Cryptography and network security principles and practice

For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security A practical survey of cryptography and network security with unmatched support for instructors and students In this age of universal electronic connectivity, viruses and hackers, elect...

Full description

Saved in:
Bibliographic Details
Main Author: Stallings, William
Format: Book
Language:English
Published: Harlow, Essex Pearson 2014.
Edition:6th ed.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Chapter 0 Guide for Readers and Instructors
  • Chapter 1 Overview
  • Part One Symmetric Ciphers
  • Chapter 2 Classical Encryption Techniques
  • Chapter 3 Block Ciphers and the Data Encryption Standard
  • Chapter 4 Basic Concepts in Number Theory and Finite Fields
  • Chapter 5 Advanced Encryption Standard
  • Chapter 6 Block Cipher Operation
  • Chapter 7 Pseudorandom Number Generation and Stream Ciphers
  • Part Two Asymmetric Ciphers
  • Chapter 8 More Number Theory
  • Chapter 9 Public-Key Cryptography and RSA
  • Chapter 10 Other Public-Key Cryptosystems
  • Part Three Cryptographic Data Integrity Algorithms
  • Chapter 11 Cryptographic Hash Functions
  • Chapter 12 Message Authentication Codes
  • Chapter 13 Digital Signatures
  • Part Four Mutual Trust
  • Chapter 14 Key Management and Distribution
  • Chapter 15 User Authentication
  • Part Five Network And Internet Security
  • Chapter 16 Network Access Control and Cloud Security
  • Chapter 17 Transport-Level Security
  • Chapter 18 Wireless Network Security
  • Chapter 19 Electronic Mail Security
  • Chapter 20 IP Security
  • Appendix A Projects for Teaching Cryptography and Network Security
  • Appendix B Sage Examples
  • References
  • Credits
  • Index
  • Online Chapters and Appendices1
  • Part Six System Security
  • Chapter 21 Malicious Software
  • Chapter 22 Intruders
  • Chapter 23 Firewalls
  • Part seven Legal And Ethical Issues
  • Chapter 24 Legal and Ethical Issues
  • Appendix C Sage Exercises
  • Appendix D Standards and Standards-Setting Organizations
  • Appendix E Basic Concepts from Linear Algebra
  • Appendix F Measures of Security and Secrecy
  • Appendix G Simplified DES
  • Appendix H Evaluation Criteria for AES
  • Appendix I More on Simplified AES
  • Appendix J Knapsack Public-Key Algorithm
  • Appendix K Proof of the Digital Signature Algorithm
  • Appendix L TCP/IP and OSI
  • Appendix M Java Cryptographic APIs
  • Appendix N MD5 and Whirlpool Hash Functions
  • Appendix O Data Compression Using ZIP
  • Appendix P More on PGP
  • Appendix Q The International Reference Alphabet
  • Appendix R Proof of the RSA Algorithm
  • Appendix S Data Encryption Standard (DES)
  • Appendix T Kerberos Encryption Techniques
  • Appendix U Mathematical Basis of the Birthday Attack
  • Appendix V Evaluation Criteria for SHA-3.