Introduction -- Toolbox : authentication, access control, and cryptography -- Programs and programming -- The Web : user side -- Operating systems -- Networks -- Databases -- Cloud computing -- Privacy -- Management and incidents -- Legal issues and ethics -- Details of cryptography -- Emerging topics