Cryptography and Network Security: Principles and Practice, 8th edition

Published by Pearson (September 15, 2020) © 2020

  • William Stallings
Products list

eTextbook features

  • Instant access to eTextbook
  • Search, highlight, and notes
  • Create flashcards
Products list

Details

  • A print text you can rent
  • Fulfilled by eCampus.com
  • Option to keep after rental expires

Keep pace with the fast-moving field of cryptography and network security with Cryptography and Network Security. Stallings' Cryptography and Network Security introduces you to the compelling and evolving field of cryptography and network security. The purpose of this text is to provide a practical survey of both the principles and practice of cryptography and network security.

The first part of the text explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part deals with the practice of network security, covering practical applications in use to provide network security.

The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened and illustrations have been improved based on extensive reviews by instructors in the field.

1. Computer and Network Security Concepts
2. Introduction to Number Theory
3. Classical Encryption Techniques
4. Block Ciphers and the Data Encryption Standard
5. Finite Fields
6. Advanced Encryption Standard
7. Block Cipher Operation
8. Random Bit Generation and Stream Ciphers
9. Public-Key Cryptography and RSA
10. Other Public-Key Cryptosystems
11. Cryptographic Hash Functions
12. Message Authentication Codes
13. Digital Signatures
14. Lightweight Cryptography and Post-Quantum Cryptography
15. Key Management and Distribution
16. User Authentication Protocols
17. Transport-Level Security
18. Wireless Network Security
19. Electronic Mail Security
20. IP Security
21. Network Endpoint Security
22. Cloud Security
23. Internet of Things (IoT) Security
Appendix A. Basic Concepts from Linear Algebra
Appendix B. Measures of Security and Secrecy
Appendix C. Data Encryption Standard (DES)
Appendix D. Simplified AES
Appendix E. Mathematical Basis of the Birthday Attack

This publication contains markup to enable structural navigation and compatibility with assistive technologies. Images in the publication are fully described. The publication supports text reflow, is screen-reader friendly, and contains no content hazards known to cause adverse physical reactions.

Need help? Get in touch