0

My Bag

0.00

Download App

Cryptography And Network Security

Cryptography And Network Security

by William Stallings

  • ISBN

    :  

    9788177587746

  • Publisher

    :  

    Pearson

  • Subject

    :  

    Computer Science, null

  • Binding

    :  

    Paperback

  • Pages

    :  

    698

  • Year

    :  

    2011

290.0

290.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. For Sale in Indian subcontinent only Features Consistent chapter pedagogy – Each chapter includes homework problems, review questions, a list of key words, suggestions for further reading, and recommended Web sites. Detailed, chapter-by-chapter summary of each part– Appears at the beginning of that part. Abundant homework and class-work assignment material An extensive glossary, a list of frequently used acronyms, and a bibliography. Simplified AES (Advanced Encryption Standard) – An educational, simplified version of AES, that enables students to grasp the essentials of AES more easily. New block cipher modes of operation – Includes the CMAC mode for authentication and the CCM mode for authenticated encryption. Expanded, updated treatment of intruders and malicious software. Coverage of the essential new topic of public key infrastructure (PKI). Updated, expanded content throughout to bring material up to date. New Online Appendices that supplement the material in the book. Writing assignments – Now included in the instructor's material to facilitate learning and expand instructor options. Programming assignments – Now includes a number of end-of-chapter programming assignments that can be programmed in any language; facilitates learning and expand instructor options. Laboratory exercises – Adds a new set of lab exercises to the instructor package Approximately 50% more end-of-chapter homework problems. Table of Content Notation Preface Reader's Guide SYMMETRIC CIPHERS Overview Classical Encryption Techniques Block Ciphers and the Data Encryption Standard Introduction to Finite Fields Advanced Encryption Standard More on Symmetric Ciphers Confidentiality Using Symmetric Encryption PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS Introduction to Number Theory Public-Key Cryptography and RSA Key Management; Other Public-Key Cryptosystems Message Authentication and Hash Functions Hash and Mac Algorithms Digital Signatures and Authentication Protocols NETWORK SECURITY PRACTICE Authentication Applications Electronic Mail Security IP Security Web Security SYSTEM SECURITY Intruders Malicious Software FirewallsAPPENDICES Appendix A. Standards and Standard-Setting Organizations Appendix B. Projects for Teaching Cryptography and Network Security Online Appendices Appendix C. Simplified Des Appendix D. The Meaning of Mod Appendix E. More on Simplified AES Appendix F. Knapsack Public-Key Algorithm Appendix G. Proof of The Digital Signature Algorithm Glossary References Index List of Acronyms

Related Items

-

of

  • OFFER

    Optimizing Voice in ATM/IP Mobile Networks

    Juliet Bates

    Starts At

    3948.0

    5561.0

    29% OFF

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • The Man-eating Leopard of Rudraprayag (Oxford India Paperbacks)

    Jim Corbett

    Starts At

    275.0

  • OFFER

    Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition

    Douglas R. Hofstadter

    Starts At

    813.0

    1099.0

    26% OFF

  • Biomedical Instrumentation and Measurements

    Weibell J Fred

    Starts At

    350.0

  • OFFER

    WritingBetter Requirements

    Ian Alexander

    Starts At

    8252.0

    9596.0

    14% OFF

  • OFFER

    Designing Concurrent, Distributed, and Real-Time Applications with UML

    Hassan Gomaa

    Starts At

    6079.0

    7999.0

    24% OFF

  • OFFER

    Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)

    Christopher G. Langton

    Starts At

    6602.0

    7677.0

    14% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- Bag Empty

Your Bag is Empty!!

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : null Total Savings        : Grand Total :

Order Summary