Chapter 1: Introduction; Chapter 2: Classical encryption techniques; Chapter 3: Block ciphers and the data encryption standard; Chapter 4: Fini te fields; Chapter 5: Advanced encryption standard; Chapter 6: More on symmetric ciphers; Chapter 7: Confidentiality using symmetric encryption; Chapter 8: Introduction to number theory; Chapter 9: Public-key cryptography and RSA; Chapter 10: Key management; other public-Key cryptosystems ...
Contents: Part 1: Setting the stage; Part 2: Understanding the terrian; Part 3: Tools; Part 4: Platforms and security; Part 5: Beginning at ground zero; Part 6: The remote attack; Part 7: The law.