shopify visitor statistics
CompSec3e-Instructor | BOOKS BY WILLIAM STALLINGS

page23-helpCourse Support Materials
page22-orangeball Project Support: This document describes support available to instructors for assigning projects to students.
page22-orangeball Solutions manual and project manual: Available at Prentice Hall Website for this book. Go here for Prentice Hall instructor support Websites for my other books.Go here for Prentice Hall instructor support Websites for the International Edition of this book and my other books.
page22-orangeball Cryptography and Network Security. Seventh Edition by William Stallings (Pearson, 2014). This textbook places greater emphasis on cryptography and network security issues as opposed to computer security issues. For instructors and students, there is a technical resource and course page to supplement the book.
page22-orangeball PowerPoint Slides: The "official" set of slides commissioned for use specifically with this book, developed by Kim Mclaughlin. This is a partial set. The full set will be available soon at the Pearson Instructor Resource Center for this book.
page22-orangeball Figures: On-line transparency masters of the figures from the book in PDF (Adobe Acrobat) format. This is a partial set. The full set available at the Prentice Hall Instructor Resource Center for this book.
page22-orangeball Tables: On-line transparency masters of all the tables from the book in Word format. This is a partial set. The full set available at the Prentice Hall Instructor Resource Center for this book.
page22-orangeball Errata sheet: Latest list of errors, updated at most monthly. File name is Errata-CompSec3e-mmyy. If you spot any errors, please contact me at page23-email.
page22-orangeball SEED Projects: A wide variety of security education projects, organized by the chapters of the book.
orangeball The Matasano Crypto Challenges: A collection of 48 exercises that demonstrate attacks on real-world crypto systems and applications. They're derived from weaknesses in real-world systems and modern cryptographic constructions. You are given you enough info to learn about the underlying crypto concepts yourself. When you're finished, you'll not only have learned a good deal about how cryptosystems are built, but you'll also understand how they're attacked. All of the work is done in the programming language of your choice. This is an excellent supplemental learning tool.
page22-orangeball OpenSecurity Training: Contains slide decks, do-it-yourself programming assignments, and projects that can help the student learn a number of computer security concepts.page23-new3
page22-orangeball Security Cards: A fun introduction to commonly-used terms and concepts in computer security.page23-new3
page22-orangeball Computer Science Student Resource Site: Help and advice for the long-suffering, overworked student.
page22-orangeball Webcasts for Teaching Computer Security: A catalog of webcast sites that can be used to enhance a computer security course.
page22-orangeball A Discussion of Textbook Cost Myths: From the Text and Academic Authors Association.


page23-mailbox Mailing List
A moderated mailing list has been set up so that instructors using this book can exchange information, suggestions, and questions with each other and with the author. To subscribe, send a blank email to ws-compsec-subscribe@yahoogroups.com. You will receive a confirmation message. Just reply to this message and your subscription will be complete. To unsubscribe, send a blank email to ws-compsec-unsubscribe@yahoogroups.com . To post a message, send to ws-compsec@yahoogroups.com. Note: You should receive a reply to your subscription request in a few hours, asking for confirmation. If not, try again. The confirmation email asks you to confirm either by replying to the email or by going to a web link. The web link is more reliable. If you reply by email and do not receive a subsequent email confirming your subscription, try again.
page23-libraryComputer Security Courses
Instructors might find these web sites for courses taught using this book useful. We would appreciate hearing about web sites for other courses.
page22-orangeball Computer & Network Security Arkansas State University.
page22-orangeball CS 600.443: Security and Privacy in Computing Johns Hopkins University.
page22-orangeball COMP 4108 - Computer Systems Security Carleton University.
page22-orangeball Cyber-Security - ZEIT8104 University of New South Wales.
page22-orangeball CSEN 1001 Computer and Network Security German University in Cairo.
page22-orangeball CMPS 5363/4663: Computer Security Midwestern State University.
page22-orangeball CIS 4550 Networked Information Systems Security Zicklin School of Business - Baruch College.
page22-orangeball Computer Security - Datasäkerhet, dasakh11 KTH Sveriges Största Tekniska Universitet (KTH Royal Institute of Technology), Stockholm. Includes slides.
page22-orangeball IST 451 Network Security Penn State U.
page23-orangeball-10-3 IT 4823 – Information Security Administration Southern Polytechnic State U., includes podcasts, sample exams.
page22-orangeball EECS710: Information Security and Assurance U. of Kansas.
page22-orangeball CSPP56510 – Information Technology Security: U. of Chicago. Contains useful links.