You are not signed in. Sign in.

Share:

Category IT Books

Cryptography and Network Security: Principles and Practice » (5th Edition)

Book cover image of Cryptography and Network Security: Principles and Practice by William Stallings

Authors: William Stallings
ISBN-13: 9780136097044, ISBN-10: 0136097049
Format: Hardcover
Publisher: Prentice Hall
Date Published: January 2010
Edition: 5th Edition

Find Best Prices for This Book »

Author Biography: William Stallings

William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 35 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.

He has received the prize for best Computer Science and Engineering textbook of the year from the Textbook and Academic Authors Association six times.

Bill has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

Dr. Stallings holds a Ph.D. from M.I.T. in Computer Science and a B.S. from Notre Dame in Electrical Engineering.

Book Synopsis

William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.

Booknews

New edition of a practical survey intended for both classroom use and self study. Coverage includes conventional encryption<-- >classical and modern techniques, and algorithms; public-key encryption and hash functions; network security, with regard to e-mail, IP, and the Web; and system security<-->intruders, viruses, worms, and firewalls. The appendix contains research and programming projects, and reading/report assignments for teaching the subject. Annotation c. by Book News, Inc., Portland, Or.

Table of Contents

Ch. 1Introduction6
Ch. 2Classical encryption techniques28
Ch. 3Block ciphers and the data encryption standard62
Ch. 4Finite fields95
Ch. 5Advanced encryption standard134
Ch. 6More on symmetric ciphers174
Ch. 7Confidentiality using symmetric encryption199
Ch. 8Introduction to number theory234
Ch. 9Public-key cryptography and RSA257
Ch. 10Key management; other public-key cryptosystems289
Ch. 11Message authentication and hash functions317
Ch. 12Hash and MAC algorithms351
Ch. 13Digital signatures and authentication protocols377
Ch. 14Authentication applications400
Ch. 15Electronic mail security436
Ch. 16IP security483
Ch. 17Web security527
Ch. 18Intruders565
Ch. 19Malicious software598
Ch. 20Firewalls621
App. AStandards and standards-setting organizations647
App. BProjects for teaching cryptography and network security653

Subjects


 

 




No reviews. Submit yours!



Review this book.

We would like to know what you think about this book and publish your thoughts here! (top)

Your Review

  1. You may optionally give a title for this comment.

  2. Worst to best, 1 to 5, what would you rate this one?

  3. The actual content of your comment. No HTML nor whatsoever allowed.

  4. The author of this comment.

  5. What is the opposite of black?

    Please answer the question by common sense.