Contents: Introduction Toolbox : authentication, access control, and cryptography Programs and programming The Web : user side Operating systems Networks Databases Cloud computing Privacy Management and incidents Legal issues and ethics Details of cryptography Emerging topics.