Cryptography and Network Security : Principles and Practice / Edition 3by William Stallings
Pub. Date: 09/28/2002
William Stallings' book provides comprehensive and completely up-to-date coverage of computer organization and architecture including memory, I/O, and parallel systems. The text covers leading-edge areas, including superscalar design, IA-64 design features, and parallel processor organization trends. It meets students' needs by addressing both the fundamental principles as well as the critical role of performance in driving computer design. Providing an unparalleled degree of instructor and student support, including supplements and on-line resources through the book's website, the sixth edition is in the forefront in its field.
- IA-64/Itanium architecture: The chapter-length description and analysis includes predicated execution and speculative loading.
- Cache memory: The new edition devotes an entire chapter to this central element in the design of high-performance processors.
- Optical memory: Coverage is expanded and updated.
- Advanced DRAM architecture: More material has been added to cover this topic, including an updated discussion of SDRAM and RDRAM.
- SMPs, clusters, and NUMA systems: The chapter on parallel organization has been expanded and updated.
- Expanded instructor support: The book now provides extensive support for projects with its new website.
- Pedagogy: Each chapter now includes a list of review questions (as well as homework problems) and a list of key words.
- Running examples: Provides numerous concrete examples, especially Pentium 4 and Power PC G4
- Unified instructional approach: Enables student to evaluate instruction set design issues.
- Instructors Resource CD-ROM: Includes solutions to homework problems, list of research projects, and list of simulation projects, plus student manual for both SimpleScalar and SMPCache, and a list of suggested reading assignments.
- Publication date:
- Edition description:
- Older Edition
- Product dimensions:
- 7.20(w) x 9.32(h) x 1.20(d)
Table of Contents1. Overview.
I. CONVENTIONAL ENCRYPTION.2. Conventional Encryption: Classical Techniques.
3. Conventional Encryption: Modern Techniques.
4. Introduction to Finite Fields.
5. Conventional Encryption: AES.
6. Contemporary Symmetric Ciphers.
7. Confidentiality Using Conventional Encryption.
II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS.8. Introduction to Number Theory.
9. Public-Key Cryptography.
10. Key Management.
11. Message Authentication and Hash Functions.
12. Hash and Mac Algorithms.
13. Digital Signatures and Authentication Protocols.
III. NETWORK SECURITY PRACTICE.14. Authentication Applications.
15. Electronic Mail Security.
16. IP Security.
17. Web Security.
IV. SYSTEM SECURITY.18. Intruders and Viruses.
Appendix A. Standards and Standard-Setting Organizations.
Appendix B. Projects for Teaching Cryptography and Network Security.
List of Acronyms.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >