I Orienting employees II The training process 2.1 Why the training business is booming 2.2 The 5-step training & development process 2.3 Training and learning III Motivate the learner 3.1 Analyzing training needs 3.2 Task analysis: assessing new employees’ training needs 3.3 Performance analysis: assessing current employees’ training needs IV Traditional training methods V Electronic training VI Managerial development & training VII Evaluating the training effort
Chapter 0. Reader's Guide Chapter 2. Classical Encryption Techniques Chapter 3. Block Ciphers and the Data Encryption Standard Chapter 4. Finite Fields Chapter 5. Advanced Encryption Standard Chapter 6. More on Symmetric Ciphers Chapter 7. Confidentiality Using Symmetric Encryption Chapter 8. Introduction to Number Theory Chapter 9. Public-Key Cryptography and RSA Chapter 10. Key Management; Other Public-Key Cryptosystems Chapter 11. Message Authentication and Hash Functions Chapter 12. Hash and MAC Algorithms Chapter 13. Digital Signatures and Authentication Protocols Chapter 14. Authentication Applications Chapter 15. Electronic Mail Security Chapter 16. IP Security Chapter 17. Web Security Chapter 18. Intruders Chapter 19. Malicious Software Chapter 20. Firewalls