Cryptography and Network Security: Principles and Practice, Global Edition, 8th edition

Published by Pearson (January 10, 2023) © 2023

  • William Stallings
Products list

Access details

  • Instant access once purchased
  • 12-month access
  • Offline access via app

Features

  • Sage cryptographic algorithms
  • Coverage of Cloud security
  • Embedded videos and media
  • Add notes and highlight
Products list

Details

  • A print copy
  • Free shipping

Features

  • Security design principles
  • Sage cryptographic algorithms
  • Coverage of both PGP and S/MIME
  • Coverage of Cloud security

This product is expected to ship within 10-12 business days for New Zealand customers.

For courses in Cryptography, Computer Security, and Network Security

Keep pace with the fast-moving field of cryptography and network security

Stallings' Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.

  • 1. Computer and Network Security Concepts
  • 2. Introduction to Number Theory
  • 3. Classical Encryption Techniques
  • 4. Block Ciphers and the Data Encryption Standard
  • 5. Finite Fields
  • 6. Advanced Encryption Standard
  • 7. Block Cipher Operation
  • 8. Random Bit Generation and Stream Ciphers
  • 9. Public-Key Cryptography and RSA
  • 10. Other Public-Key Cryptosystems
  • 11. Cryptographic Hash Functions
  • 12. Message Authentication Codes
  • 13. Digital Signatures
  • 14. Lightweight Cryptography and Post-Quantum Cryptography
  • 15. Key Management and Distribution
  • 16. User Authentication Protocols
  • 17. Transport-Level Security
  • 18. Wireless Network Security
  • 19. Electronic Mail Security
  • 20. IP Security
  • 21. Network Endpoint Security
  • 22. Cloud Security
  • 23. Internet of Things (IoT) Security
  • Appendix A. Basic Concepts from Linear Algebra
  • Appendix B. Measures of Security and Secrecy
  • Appendix C. Data Encryption Standard (DES)
  • Appendix D. Simplified AES
  • Appendix E. Mathematical Basis of the Birthday Attack

Need help? Get in touch