William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 35 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.
He has received the prize for best Computer Science and Engineering textbook of the year from the Textbook and Academic Authors Association six times.
Bill has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.
Dr. Stallings holds a Ph.D. from M.I.T. in Computer Science and a B.S. from Notre Dame in Electrical Engineering.
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.
The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.
New edition of a practical survey intended for both classroom use and self study. Coverage includes conventional encryption<-- >classical and modern techniques, and algorithms; public-key encryption and hash functions; network security, with regard to e-mail, IP, and the Web; and system security<-->intruders, viruses, worms, and firewalls. The appendix contains research and programming projects, and reading/report assignments for teaching the subject. Annotation c. by Book News, Inc., Portland, Or.
|Ch. 2||Classical encryption techniques||28|
|Ch. 3||Block ciphers and the data encryption standard||62|
|Ch. 4||Finite fields||95|
|Ch. 5||Advanced encryption standard||134|
|Ch. 6||More on symmetric ciphers||174|
|Ch. 7||Confidentiality using symmetric encryption||199|
|Ch. 8||Introduction to number theory||234|
|Ch. 9||Public-key cryptography and RSA||257|
|Ch. 10||Key management; other public-key cryptosystems||289|
|Ch. 11||Message authentication and hash functions||317|
|Ch. 12||Hash and MAC algorithms||351|
|Ch. 13||Digital signatures and authentication protocols||377|
|Ch. 14||Authentication applications||400|
|Ch. 15||Electronic mail security||436|
|Ch. 16||IP security||483|
|Ch. 17||Web security||527|
|Ch. 19||Malicious software||598|
|App. A||Standards and standards-setting organizations||647|
|App. B||Projects for teaching cryptography and network security||653|