Wiliam Stalling is onafhankelijk consultant voor fabrikanten van computers en netwerken, hun klanten, software ontwikkelingsbedrijven en onderzoeksinstituten van de overheid.
Meer over William StallingsCryptography and Network Security
Principles and Practice, Global Edition
Paperback Engels 2022 8e druk 9781292437484Samenvatting
Thistitle is a Pearson Global Edition. The editorial team at Pearson has workedclosely with educators around the world to include which is especially relevant to an international and diverse audience.
For coursesin Cryptography, Computer Security, and Network Security.
Keep pacewith the fast-moving field of cryptography and network security
Stallings’ Cryptographyand Network Security: Principles and Practice introduces studentsto the compelling and evolving field of cryptography and network security. Inan age of viruses and hackers, electronic eavesdropping, and electronic fraudon a global scale, security is paramount. The purpose of this book is toprovide a practical survey of both the principles and practice of cryptographyand network security. The first part of the book explores the basic issues tobe addressed by a network security capability and provides a tutorial andsurvey of cryptography and network security technology. The latter part of thebook deals with the practice of network security, covering practicalapplications that have been implemented and are in use to provide networksecurity.
The 8thEdition captures innovations and improvements in cryptography andnetwork security, while maintaining broad and comprehensive coverage of theentire field. In many places, the narrative has been clarified and tightened,and illustrations have been improved based on extensive reviews by professorswho teach the subject and by professionals working in the field.
Specificaties
Lezersrecensies
Inhoudsopgave
2. Introduction to Number Theory
3. Classical Encryption Techniques
4. Block Ciphers and the Data Encryption Standard
5. Finite Fields
6. Advanced Encryption Standard
7. Block Cipher Operation
8. Random Bit Generation and Stream Ciphers
9. Public-Key Cryptography and RSA
10. Other Public-Key Cryptosystems
11. Cryptographic Hash Functions
12. Message Authentication Codes
13. Digital Signatures
14. Lightweight Cryptography and Post-Quantum Cryptography
15. Key Management and Distribution
16. User Authentication Protocols
17. Transport-Level Security
18. Wireless Network Security
19. Electronic Mail Security
20. IP Security
21. Network Endpoint Security
22. Cloud Security
23. Internet of Things (IoT) Security
style="mso-special-character:line-break">
style="mso-special-character:line-break">
AppendixA. Basic Concepts from Linear Algebra
Appendix B. Measures of Security and Secrecy
Appendix C. Data Encryption Standard (DES)
Appendix D. Simplified AES
Appendix E. Mathematical Basis of the Birthday Attack
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan