Book Details

Instructors may access teaching resources by clicking the ‘Request Instructor Resources’ tab next to the title.
Please note that you can subscribe to a maximum of 2 titles.

Cryptography and Network Security: Principles and Practice, 6/e


Cryptography and Network Security: Principles and Practice, 6/e
Author(s)  William Stallings
ISBN  9789332518773
Imprint  Pearson Education
Copyright  2014
Pages  660
Binding  Paperback
List Price  Rs. 775.00
  
 
 

In this age of universal electronic connectivity, viruses and hackers, electronic eavesping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

  • About the Authors
  • Contents
  • Features
  • Downloadable Resources

Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE,ACM Computing Reviews and Cryptologia.



He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.



In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.


 

 

Chapter 0 Guide for Readers and Instructors


Chapter 1 Classical Encryption Techniques


Chapter 2 Block Ciphers and the Data Encryption Standard


Chapter 3 Basic Concepts in Number Theory and Finite Fields


Chapter 4 Advanced Encryption Standard


Chapter 5 Block Cipher Operation


Chapter 6 Pseudorandom Number Generation and Stream Ciphers


Chapter 7 More Number Theory


Chapter 8 Public-Key Cryptography and RSA


Chapter 9 Other Public-Key Cryptosystems


Chapter 10 Cryptographic Hash Functions


Chapter 11 Message Authentication Codes


Chapter 12 Digital Signatures


Chapter 13 Key Management and Distribution


Chapter 14 User Authentication


Chapter 15 Transport-Level Security


Chapter 16 Wireless Network Security


Chapter 17 Electronic Mail Security


Chapter 18 IP Security


 

 

• Use of Sage to illustrate cryptographic algorithms:  The Sage computer algebra system is used to provide numerous examples of cryptographic algorithms and is also used as the basis for numerous hands-on assignments.


• Comprehensive up-to-date survey of cryptographic algorithms. The student gains an understanding of all of important cryptographic algorithms and is able to assess their relative strengths and weaknesses.


• Complete coverage of authentication and digital signatures. Enables the student to compare and evaluate competing approaches, and thus understand each better.


• Unified, comprehensive treatment of mutual trust topics. Key management and user authentication are fundamental to the successful use of cryptographic services.


• Excellent collection of homework problems. Approximately 300 problems reinforce material in the text and also introduce new concepts and techniques.


• Solid yet easy-to-follow mathematical background.  It is impossible to assess the relative strengths of various approaches without some understanding of number theory and probability.


• Comprehensive, up-to-date coverage of IP Security.  IPSec is one of the most complex and one of the most important of the new network security standards.


• Comprehensive, up-to-date coverage of wireless network Security. The student gains an understanding of the importance of this topic.


• Coverage of both PGP and S/MIME for electronic mail security: These are the two most important approaches to email security.


• Comprehensive and unified discussion of intruders and viruses. The threats of intruders (hackers) and viruses are distinct, but there are also similarities


 

 
 
Username/ Email  
Password  
If you are new to this site, and you do not have a username and password, please register.