The following is the Table of Contents for the text
Information Security Intelligence: Cryptographic Principles & Applications


This text is divided into three sections. Each section represents a significant area of learning for the student. In Section I the student is presented the fundamentals of information security. Section II covers essential cryptography (symmetrical and asymmetrical). Section III applies the cryptographic principles presented in Section II to real world applications.


  • Dedication
  • Acknowledgments
  • Preface
  • Section 1: Information & Security Planning
    • Chapter 1: Introduction to Information Theory
      • Securing Information
      • Data to Information
      • Information Systems
      • Information Management
      • Summary
      • Study Questions
    • Chapter 2: Threat Agents & Risk
      • Common Myths & Misconceptions
      • The Numbers Don't Lie
      • The Perpetrators
      • What Is Risk?
      • The Threats
      • Risk Assessment & Vulnerability Analysis
      • Risk Management
      • Summary
      • Study Questions
    • Chapter 3: Information & The Law
      • A Reasonable Expectation of Privacy
      • Privacy From Law Enforcement & At Work
      • What Constitutes A Crime?
      • Crime Prevention, Detection, and Prosecution
      • The Law
      • Summary
      • Study Questions
    • Chapter 4: A Model For Information Security Planning
      • An Information Security Model
      • Security Planning & Policy Generation
      • Education And Management
      • Summary
      • Study Questions
  • Section 2: Cryptographic Principles and Methods
    • Chapter 5: Cryptographic Philosophy
      • Cryptography Evolving
      • The History of Cryptography
      • The Study of Language
      • Protecting Information
      • Summary
      • Study Questions
    • Chapter 6: Mathematical Principles Of Cryptography
      • Mathematical Properties of Information
      • Number Representation
      • Exponentiation and Logarithms
      • Mathematical Logic
      • Basic Number Theory
      • Computational Complexity
      • Cryptographic Principles
      • Summary
      • Study Questions
    • Chapter 7: Symmetrical Key Cryptography
      • Symmetrical Key Cryptography
      • Software Keys
      • Symmetrical Operations
      • TEA, a Tiny Encryption Algorithm
      • Other Symmetrical Algorithms
      • Summary
      • Study Questions
    • Chapter 8: Public Key Infrastructure
      • Asymmetrical Key Cryptography
      • Digital Signatures
      • Attacks Against Encryption
      • The Need For a Public Key Infrastructure
      • Summary
      • Study Questions
  • Section 3: Information System Security
    • Chapter 9: Securing the Information System
      • Physical Security
      • Application and File Protection
      • System Security
      • Network Security
      • Intrusion Detection
      • Summary
      • Study Questions
    • Chapter 10: Viruses, Worms, and Malicious Code
      • Harmful Code
      • Non-Malicious Code
      • Malicious Software
      • Malware Defenses
      • Summary
      • Study Questions
    • Chapter 11: Securing the Digital Market Place
      • Web Businesses & Security Requirements
      • Web Technology Basics
      • Using Cryptography To Build A Web Trust
      • Making the Right Choice
      • Where To From Here?
      • Summary
      • Study Questions
  • Appendixes
    • Appendix A – Labs and Experiments
    • Appendix B – TCP/IP Fundamentals
    • Appendix C – NIPC Cyber Crime Reporting Form
    • Appendix D – Table of Primes up to 5000
  • Glossary
  • Bibliography

Top of Page


Total text is 555 pages and also includes a comprehensive CD-ROM presentation.