Linked e-resources
Details
Table of Contents
Chapter 1: The Psychology of Cybersecurity
Chapter 2: Authentication Technology
Chapter 3: Authorization Technology
Chapter 4: Cryptography Foundations
Chapter 5: Core Cryptography Technology
Chapter 6: Cryptographic Systems Technology
Chapter 7: Host Security Technology
Chapter 8: Classical Network Security Technology
Chapter 9: World Wide Web Security
Chapter 10: Overlay Security: Email and Social Media
Appendix A: Binary and Hexadecimal Numbers
Appendix B: Computers, Data, and Programs
Appendix C: Computer Communications and Networking.
Chapter 2: Authentication Technology
Chapter 3: Authorization Technology
Chapter 4: Cryptography Foundations
Chapter 5: Core Cryptography Technology
Chapter 6: Cryptographic Systems Technology
Chapter 7: Host Security Technology
Chapter 8: Classical Network Security Technology
Chapter 9: World Wide Web Security
Chapter 10: Overlay Security: Email and Social Media
Appendix A: Binary and Hexadecimal Numbers
Appendix B: Computers, Data, and Programs
Appendix C: Computer Communications and Networking.