rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780135764039

Pearson eText for Cryptography and Network Security Principles and Practice -- Access Card

by
  • ISBN13:

    9780135764039

  • ISBN10:

    0135764033

  • Edition: 8th
  • Format: Etext w/Access Card
  • Copyright: 2019-06-25
  • Publisher: PEARSO
  • Purchase Benefits
This product is included in:
Learn More
List Price: $67.90 Save up to $16.96
  • Digital
    $63.67*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Keep pace with the fast-moving field of cryptography and network security

Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.

The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.

For courses in Cryptography, Computer Security, and Network Security.

Pearson eText is an easy-to-use digital textbook that you can purchase on your own or instructors can assign for their course. The mobile app lets you keep on learning, no matter where your day takes you, even offline. You can also add highlights, bookmarks, and notes in your Pearson eText to study how you like.

NOTE: This ISBN is for the Pearson eText access card. Pearson eText is a fully digital delivery of Pearson content. Before purchasing, check that you have the correct ISBN. To register for and use Pearson eText, you may also need a course invite link, which your instructor will provide. Follow the instructions provided on the access card to learn more.

Author Biography

Dr. William Stallings has authored 19 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.

 

In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

 

He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.

 

Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering.

Table of Contents

1. Computer and Network Security Concepts

2. Introduction to Number Theory

3. Classical Encryption Techniques

4. Block Ciphers and the Data Encryption Standard

5. Finite Fields

6. Advanced Encryption Standard

7. Block Cipher Operation

8. Random Bit Generation and Stream Ciphers

9. Public-Key Cryptography and RSA

10. Other Public-Key Cryptosystems

11. Cryptographic Hash Functions

12. Message Authentication Codes

13. Digital Signatures

14. Lightweight Cryptography and Post-Quantum Cryptography

15. Key Management and Distribution

16. User Authentication Protocols

17. Transport-Level Security

18. Wireless Network Security

19. Electronic Mail Security

20. IP Security

21. Network Endpoint Security

22. Cloud Security

23. Internet of Things (IoT) Security

Appendix A  Basic Concepts from Linear Algebra

Appendix B  Measures of Security and Secrecy

Appendix C  Data Encryption Standard (DES)

Appendix D  Simplified AES

Appendix E  Mathematical Basis of the Birthday Attack

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program