Introduction to security -- Intrusion detection systems -- Encryption -- Authentication, hashing, and digital certificates -- Enhanced software security -- Network security elements -- Introduction to risk -- Threat analysis -- Network forensics -- Data hiding and obfuscation -- Web infastructures -- Cloud/Grid computing -- Appendix A