Pearson eText for Cryptography and Network Security Principles and Practice -- Access Card

by
Edition: 8th
Format: Etext w/Access Card
Pub. Date: 2019-06-25
Publisher(s): PEARSO
  • This product is included in:
    This product is included in Pearson+
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $71.30

Rent Textbook

Select for Price
There was a problem. Please try again later.

Buy Courseware

Rent Digital Options
$50.94

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

For courses in Cryptography, Computer Security, and Network Security.

This ISBN is for the Pearson eText access card.

 

Keep pace with the fast-moving field of cryptography and network security

Stallings’ Cryptography and Network Security: Principles and Practice , introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering  practical applications that have been implemented and are in use to provide network security.

 

The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.

 

Pearson eText is a simple-to-use, mobile-optimized, personalized reading experience. It lets students highlight, take notes, and review key vocabulary all in one place, even when offline. Seamlessly integrated videos and other rich media engage students and give them access to the help they need, when they need it. Educators can easily customize the table of contents, schedule readings, and share their own notes with students so they see the connection between their eText and what they learn in class — motivating them to keep reading, and keep learning. And, reading analytics offer insight into how students use the eText, helping educators tailor their instruction. Learn more about Pearson eText.

 

 

NOTE: Pearson eText is a fully digital delivery of Pearson content and should only be purchased when required by your instructor. This ISBN is for the Pearson eText access card. In addition to your purchase, you will need a course invite link, provided by your instructor, to register for and use Pearson eText.

 



Author Biography

Dr. William Stallings has authored 19 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.

 

In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.

 

He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.

 

Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering.

Table of Contents

1. Computer and Network Security Concepts

2. Introduction to Number Theory

3. Classical Encryption Techniques

4. Block Ciphers and the Data Encryption Standard

5. Finite Fields

6. Advanced Encryption Standard

7. Block Cipher Operation

8. Random Bit Generation and Stream Ciphers

9. Public-Key Cryptography and RSA

10. Other Public-Key Cryptosystems

11. Cryptographic Hash Functions

12. Message Authentication Codes

13. Digital Signatures

14. Lightweight Cryptography and Post-Quantum Cryptography

15. Key Management and Distribution

16. User Authentication Protocols

17. Transport-Level Security

18. Wireless Network Security

19. Electronic Mail Security

20. IP Security

21. Network Endpoint Security

22. Cloud Security

23. Internet of Things (IoT) Security

Appendix A  Basic Concepts from Linear Algebra

Appendix B  Measures of Security and Secrecy

Appendix C  Data Encryption Standard (DES)

Appendix D  Simplified AES

Appendix E  Mathematical Basis of the Birthday Attack

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.