Cryptography and Network Security: Principles and Practice

Hardcover
from $0.00

Author: William Stallings

ISBN-10: 0136097049

ISBN-13: 9780136097044

Category: Security - Computer Networks

Search in google:

William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues. Booknews New edition of a practical survey intended for both classroom use and self study. Coverage includes conventional encryptionclassical and modern techniques, and algorithms; public-key encryption and hash functions; network security, with regard to e-mail, IP, and the Web; and system securityintruders, viruses, worms, and firewalls. The appendix contains research and programming projects, and reading/report assignments for teaching the subject. Annotation c. by Book News, Inc., Portland, Or.

Ch. 1Introduction6Ch. 2Classical encryption techniques28Ch. 3Block ciphers and the data encryption standard62Ch. 4Finite fields95Ch. 5Advanced encryption standard134Ch. 6More on symmetric ciphers174Ch. 7Confidentiality using symmetric encryption199Ch. 8Introduction to number theory234Ch. 9Public-key cryptography and RSA257Ch. 10Key management; other public-key cryptosystems289Ch. 11Message authentication and hash functions317Ch. 12Hash and MAC algorithms351Ch. 13Digital signatures and authentication protocols377Ch. 14Authentication applications400Ch. 15Electronic mail security436Ch. 16IP security483Ch. 17Web security527Ch. 18Intruders565Ch. 19Malicious software598Ch. 20Firewalls621App. AStandards and standards-setting organizations647App. BProjects for teaching cryptography and network security653