Cryptography and network security principles and practice

For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security A practical survey of cryptography and network security with unmatched support for instructors and students In this age of universal electronic connectivity, viruses and hackers, elect...

Full description

Saved in:
Bibliographic Details
Main Author: Stallings, William
Format: Book
Language:English
Published: Harlow, Essex Pearson 2014.
Edition:6th ed.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :TK 5105.59 .S73 2014

MARC

LEADER 00000nam a2200000 a 4500
001 98961
003 MY-KLNDU
005 20241220023016.0
008 141013s2014 enka bi 000 0 eng d
020 |a 9780273793359 (pbk: international ed.) 
020 |a 0273793357 (pbk: international ed.) 
039 9 |a 201504111636  |b zul  |c 201412111548  |d shahrim  |y 201410131129  |z hasniza 
040 |a UPNM 
090 |a TK 5105.59  |b .S73 2014 
100 1 |a Stallings, William 
245 1 0 |a Cryptography and network security  |b principles and practice  |c William Stallings. 
250 |a 6th ed. 
260 |a Harlow, Essex  |b Pearson  |c 2014. 
300 |a 751 p.  |b ill.  |c 24 cm. 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 0 Guide for Readers and Instructors -- Chapter 1 Overview -- Part One Symmetric Ciphers -- Chapter 2 Classical Encryption Techniques -- Chapter 3 Block Ciphers and the Data Encryption Standard -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- Chapter 5 Advanced Encryption Standard -- Chapter 6 Block Cipher Operation -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- Part Two Asymmetric Ciphers -- Chapter 8 More Number Theory -- Chapter 9 Public-Key Cryptography and RSA -- Chapter 10 Other Public-Key Cryptosystems -- Part Three Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- Chapter 12 Message Authentication Codes -- Chapter 13 Digital Signatures -- Part Four Mutual Trust -- Chapter 14 Key Management and Distribution -- Chapter 15 User Authentication -- Part Five Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- Chapter 17 Transport-Level Security -- Chapter 18 Wireless Network Security -- Chapter 19 Electronic Mail Security -- Chapter 20 IP Security -- Appendix A Projects for Teaching Cryptography and Network Security -- Appendix B Sage Examples -- References -- Credits -- Index -- Online Chapters and Appendices1 -- Part Six System Security -- Chapter 21 Malicious Software -- Chapter 22 Intruders -- Chapter 23 Firewalls -- Part seven Legal And Ethical Issues -- Chapter 24 Legal and Ethical Issues -- Appendix C Sage Exercises -- Appendix D Standards and Standards-Setting Organizations -- Appendix E Basic Concepts from Linear Algebra -- Appendix F Measures of Security and Secrecy -- Appendix G Simplified DES -- Appendix H Evaluation Criteria for AES -- Appendix I More on Simplified AES -- Appendix J Knapsack Public-Key Algorithm -- Appendix K Proof of the Digital Signature Algorithm -- Appendix L TCP/IP and OSI -- Appendix M Java Cryptographic APIs -- Appendix N MD5 and Whirlpool Hash Functions -- Appendix O Data Compression Using ZIP -- Appendix P More on PGP -- Appendix Q The International Reference Alphabet -- Appendix R Proof of the RSA Algorithm -- Appendix S Data Encryption Standard (DES) -- Appendix T Kerberos Encryption Techniques -- Appendix U Mathematical Basis of the Birthday Attack -- Appendix V Evaluation Criteria for SHA-3. 
520 |a For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security A practical survey of cryptography and network security with unmatched support for instructors and students In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Teaching and Learning Experience To provide a better teaching and learning experience, for both instructors and students, this program will: *Support Instructors and Students: An unparalleled support package for instructors and students ensures a successful teaching and learning experience.*Apply Theory and/or the Most Updated Research: A practical survey of both the principles and practice of cryptography and network security. *Engage Students with Hands-on Projects: Relevant projects demonstrate the importance of the subject, offer a real-world perspective, and keep students interested. 
592 |a 00013854  |b 25/11/2014  |c RM90.00  |h PVK 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory. 
650 0 |a Computer security. 
999 |a vtls000052890  |c 98961  |d 98961