Cryptography and Network Security: Principles and Practice / Edition 2

Cryptography and Network Security: Principles and Practice / Edition 2

by William Stallings, William Stallings
     
 

Fully updated to reflect the latest trends and technologies, this is the definitive guide to encryption and network security principles, techniques, and effective usage. Renowned author and consultant William Stallings systematically explains encryption concepts and standards; ciphers; symmetric and public key encryption; digital signatures; and much more. Next,… See more details below

Overview

Fully updated to reflect the latest trends and technologies, this is the definitive guide to encryption and network security principles, techniques, and effective usage. Renowned author and consultant William Stallings systematically explains encryption concepts and standards; ciphers; symmetric and public key encryption; digital signatures; and much more. Next, Stallings turns to the practice of network security, introducing state-of-the-art applications for authentication, and for email, IP, and Web security. Finally, Stallings reviews the challenges of system security, covering leading attacks and today's best countermeasures. As always, Stallings provides unsurpassed support, including extensive supplements and online resources. For students, instructors, and working professionals alike, this Fourth Edition remains the field's best resource.

Product Details

ISBN-13:
9780138690175
Publisher:
Pearson Education
Publication date:
06/04/1998
Edition description:
Older Edition
Pages:
569
Product dimensions:
7.19(w) x 9.37(h) x 1.05(d)

Table of Contents

Ch. 1Introduction6
Ch. 2Classical encryption techniques28
Ch. 3Block ciphers and the data encryption standard62
Ch. 4Finite fields95
Ch. 5Advanced encryption standard134
Ch. 6More on symmetric ciphers174
Ch. 7Confidentiality using symmetric encryption199
Ch. 8Introduction to number theory234
Ch. 9Public-key cryptography and RSA257
Ch. 10Key management; other public-key cryptosystems289
Ch. 11Message authentication and hash functions317
Ch. 12Hash and MAC algorithms351
Ch. 13Digital signatures and authentication protocols377
Ch. 14Authentication applications400
Ch. 15Electronic mail security436
Ch. 16IP security483
Ch. 17Web security527
Ch. 18Intruders565
Ch. 19Malicious software598
Ch. 20Firewalls621
App. AStandards and standards-setting organizations647
App. BProjects for teaching cryptography and network security653

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >