Skip to:Content
|
Bottom
Cover image for Cryptography and network security : principles and practices
Title:
Cryptography and network security : principles and practices
Personal Author:
Edition:
3rd ed.
Publication Information:
Upper Saddle River, N.J. : Prentice Hall, 2003
ISBN:
9780130914293

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010020194 TK5105.59 S713 2003 Open Access Book Book
Searching...
Searching...
30000010059059 TK5105.59 S713 2003 Open Access Book Book
Searching...
Searching...
33000000002815 TK5105.59 S713 2003 Open Access Book Gift Book
Searching...

On Order

Summary

Summary

For one-semester undergraduate/graduate level courses and for self-study. William Stallings offers a practical survey of both the principles and practice of cryptography and network security, reflecting the latest developments in the field.


Author Notes

William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 48 books on various aspects of this subject. 1 lc has won the annual Text and Academic Authors Association award five times for the best computer science and engineering text. He is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He maintains the Computer Science Technical Resciurce site at http://www.WilliamStallings.com/StudentSupport.html. Dr. Stallings holds a Ph.D. degree in Computer Science from M.LT. All of his Prentice Hall title's can he found at the Prentice Hall web site http://www.prenhall.com/stallings .


Table of Contents

1 Overview
I Conventional Encryption
2 Conventional Encryption: Classical Techniques
3 Conventional Encryption: Modern Techniques
4 Introduction to Finite Fields
5 Conventional Encryption: AES
6 Contemporary Symmetric Ciphers
7 Confidentiality Using Conventional Encryption
II Public-Key Encryption And Hash Functions
8 Introduction to Number Theory
9 Public-Key Cryptography
10 Key Management
11 Message Authentication and Hash Functions
12 Hash and Mac Algorithms
13 Digital Signatures and Authentication Protocols
III Network Security Practice
14 Authentication Applications
15 Electronic Mail Security
16 IP Security
17 Web Security
IV System Security
18 Intruders and Viruses
19 Firewalls
Appendix A Standards and Standard-Setting Organizations
Appendix B Projects for Teaching Cryptography and Network Security
Glossary
References
Index
List of Acronyms
Go to:Top of Page