Part one. Cryptography : Symmetric encryption and message confidentiality ; Public-key cryptography and message authentication -- Part two. Network security applications : Key distribution and user authentication ; Transport-level security ; Wireless network security ; Electronic mail security ; IP security -- Part three. System security : Intruders ; Malicious software ; Firewalls -- Appendix A. Some aspects of number theory ; Appendix B. Projects for teaching network security.