Course Support Materials
Solutions manual and project manual: Available at the Pearson Website for this book. Go here for Pearson instructor support Websites for my other books.
Project Support: This document describes support available to instructors for assigning projects to students.
Computer Security: Principles and Practice by William Stallings and Lawrie Brown (Pearson, 2015). This textbook places greater emphasis on computer security issues as opposed to cryptography and network security issues. For instructors and students, there is a technical resource and course page to supplement the book.
Errata sheet: Latest list of errors, updated at most monthly. File name is Errata-Crypto6e-mmyy. If you spot any errors, please contact me at .
Powerpoint slides: The "official" set of slides commissioned for use specifically with this book. Developed by Kim Mclaughlin. This is a partial set. The full set is at the Pearson Instructor Resource Center for this book.
Figures On-line transparency masters of the figures from the book in PDF (Adobe Acrobat) format. This is a partial set. The full set is at the Pearson Instructor Resource Center for this book.
Tables On-line transparency masters of all the tables from the book in PDF format. This is a partial set. The full set is at the Pearson Instructor Resource Center for this book.
Lecture Slides: A set of slides by Professor Evangelos Kranakis of Carleton University of Ottawa, Canada
Network Security Slides A set of slides that focus mostly on Parts Three and Four by Henric Johnson at Blekinge Institute of Technology, Sweden
The Matasano Crypto Challenges: A collection of 48 exercises that demonstrate attacks on real-world crypto systems and applications. They're derived from weaknesses in real-world systems and modern cryptographic constructions. You are given you enough info to learn about the underlying crypto concepts yourself. When you're finished, you'll not only have learned a good deal about how cryptosystems are built, but you'll also understand how they're attacked. All of the work is done in the programming language of your choice. This is an excellent supplemental learning tool.
Laboratory Exercises on Encryption: Two lab exercises on public-key encryption and key sharing, prepared by Prof. James Benham of Montclair State U.
Computer Science Student Resource Site: Help and advice for the long-suffering, overworked student.
A Discussion of Textbook Cost Myths: From the Text and Academic Authors Association.
NOTICE: No password is required for any downloads. Downloading sometimes fails, either because your browser mistakenly assumes a password is needed or for other reasons. If so, try using another browser or an FTP package. If that doesn't work, there might be a problem at your end or at your ISP, perhaps a firewall issue. Then you would need to talk to a system manager on your end.
A moderated mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and with the author. To subscribe, send a blank email to email@example.com. You will receive a confirmation message. Just reply to this message and your subscription will be complete. To unsubscribe, send a blank email to firstname.lastname@example.org. To post a message, send to email@example.com.Note: You should receive a reply to your subscription request in a few hours, asking for confirmation. If not, try again. The confirmation email asks you to confirm either by replying to the email or by going to a web link. The web link is more reliable. If you reply by email and do not receive a subsequent email confirming your subscription, try again.
Instructors might find these web sites for courses taught using this book useful. I would appreciate hearing about web sites for other courses.
MSIT 458: Information Security and Assurance. Northwestern U. Lecture notes and interesting handouts.
CSS 322 Security and Cryptography. Sirindhorn International Institute of Technology (SIIT) in Thammasat University, Bangkok, Thailand Lecture notes and video lectures.
60-467 Computer Networks University of Windsor.
COMP61411. U. of Manchester.
CSC580 Cryptography and Security. U. of North Carolina at Greensboro.
CS642 Introduction to Information Security. U. of Wisconsin. Course notes
CMSC 487/687 Introduction to Network Security. U. of Maryland.
CISH-6961 Cryptography & Network Security. Rensselaer.
CEN448 Security and Internet Protocols. King Saud U. Lecture notes.
EE693F Computer and Network Security. U. of Hawaii.
ECE 646 Cryptography and Computer Network Security. George Mason U. Includes projects, lecture notes, extensive set of links, and old exams.
ECE 746 Secure Telecommunication Systems. George Mason U. Includes projects, lecture notes, extensive set of links, and old exams.
ICOM 5018 Network Security and Cryptography U. of Puerto Rico. PPT slides.
CPSC 429 Applied Cryptography U.of Calgary. Includes handouts.
Data Security Course. Uppsala U., Sweden. Lots of links
MA479/CSSE490 Cryptography. Rose-Hulman Institute of Technology. Some good supplementary material.
CS558 Network Security. Boston U. Some good links and supplementary material.
CSI4138 Design of Secure Computer Systems. U. of Ottowa. Includes course handouts.
Cryptography Independent Study.U. of Puget Sound. Good set of links.
CS494 Computer and Network Security. U. of Tennessee. Good set of links and other resources.
EECS 598 Cryptography and Network Security. U of Michigan. On-line presentation slides.
CMSC-443 Cryptography and Data Security. At U of Maryland.