Cryptography and Network Security: Principles and Practice, Global Edition

De (autor)
Notă GoodReads:
en Limba Engleză Paperback – 30 May 2022
Thistitle is a Pearson Global Edition. The editorial team at Pearson has workedclosely with educators around the world to include which is especially relevant to an international and diverse audience.
For coursesin Cryptography, Computer Security, and Network Security.
Keep pacewith the fast-moving field of cryptography and network security
Stallings Cryptographyand Network Security: Principles and Practice introduces studentsto the compelling and evolving field of cryptography and network security. Inan age of viruses and hackers, electronic eavesdropping, and electronic fraudon a global scale, security is paramount. The purpose of this book is toprovide a practical survey of both the principles and practice of cryptographyand network security. The first part of the book explores the basic issues tobe addressed by a network security capability and provides a tutorial andsurvey of cryptography and network security technology. The latter part of thebook deals with the practice of network security, covering practicalapplications that have been implemented and are in use to provide networksecurity.
The 8thEdition captures innovations and improvements in cryptography andnetwork security, while maintaining broad and comprehensive coverage of theentire field. In many places, the narrative has been clarified and tightened,and illustrations have been improved based on extensive reviews by professorswho teach the subject and by professionals working in the field.
Citește tot Restrânge

Preț: 43767 lei

Preț vechi: 54034 lei

Puncte Express: 657

Preț estimativ în valută:
8401 8985$ 7242£

Carte în stoc

Livrare din stoc 08 iunie

Preluare comenzi: 021 569.72.76


ISBN-13: 9781292437484
ISBN-10: 1292437480
Pagini: 832
Dimensiuni: 178 x 231 x 35 mm
Greutate: 1.22 kg
Ediția: 8. Auflage
Editura: Pearson

Notă biografică

Dr. William Stallings hasauthored 19 titles, and counting revised editions, over 40 books on computersecurity, computer networking, and computer architecture. His writings haveappeared in numerous publications, including the Proceedings of the IEEE,ACM Computing Reviews and Cryptologia. He has received 13 times theaward for the best Computer Science textbook of the year from the Text andAcademic Authors Association.
In over 30 years in thefield, he has been a technical contributor, technical manager, and an executivewith several high-technology firms. He has designed and implemented both TCP/IP-basedand OSI-based protocol suites on a variety of computers and operating systems,ranging from microcomputers to mainframes. As a consultant, he has advisedgovernment agencies, computer and software vendors, and major users on thedesign, selection, and use of networking software and products.
He created andmaintains the Computer Science Student Resource Site This site provides documents and links on a varietyof subjects of general interest to computer science students (andprofessionals). He is a member of the editorial board of Cryptologia, ascholarly journal devoted to all aspects of cryptology.
Dr. Stallings holds aPhD from MIT in computer science and a BS from Notre Dame in electricalengineering.


1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Lightweight Cryptography and Post-Quantum Cryptography 15. Key Management and Distribution 16. User Authentication Protocols 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security 21. Network Endpoint Security 22. Cloud Security 23. Internet of Things (IoT) Security

AppendixA. Basic Concepts from Linear Algebra Appendix B. Measures of Security and Secrecy Appendix C. Data Encryption Standard (DES) Appendix D. Simplified AES Appendix E. Mathematical Basis of the Birthday Attack