Cryptography and Network Security

Cryptography and Network Security : Principles and Practice

3.99 (326 ratings by Goodreads)
  • Hardback
By (author) 

List price: US$84.01

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

For one-semester, undergraduate/graduate level courses in Cryptography, Computer Security, and Network Security. Best-selling author and four-time winner of the TEXTY award for the best Computer Science and Engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security. This text, which won the 1999 TAA Award for the best computer science and engineering textbook of the year, has been completely updated to reflect the latest developments in the field. It has also been extensively reorganized to provide the optimal sequence for classroom instruction and self-study.show more

Product details

  • Hardback | 681 pages
  • 177.8 x 236.2 x 20.3mm | 1,156.67g
  • Pearson Education Limited
  • Prentice-Hall
  • Harlow, United Kingdom
  • 3 Revised ed of US ed
  • glossary, references, index, bibliography, index
  • 0130914290
  • 9780130914293

About William Stallings

William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 48 books on various aspects of this subject. 1 lc has won the annual Text and Academic Authors Association award five times for the best computer science and engineering text. He is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He maintains the Computer Science Technical Resciurce site at http://www.WilliamStallings.com/StudentSupport.html. Dr. Stallings holds a Ph.D. degree in Computer Science from M.LT. All of his Prentice Hall title's can he found at the Prentice Hall web site http://www.prenhall.com/stallings.show more

Table of contents

1. Overview. I. CONVENTIONAL ENCRYPTION. 2. Conventional Encryption: Classical Techniques. 3. Conventional Encryption: Modern Techniques. 4. Introduction to Finite Fields. 5. Conventional Encryption: AES. 6. Contemporary Symmetric Ciphers. 7. Confidentiality Using Conventional Encryption. II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS. 8. Introduction to Number Theory. 9. Public-Key Cryptography. 10. Key Management. 11. Message Authentication and Hash Functions. 12. Hash and Mac Algorithms. 13. Digital Signatures and Authentication Protocols. III. NETWORK SECURITY PRACTICE. 14. Authentication Applications. 15. Electronic Mail Security. 16. IP Security. 17. Web Security. IV. SYSTEM SECURITY. 18. Intruders and Viruses. 19. Firewalls. Appendix A. Standards and Standard-Setting Organizations. Appendix B. Projects for Teaching Cryptography and Network Security. Glossary. References. Index. List of Acronyms.show more

Rating details

326 ratings
3.99 out of 5 stars
5 33% (108)
4 40% (130)
3 22% (71)
2 3% (11)
1 2% (6)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X