If you are looking for the Handbook of Applied Cryptography (1996), visit here.
For An Introduction to Error Correcting Codes with Applications (1989), visit here.
Or see here
for a list of reference books on security/cryptography
and other miscellaneous resources and advice.
new
Second Edition (October 2021):
Computer Security and the Internet: Tools and Jewels from
Malware to Bitcoin, Second Edition
by Paul C. van Oorschot. Springer, 2021.
2e ISBN: 978-3-030-83410-4 (hardcopy), 978-3-030-83411-1 (eBook)
The official version is available
from Springer (2e)
and major booksellers.
All official hardback copies (1e and 2e) should have color
figures and color highlighted text.
A single-file full-book PDF is available from university libraries and
SpringerLink (2e).
Reviews (2e):
B.
Rothke (RSA Conference),
R.
Farrow (USENIX ;login:),
S. Dietrich (IEEE Cipher).
Reviews (1e):
N. Asokan (U. Waterloo),
S. Dietrich (Cipher newsletter),
Edgar Weippl (U. Vienna),
...
JH Davenport (Computing Reviews),
S Escobar (Computing Reviews).
Shorter comments:
Amazon.com,
Risks Digest,
Goodreads,
Schneier on Security.
The book copy on this site is a self-archived author-created version for personal use.
Reposting and all other forms of redistribution are strictly prohibited.
Copyright (c)2020-2021 Paul C. van Oorschot. Under publishing license to Springer.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Back cover
(includes the objectives of the book; see also the preface in the Frontmatter below).
2nd Edition (published October 14, 2021), 446 pages plus frontmatter.
New chapters (12, 13), plus editorial revisions (retaining 1e pagination) and updated index.
-
Frontmatter (Table of Contents; Preface; Foreword by Peter G. Neumann)
pdf
-
Chapter 1: Security Concepts and Principles
pdf
-
Chapter 2: Cryptographic Building Blocks
pdf
-
Chapter 3: User Authentication
pdf
-
Chapter 4: Authentication Protocols and Key Establishment
pdf
-
Chapter 5: Operating Systems Security and Access Control
pdf
-
Chapter 6: Software Security - Exploits and Privilege Escalation
pdf
-
Chapter 7: Malicious Software
pdf
-
Chapter 8: Public-Key Certificate Management and Use Cases
pdf
-
Chapter 9: Web and Browser Security
pdf
-
Chapter 10: Firewalls and Tunnels
pdf
-
Chapter 11: Intrusion Detection and Network-Based Attacks
pdf
-
Chapter 12:
Wireless LAN Security: 802.11 and Wi-Fi
pdf
-
Chapter 13:
Bitcoin, Blockchains and Ethereum
pdf
-
Ongoing Challenges (Epilogue)
pdf
-
Index
pdf
Bibliographic end notes and references conclude each chapter
Page-range(chapter-number) mapping, e.g., for mapping index entries to chapter:
1-28(ch1)
29-54(2)
55-90(3)
91-124(4)
125-154(5)
155-182(6)
183-213(7)
214-244(8)
245-280(9)
281-308(10)
309-338(11)
339-374(12)
375-410(13)
411-414(epi.)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Errata post-2e. These are reflected in the above PDF files, but not the printed Second Edition.
p34, line n-2. SHA-3 resulted from a NIST competition (but not SHA-1 or SHA-2).
p361. Section 12.7's title ends with "(WPA2)"; the next sentence notes AES-CCMP is WPA2's core part.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1st Edition (published April 2020; 365 pages plus frontmatter).
ISBN: 978-3-030-33648-6 (hardcopy), 978-3-030-33649-3 (eBook).
A single-file full-book PDF is available from university libraries and
SpringerLink (1e).
The official hardcopy version is available
from Springer (1e) and major booksellers.
Chapter PDFs (version 25 Sept 2019, as published):
ToC-1e
1
2
3
4
5
6
7
8
9
10
11
epilog
index
First edition front and back cover and
book flyer.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Feedback and suggestions are welcome:
pvanoorschot (at) gmail.com
I hope that you enjoy and use this book. Thanks to all who helped along the way.
-pvo (Ottawa, Canada).
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -