Amazon cover image
Image from Amazon.com

Cryptography and network security : principles and practice / William Stallings.

By: Material type: TextPublication details: Pearson Education Inc, 2016.Edition: 6th edDescription: 660 pages ; 25 cmISBN:
  • 9789332518773
Subject(s):
Contents:
Chapter 0 Guide for Readers and Instructors -- chapter 1. Overview -- Part One. Symmetric Ciphers: chapter 2. Classical Encryption Techniques; chapter 3. Block Ciphers and the Data Encryption Standard; chapter 4. Basic Concepts in Number Theory and Finite Fields; chapter 5. Advanced Encryption Standard; chapter 6. Block Cipher Operation; chapter 7. Pseudorandom Number Generation and Stream Ciphers -- Part Two. Assymetric Ciphers: chapter 8. More Number Theory; chapter 9. Public-Key Cryptography and RSA; chapter 10. Other Public-Key Cryptosystems -- Part Three. Cryptographic Data Integrity Algorithms: chapter 11. Cryptographic Hash Functions; chapter 12. Message Authentication Codes; chapter 13. Digital Signatures Part Four: Mutual Trust: chapter 14. Key Management and Distribution; chapter 15. User Authentication -- Part Five. Network And Internet Security: chapter 16. Network Access Control and Cloud Security; chapter 17. Transport-Level Security; chapter 18. Wireless Network Security; chapter 19. Electronic Mail Security; chapter 20. IP Security -- Appendices: Appendix A. Projects for Teaching Cryptography and Network Security; Appendix B. Sage Examples.
Summary: For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security A practical survey of cryptography and network security with unmatched support for instructors and students In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Teaching and Learning Experience To provide a better teaching and learning experience, for both instructors and students, this program will: *Support Instructors and Students: An unparalleled support package for instructors and students ensures a successful teaching and learning experience.*Apply Theory and/or the Most Updated Research: A practical survey of both the principles and practice of cryptography and network security. *Engage Students with Hands-on Projects: Relevant projects demonstrate the importance of the subject, offer a real- world perspective, and keep students interested.
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Main RTC Library Main opac Main TEST 005.8 STA Available 30012591
Total holds: 0

Chapter 0 Guide for Readers and Instructors -- chapter 1. Overview -- Part One. Symmetric Ciphers: chapter 2. Classical Encryption Techniques; chapter 3. Block Ciphers and the Data Encryption Standard; chapter 4. Basic Concepts in Number Theory and Finite Fields; chapter 5. Advanced Encryption Standard; chapter 6. Block Cipher Operation; chapter 7. Pseudorandom Number Generation and Stream Ciphers -- Part Two. Assymetric Ciphers: chapter 8. More Number Theory; chapter 9. Public-Key Cryptography and RSA; chapter 10. Other Public-Key Cryptosystems -- Part Three. Cryptographic Data Integrity Algorithms: chapter 11. Cryptographic Hash Functions; chapter 12. Message Authentication Codes; chapter 13. Digital Signatures Part Four: Mutual Trust: chapter 14. Key Management and Distribution; chapter 15. User Authentication -- Part Five. Network And Internet Security: chapter 16. Network Access Control and Cloud Security; chapter 17. Transport-Level Security; chapter 18. Wireless Network Security; chapter 19. Electronic Mail Security; chapter 20. IP Security -- Appendices: Appendix A. Projects for Teaching Cryptography and Network Security; Appendix B. Sage Examples.

For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security A practical survey of cryptography and network security with unmatched support for instructors and students In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Teaching and Learning Experience To provide a better teaching and learning experience, for both instructors and students, this program will: *Support Instructors and Students: An unparalleled support package for instructors and students ensures a successful teaching and learning experience.*Apply Theory and/or the Most Updated Research: A practical survey of both the principles and practice of cryptography and network security. *Engage Students with Hands-on Projects: Relevant projects demonstrate the importance of the subject, offer a real- world perspective, and keep students interested.

Royal Thimphu College || All Right Reserved