
| IT Security Management and Risk Assessment | Chapter 16 PPT | 
| IT Security Controls, Plans and Procedures | Chapter 17 PPT | 
| Legal and Ethical Aspects | Chapter 18 PPT | 
| Symmetric Encryption and Message Confidentiality | Chapter 19 PPT | 
| Public-Key Cryptography and Message Authentication | Chapter 20 PPT | 
| Internet Security Protocols and Standards | Chapter 21 PPT | 
| Internet Authentication Applications | Chapter 22 PPT | 
| Linux Security | Chapter 23 PPT |