Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptography and network security : principles and practice by William Stallings

By: Publication details: Noida : Pearson, 2017.Edition: 7th edDescription: 766 pISBN:
  • 9789332585225
Subject(s): DDC classification:
  • 22 005.8  STA-7ed.
Summary: Pearson brings to you the revised edition of Cryptography and Network Security by Stallings. In an age of viruses and hackers, electronic eavesdropping and electronic fraud on a global scale, securityis paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security—practical applications that have been implemented and are in use to provide network security.Features1. Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes.2. Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important algorithms and allow students to assess their relative strengths and weaknesses.3. New sections on fundamental security design principles, attack surfaces and attack trees.4. Chapter on Email Security has been completely rewritten to provide a comprehensive and upto-date discussion of the topic.5. Discussion on user authentication model, cloud security and Transport Layer Security has been thoroughly reorganized and expanded in the new edition to reflect recent developments.Table of ContentsChapter 1 Computer and Network Security Concepts Chapter 2 Introduction to Number TheoryChapter 3 Classical Encryption TechniquesChapter 4 Block Ciphers and the Data Encryption StandardChapter 5 Finite FieldsChapter 6 Advanced Encryption StandardChapter 7 Block Cipher OperationChapter 8 Random Bit Generation and Stream CiphersChapter 9 Public-Key Cryptography and RSAChapter 10 Other Public-Key CryptosystemsChapter 11 Cryptographic Hash FunctionsChapter 12 Message Authentication CodesChapter 13 Digital SignaturesChapter 14 Key Management and DistributionChapter 15 User Authentication ProtocolsChapter 16 Network Access Control and Cloud SecurityChapter 17 Transport-Level SecurityChapter 18 Wireless Network SecurityChapter 19 Electronic Mail SecurityChapter 20 IP Security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Learning Resource Centre 005.8 STA-7ed. (Browse shelf(Opens below)) Available 15290
Books Books Learning Resource Centre 005.8 STA-7ed. (Browse shelf(Opens below)) Available 15291
Total holds: 0

Pearson brings to you the revised edition of Cryptography and Network Security by Stallings. In an age of viruses and hackers, electronic eavesdropping and electronic fraud on a global scale, securityis paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security—practical applications that have been implemented and are in use to provide network security.Features1. Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes.2. Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important algorithms and allow students to assess their relative strengths and weaknesses.3. New sections on fundamental security design principles, attack surfaces and attack trees.4. Chapter on Email Security has been completely rewritten to provide a comprehensive and upto-date discussion of the topic.5. Discussion on user authentication model, cloud security and Transport Layer Security has been thoroughly reorganized and expanded in the new edition to reflect recent developments.Table of ContentsChapter 1 Computer and Network Security Concepts Chapter 2 Introduction to Number TheoryChapter 3 Classical Encryption TechniquesChapter 4 Block Ciphers and the Data Encryption StandardChapter 5 Finite FieldsChapter 6 Advanced Encryption StandardChapter 7 Block Cipher OperationChapter 8 Random Bit Generation and Stream CiphersChapter 9 Public-Key Cryptography and RSAChapter 10 Other Public-Key CryptosystemsChapter 11 Cryptographic Hash FunctionsChapter 12 Message Authentication CodesChapter 13 Digital SignaturesChapter 14 Key Management and DistributionChapter 15 User Authentication ProtocolsChapter 16 Network Access Control and Cloud SecurityChapter 17 Transport-Level SecurityChapter 18 Wireless Network SecurityChapter 19 Electronic Mail SecurityChapter 20 IP Security.

There are no comments on this title.

to post a comment.
Powered by Koha & maintained by LRC, JK Lakshmipat University, Jaipur
Contact: [email protected]
Copyright © 2022 LRC, JK Lakshmipat University, Jaipur. All Rights Reserved.