Lecture #10, Key Management (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_10_key_manage_DH.pdf)
Lecture #11, Authentification (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_11_authen_MAC.pdf)
Lecture #12, Hash Algorithms (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_12_hash.pdf)
Lecture #13, Digital SIgnatures (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_13_digital_signature.pdf)
Lecture #14, Network Intrusions (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_14_Attacks.pdf)
Lecture #15, Authetication Applications/Email Security (Chapters 14/15 of the text), lecture notes by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW, avaialble at ftp://ftp.prenhall.com/pub/esm/computer_science.s-041/stallings/Slides/Crypto4e-PPT-slides/ (select ch14.ppt and ch15.ppt)
Lecture #15-1, IDS (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_15_IDS.pdf)
Lecture #16, Network Intrusions (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_16_Attacks.pdf)
Lecture #17, Malicious Code (http://www.cs.ucf.edu/courses/fit/cse5800/notes/fit_17_SW_malcode.pdf)