Topic | Presenter | Files | |
---|---|---|---|
1 | Introduction to Computer Security | Papadogiannakis Manos | Presentation |
2 | Cyber Shield Up: They Shall Not Pass | Andreas Sfakianakis | Presentation |
3 | Introduction to Binary Analysis | Manos Chalkiadakis | - |
4 | How to Share a Secret | Lilika Markatou | Presentation |
Powerpoint slides made by the book's authors are available here.
Please note that these slides are for the 1st edition of the textbook.
Content | PowerPoint |
---|---|
Introduction | Chapter 1 PPT |
Cryptographic Topics | Chapter 2 PPT |
User Authentication | Chapter 3 PPT |
Access Control | Chapter 4 PPT |
Database Security | Chapter 5 PPT |
Intrusion Detection | Chapter 6 PPT |
Malicious Software | Chapter 7 PPT |
Denial of Service | Chapter 8 PPT |
Firewalls and Intrusion Prevention Systems | Chapter 9 PPT |
Trusted Computing and Multilevel Security | Chapter 10 PPT |
Buffer Overflow | Chapter 11 PPT |
Software Security | Chapter 12 PPT |
Physical and Infrastructure Security | Chapter 13 PPT |
Human Factors | Chapter 14 PPT |
Security Auditing | Chapter 15 PPT |
IT Security Management and Risk Assessment | Chapter 16 PPT |
IT Security Controls, Plans and Procedures | Chapter 17 PPT |
Legal and Ethical Aspects | Chapter 18 PPT |
Symmetric Encryption and Message Confidentiality | Chapter 19 PPT |
Public-Key Cryptography and Message Authentication | Chapter 20 PPT |
Internet Security Protocols and Standards | Chapter 21 PPT |
Internet Authentication Applications | Chapter 22 PPT |
Linux Security | Chapter 23 PPT |