Published by Pearson (July 29, 2024) © 2024

William Stallings
    Pearson eTextbook (180 Days access)
    €32,99
    Adding to cart… The item has been added
    ISBN-13: 9781292742366

    Cryptography and Network Security: Principles and Practice, Global Edition -- Pearson eText (OLP) 180 days Subscription ,8th edition

    Language: English

    For courses in Cryptography, Computer Security, and Network Security.

    Keep pace with the fast-moving field of cryptography and network security

    Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.

    1. Computer and Network Security Concepts
    2. Introduction to Number Theory
    3. Classical Encryption Techniques
    4. Block Ciphers and the Data Encryption Standard
    5. Finite Fields
    6. Advanced Encryption Standard
    7. Block Cipher Operation
    8. Random Bit Generation and Stream Ciphers
    9. Public-Key Cryptography and RSA
    10. Other Public-Key Cryptosystems
    11. Cryptographic Hash Functions
    12. Message Authentication Codes
    13. Digital Signatures
    14. Lightweight Cryptography and Post-Quantum Cryptography
    15. Key Management and Distribution
    16. User Authentication Protocols
    17. Transport-Level Security
    18. Wireless Network Security
    19. Electronic Mail Security
    20. IP Security
    21. Network Endpoint Security
    22. Cloud Security
    23. Internet of Things (IoT) Security
    • Appendix A. Basic Concepts from Linear Algebra
    • Appendix B. Measures of Security and Secrecy
    • Appendix C. Data Encryption Standard (DES)
    • Appendix D. Simplified AES
    • Appendix E. Mathematical Basis of the Birthday Attack