1. Overview -- Part One: Symmetric ciphers -- 2. Classical encryption techniques -- 3. Block ciphers and the data encryption standard -- 4. Basic concepts in number theory and finite fields -- 5. Advanced encryption standard -- 6. Block cipher operation -- 7. Pseudorandom number generation and stream ciphers -- Part Two: Asymmetric ciphers -- 8. More number theory -- 9. Public-key cryptography and RSA -- 10. Other public-key cryptosystems -- Part Three: Cryptographic data integrity algorithms -- 11. Cryptographic hash functions -- 12. Message authentication codes -- 13. Digital signatures -- Part Four: Mutual trust -- 14. Key management and distribution -- 15. User authentication protocols -- Part Five: Network and internet security -- 16. Transport-level security -- 17. Wireless network security -- 18. Electronic mail security -- 19. IP security -- Appendix A: Projects for teaching cryptography and network security -- Appendix B: Sage examples -- Online chapters -- Part Six: System security -- 20. Intruders -- 21. Malicious software -- 22. Firewalls -- Part Seven: Legal and ethical issues -- 23. Legal and ethical issues.