Citronic

Cryptography and Network Security: Principles and Practice by William Stallings

Description: Cryptography and Network Security by William Stallings The Principles and Practice of Cryptography and Network Security Stallings Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material — including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience. FORMAT Paperback LANGUAGE English CONDITION Brand New Author Biography Dr. William Stallings has authored 18 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products. He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering. Table of Contents 1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Key Management and Distribution 15. User Authentication Protocols 16. Network Access Control and Cloud Security 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security Appendix A Projects for Teaching Cryptography and Network Security Appendix B Sage Examples Long Description The Principles and Practice of Cryptography and Network Security Stallings Cryptography and Network Security , Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material -- including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience. Feature Cryptography and Network Security offers the following features to facilitate learning: NEW! Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes. NEW! A tremendous amount of original supporting material for students is available online , at two Web locations: The Companion Web site The Premium Content site NEW! Fundamental security design principles in Chapter 1 includes a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security. NEW! Attack surfaces and attack trees in Chapter 1 includes a new section describing these two concepts, which are useful in evaluating and classifying security threats. NEW! Email Security : Chapter 19 has been completely rewritten to provide a comprehensive and up-to-date discussion of email security. These discussions include: Email threats and a comprehensive approach to email security. How STARTTLS provides confidentiality and authentication for SMTP. DNSSEC and its role in supporting email security. DNS-based Authentication of Named Entities (DANE) and the use of this approach to enhance security for certificate use in SMTP and S/MIME. Sender Policy Framework (SPF), the standardized way for a sending domain to identify and assert the mail senders for a given domain. Domain-based Message Authentication, Reporting, and Conformance (DMARC), which allows email senders to specify policy on how their mail should be handled, the types of reports that receivers can send back, and the frequency those reports should be sent. Treatment of S/MIME reflects the latest version 3.2. DomainKeys Identified Mail (DKIM) is updated. NEW! The narrative throughout has been clarified and tightened while the illustrations are new and improved. UPDATED! Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject. UPDATED! Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses. Complete coverage of authentication and digital signatures enables students to compare and evaluate competing approaches to understand each better. A unified, comprehensive treatment of mutual trust topics explore key management and user authentication, which are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved. Approximately 300 problems reinforce material in the text and introduce new concepts and techniques at the end of each chapter. A solid yet easy-to-follow mathematical background provides a foundation to assess the relative strengths of various approaches without needing a prior understanding of number theory and probability. This gives the student a clear understanding of the math required. Coverage of number theory and finite fields, including numerous worked-out examples, make the abstract subject matter clear. UPDATED! Comprehensive, up-to-date coverage of IP Security, namely IPSec, one of the most complex and important of the new network security standards. Coverage of both PGP and S/MIME for electronic mail security explores the two most important approaches to email security, giving the student an understanding of both schemes at a detailed technical level. UPDATED! A comprehensive and unified discussion of the threats of intruders (hackers) and viruses looks at the distinctions and similarities of the two. Students gain a greater understanding of both topics by exploring the both in the same chapter. UPDATED! The material on number theory is consolidated into a single chapter, Chapter 2. This makes for a convenient reference and relevant portions of it can be assigned as needed. UPDATED! The chapter on finite fields is updated and expanded with additional text and new figures to enhance understanding. UPDATED! The relatively new format-preserving encryption mode of encryption is covered in a new section in Chapter 7. The format is seeing increasing commercial success, which is covered thoroughly in the section. Conditioning and health testing for true random number generators provides coverage of these important topics in Chapter 8. UPDATED! The user authentication model in Chapter 15 includes a new description of a general model for user authentication, which helps to unify the discussion of the various approaches. UPDATED! The material on cloud security in Chapter 16 is updated and expanded in the new edition to reflect its importance and recent developments. UPDATED! The treatment of Transport Layer Security (TLS) in Chapter 17 is updated and reorganized to improve clarity. It now includes a discussion of the new TLS version 1.3. The Seventh Edition offers a tremendous amount of original supporting material for students online at two Web locations: The Companion Web site , at WilliamStallings.com/Cryptography (click on Student Resources link), includes a list of relevant links organized by chapter and an errata sheet for the book. The purchase of this textbook also grants access to the Premium Content site for six months. It includes the following materials: Online chapters: To limit the size and cost of the book, four chapters of the book are provided in PDF format. This includes three chapters on computer and one on legal and ethical issues. The chapters are listed in this books table of contents. Online appendices: There are numerous interesting topics that support material found in the text but whose inclusion is not warranted in the printed text. A total of 20 online appendices cover these topics for the interested student. The appendices are listed in this books table of contents. Homework problems and solutions: To aid the student in understanding the material, a separate set of homework problems with solutions are available. Key papers: A number of papers from the professional literature, many hard to find, are provided for further reading. Supporting documents: A variety of other useful documents are referenced in the text and provided online. Sage code: The Sage code from the examples in Appendix B is useful in case the student wants to play around with the examples. The text is accompanied by the following supplementary material to aid instruction: Solutions manual: Solutions to all end-of-chapter Review Questions and Problems. Projects manual: Suggested project assignments for all of the project categories listed below. PowerPoint slides: A set of slides covering all chapters, suitable for use in lecturing. PDF files: Reproductions of all figures and tables from the book. Test bank: A chapter-by-chapter set of questions with a separate file of answers. Sample syllabuses: The text contains more material than can be conveniently covered in one semester. Accordingly, instructors are provided with several sample syllabuses that guide the use of the text within limited time. These samples are based on real-world experience by professors with the fifth edition. New Feature Cryptography and Network Security offers the following features to facilitate learning: Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes. A tremendous amount of original supporting material for students is available online , at two Web locations: The Companion Web site The Premium Content site Fundamental security design principles in Chapter 1 includes a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security. Attack surfaces and attack trees in Chapter 1 includes a new section describing these two concepts, which are useful in evaluating and classifying security threats. Email Security : Chapter 19 has been completely rewritten to provide a comprehensive and up-to-date discussion of email security. These discussions include: Email threats and a comprehensive approach to email security. How STARTTLS provides confidentiality and authentication for SMTP. DNSSEC and its role in supporting email security. DNS-based Authentication of Named Entities (DANE) and the use of this approach to enhance security for certificate use in SMTP and S/MIME. Sender Policy Framework (SPF), the standardized way for a sending domain to identify and assert the mail senders for a given domain. Domain-based Message Authentication, Reporting, and Conformance (DMARC), which allows email senders to specify policy on how their mail should be handled, the types of reports that receivers can send back, and the frequency those reports should be sent. Treatment of S/MIME reflects the latest version 3.2. DomainKeys Identified Mail (DKIM) is updated. The narrative throughout has been clarified and tightened while the illustrations are new and improved. UPDATED! Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject. UPDATED! Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses. UPDATED! Comprehensive, up-to-date coverage of IP Security, namely IPSec, one of the most complex and important of the new network security standards. UPDATED! A comprehensive and unified discussion of the threats of intruders (hackers) and viruses looks at the distinctions and similarities of the two. Students gain a greater understanding of both topics by exploring the both in the same chapter. UPDATED! The material on number theory is consolidated into a single chapter, Chapter 2. This makes for a convenient reference and relevant portions of it can be assigned as needed. UPDATED! The chapter on finite fields is updated and expanded with additional text and new figures to enhance understanding. UPDATED! The relatively new format-preserving encryption mode of encryption is covered in a new section in Chapter 7. The format is seeing increasing commercial success, which is covered thoroughly in the section. UPDATED! The user authentication model in Chapter 15 includes a new description of a general model for user authentication, which helps to unify the discussion of the various approaches. UPDATED! The material on cloud security in Chapter 16 is updated and expanded in the new edition to reflect its importance and recent developments. UPDATED! The treatment of Transport Layer Security (TLS) in Chapter 17 is updated and reorganized to improve clarity. It now includes a discussion of the new TLS version 1.3. Details ISBN0134444280 Author William Stallings Year 2016 ISBN-10 0134444280 ISBN-13 9780134444284 Format Paperback Language English Edition 7th Media Book Residence US Pages 768 Short Title CRYPTOGRAPHY & NETWORK SECU-7E Subtitle Principles and Practice Imprint Pearson Country of Publication United States Replaces 9780133354690 AU Release Date 2016-02-24 NZ Release Date 2016-02-24 UK Release Date 2016-02-24 Publisher Pearson Education (US) Edition Description 7th edition Replaced by 9780135764039 DEWEY 005.8 Audience Tertiary & Higher Education Publication Date 2016-03-02 US Release Date 2016-03-02 We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:97781516;

Price: 527.16 AUD

Location: Melbourne

End Time: 2024-12-23T02:13:02.000Z

Shipping Cost: 0 AUD

Product Images

Cryptography and Network Security: Principles and Practice by William Stallings

Item Specifics

Restocking fee: No

Return shipping will be paid by: Buyer

Returns Accepted: Returns Accepted

Item must be returned within: 30 Days

Format: Paperback

Language: English

ISBN-13: 9780134444284

Author: William Stallings

Type: NA

Book Title: Cryptography and Network Security

Publication Name: NA

Recommended

Applied Cryptography: Protocols, Algorithms, and Source Code in C - VERY GOOD
Applied Cryptography: Protocols, Algorithms, and Source Code in C - VERY GOOD

$4.69

View Details
Pro Cryptography and Cryptanalysis with C++23: Creating and Programming Advanced
Pro Cryptography and Cryptanalysis with C++23: Creating and Programming Advanced

$53.02

View Details
Codes and Cryptography by Dominic Welsh (1988, Paperback)
Codes and Cryptography by Dominic Welsh (1988, Paperback)

$6.50

View Details
Cryptography: Theory and Practice, Third Edition by Douglas R Stinson: Used
Cryptography: Theory and Practice, Third Edition by Douglas R Stinson: Used

$10.24

View Details
Cryptography and Public Key Infrastructure on the Internet by
Cryptography and Public Key Infrastructure on the Internet by

$31.19

View Details
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C

$6.49

View Details
Cryptography and Network Security: Principles and Practice by Stallings, Willia
Cryptography and Network Security: Principles and Practice by Stallings, Willia

$42.61

View Details
Cryptography and Network Security : Principles and Practice Willi
Cryptography and Network Security : Principles and Practice Willi

$6.67

View Details
Cryptography: Cracking Codes
Cryptography: Cracking Codes

$5.20

View Details
Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics...
Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics...

$22.28

View Details