(open to any contribution in the future since this will go public and currently will have content only for Fall2023 Finals)
Authors: Wahaj Javed Rayyan Minhaj
Chapter 2 ⇒ Cryptographic Tools
Chapter 3 ⇒ User Authentication
Chapter 5 ⇒ DB and Data Centre Security
Chapter 6 ⇒ Malicious Software
Chapter 8 ⇒ Intrusion Detection
Chapter 9 ⇒ Firewall and Intrusion Prevention Systems (IPS)
Chapter 14 ⇒ IT Security Management and Risk Assessment