Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Cryptography and Network Security: Principles and Practice

Cryptography and Network Security: Principles and Practice

Great Research Book in Cryptography and Network Security: Principles and Practice

Author(s) Name:  William Stallings

About the Book:

   The book offers a practical survey of both the principles and practice of cryptography and network security, reflecting the latest developments in the field and this book recommended for one-semester undergraduate/graduate level courses and for self-study.
   In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security.
   The Seventh Edition streamlines subject matter with new and updated material — including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, students learn a powerful tool that can be used for virtually any mathematical application.

Table of Contents

  1. Computer and Network Security Concepts
  2. Introduction to Number Theory
  3. Classical Encryption Techniques
  4. Block Ciphers and the Data Encryption Standard
  5. Finite Fields
  6. Advanced Encryption Standard
  7. Block Cipher Operation
  8. Random Bit Generation and Stream Ciphers
  9. Public-Key Cryptography and RSA
  10. Other Public-Key Cryptosystems
  11. Cryptographic Hash Functions
  12. Message Authentication Codes
  13. Digital Signatures
  14. Key Management and Distribution
  15. User Authentication Protocols
   16. Network Access Control and Cloud Security
  17. Transport-Level Security
  18. Wireless Network Security
  19. Electronic Mail Security
  20. IP Security

ISBN:  9780134444697

Publisher:  Prentice Hall

Year of Publication:  2017

Book Link:  Home Page Url