Cryptography and Network Security: Principles and Practice, Global Edition, 8th edition
Published by Pearson (May 30, 2022) © 2022
- William Stallings
eTextbook
- Create notes, highlights and flashcards
- Intuitive search, video, quizzes and interactive features
- Translate text on-screen into over 100 languages
- Audiobook for on-the-go learning
- AI-powered support*
*Available for some titles
- A print text (hardcover or paperback)
- Free shipping
For courses in Cryptography, Computer Security, and Network Security.
Keep pace with the fast-moving field of cryptography and network security
Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.
The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.
Hallmark Features
Keeping pace with innovations in the field- NEW: Chapter 1 includes a new section describing trust and trustworthiness—two key concepts in computer and network security.
- NEW and EXPANDED: Coverage of Cloud security; IoT network security; and treatment of stream ciphers to keep pace with their growing importance.
- NEW: Two new sections cover:
- Rapidly emerging topic of lightweight cryptography in response to the Internet of Things and other small embedded systems that require new approaches to cryptography to accommodate the low power requirements, minimum memory, and limited processing power of IoT devices.
- Post-quantum cryptography in anticipation of the potential threat posed by quantum computers based on considerable research and development of cryptographic algorithms that are resistant to the threat.
- Fundamental security design principles in Chapter 1 include a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security.
- A unified, comprehensive treatment of mutual trust topics explores key management and user authentication, which are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved.
- A solid yet easy-to-follow mathematical background provides an intuitive understanding of the basic mathematical results given in the book. Coverage of number theory and finite fields, including numerous worked-out examples, make the abstract subject matter clear.
- Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject.
- Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses.
- Complete coverage of authentication and digital signatures enables students to compare and evaluate competing approaches to understand each approach better.
- Coverage of both PGP and S/MIME for electronic mail security explores the two most important approaches to email security, giving the student an understanding of both schemes at a detailed technical level.
New and Updated Features
- Chapter 1 includes a new section describing trust and trustworthiness–two key concepts in computer and network security.
- New and Expanded - Coverage of Cloud security; IoT network security; and treatment of stream ciphers to keep pace with their growing importance.
- Two new sections cover:
- Rapidly emerging topic of lightweight cryptography in response to the Internet of Things and other small embedded systems that require new approaches to cryptography to accommodate the low power requirements, minimum memory, and limited processing power of IoT devices.
- Post-quantum cryptography in anticipation of the potential threat posed by quantum computers based on considerable research and development of cryptographic algorithms that are resistant to the threat.
- Computer and Network Security Concepts
- Introduction to Number Theory
- Classical Encryption Techniques
- Block Ciphers and the Data Encryption Standard
- Finite Fields
- Advanced Encryption Standard
- Block Cipher Operation
- Random Bit Generation and Stream Ciphers
- Public-Key Cryptography and RSA
- Other Public-Key Cryptosystems
- Cryptographic Hash Functions
- Message Authentication Codes
- Digital Signatures
- Lightweight Cryptography and Post-Quantum Cryptography
- Key Management and Distribution
- User Authentication Protocols
- Transport-Level Security
- Wireless Network Security
- Electronic Mail Security
- IP Security
- Network Endpoint Security
- Cloud Security
- Internet of Things (IoT) Security
- Appendix A. Basic Concepts from Linear Algebra
- Appendix B. Measures of Security and Secrecy
- Appendix C. Data Encryption Standard (DES)
- Appendix D. Simplified AES
- Appendix E. Mathematical Basis of the Birthday Attack
Dr. William Stallings hasauthored 19 titles, and counting revised editions, over 40 books on computersecurity, computer networking, and computer architecture. His writings haveappeared in numerous publications, including the Proceedings of the IEEE,ACM Computing Reviews and Cryptologia. He has received 13 times theaward for the best Computer Science textbook of the year from the Text andAcademic Authors Association.
In over 30 years in thefield, he has been a technical contributor, technical manager, and an executivewith several high-technology firms. He has designed and implemented both TCP/IP-basedand OSI-based protocol suites on a variety of computers and operating systems,ranging from microcomputers to mainframes. As a consultant, he has advisedgovernment agencies, computer and software vendors, and major users on thedesign, selection, and use of networking software and products.
He created andmaintains the Computer Science Student Resource Site atComputerScienceStudent.com. This site provides documents and links on a varietyof subjects of general interest to computer science students (andprofessionals). He is a member of the editorial board of Cryptologia, ascholarly journal devoted to all aspects of cryptology.
Dr. Stallings holds aPhD from MIT in computer science and a BS from Notre Dame in electricalengineering.
Need help? Get in touch