Cryptography and Network Security : Principles and Practice: International Edition
For one-semester, undergraduate/graduate level courses in Cryptography, Computer Security, and Network Security.Best-selling author and four-time winner of the TEXTY award for the best Computer Science and Engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security. This text, which won the 1999 TAA Award for the best computer science and engineering textbook of the year, has been completely updated to reflect the latest developments in the field. It has also been extensively reorganized to provide the optimal sequence for classroom instruction and self-study.
- Paperback | 681 pages
- 179 x 235 x 26mm | 1,014g
- 04 Sep 2002
- Pearson Education (US)
- United States
- 3rd edition
About William Stallings
William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 48 books on various aspects of this subject. 1 lc has won the annual Text and Academic Authors Association award five times for the best computer science and engineering text. He is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He maintains the Computer Science Technical Resciurce site at http://www.WilliamStallings.com/StudentSupport.html. Dr. Stallings holds a Ph.D. degree in Computer Science from M.LT. All of his Prentice Hall title's can he found at the Prentice Hall web site http://www.prenhall.com/stallings.
Table of contents
1. Overview. I. CONVENTIONAL ENCRYPTION. 2. Conventional Encryption: Classical Techniques. 3. Conventional Encryption: Modern Techniques. 4. Introduction to Finite Fields. 5. Conventional Encryption: AES. 6. Contemporary Symmetric Ciphers. 7. Confidentiality Using Conventional Encryption. II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS. 8. Introduction to Number Theory. 9. Public-Key Cryptography. 10. Key Management. 11. Message Authentication and Hash Functions. 12. Hash and Mac Algorithms. 13. Digital Signatures and Authentication Protocols. III. NETWORK SECURITY PRACTICE. 14. Authentication Applications. 15. Electronic Mail Security. 16. IP Security. 17. Web Security. IV. SYSTEM SECURITY. 18. Intruders and Viruses. 19. Firewalls. Appendix A. Standards and Standard-Setting Organizations. Appendix B. Projects for Teaching Cryptography and Network Security. Glossary. References. Index. List of Acronyms.