Amazon cover image
Image from Amazon.com

Cryptography and network security Book principles and practice / William Stallings.

By: Contributor(s): Material type: TextTextEdition: Seventh editionDescription: 766 Pages : illustrations ; 24 cmISBN:
  • 9789673498208
Subject(s): DDC classification:
  • 005.8
Other classification:
  • 005.8
Summary: KEY BENEFIT: Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material ? including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience. KEY TOPICS: Computer and Network Security Concepts; Introduction to Number Theory; Classical Encryption Techniques; Block Ciphers and the Data Encryption Standard; Finite Fields; Advanced Encryption Standard; Block Cipher Operation; Random Bit Generation and Stream Ciphers; Public-Key Cryptography and RSA; Other Public-Key Cryptosystems; Cryptographic Hash Functions; Message Authentication Codes; Digital Signatures; Key Management and Distribution; User Authentication Protocols; Network Access Control and Cloud Security; Transport-Level Security; Wireless Network Security; Electronic Mail Security; IP Security
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Notes Date due Barcode Item holds
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 60651 (Browse shelf(Opens below)) Available 10001000060651
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 60652 (Browse shelf(Opens below)) Available 10001000060652
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 60653 (Browse shelf(Opens below)) Available 10001000060653
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 60654 (Browse shelf(Opens below)) Available 10001000060654
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 60655 (Browse shelf(Opens below)) Available 10001000060655
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 60656 (Browse shelf(Opens below)) Available 10001000060656
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 60657 (Browse shelf(Opens below)) Available 10001000060657
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 60658 (Browse shelf(Opens below)) Available 10001000060658
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books RES 005.8 STA-C 60659 (Browse shelf(Opens below)) Available 10001000060659
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books RES 005.8 STA-C 60660 (Browse shelf(Opens below)) Available 10001000060660
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 62549 (Browse shelf(Opens below)) Available 10001000062549
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 STA-C 63271 (Browse shelf(Opens below)) Available Paperback. 10001000063271
Total holds: 0

Includes index. Indian Subcontinent Adaptation Copyright ♭ 2017 Pearson India Education Services Pvt. Ltd.

KEY BENEFIT: Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material ? including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience. KEY TOPICS: Computer and Network Security Concepts; Introduction to Number Theory; Classical Encryption Techniques; Block Ciphers and the Data Encryption Standard; Finite Fields; Advanced Encryption Standard; Block Cipher Operation; Random Bit Generation and Stream Ciphers; Public-Key Cryptography and RSA; Other Public-Key Cryptosystems; Cryptographic Hash Functions; Message Authentication Codes; Digital Signatures; Key Management and Distribution; User Authentication Protocols; Network Access Control and Cloud Security; Transport-Level Security; Wireless Network Security; Electronic Mail Security; IP Security

All

All.

All.

There are no comments on this title.

to post a comment.