- NEW - Revised and clarified content throughout—Features improved illustrations.
- NEW - Detailed discussion of Advanced Encryption Standard.
- NEW - Added chapter on finite fields—Chapter 4.
- NEW - Expanded treatment of Elliptic Curve Cryptography.
- NEW - More field-tested problems.
- A comprehensive treatment of cryptography.
- Chapters on IP security and Web security.
- Coverage of important network security tools and applications.
Exposes students to Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET.
- List of resources—Includes suggestions for further reading and recommended Web sites.
- Programming projects and research & report assignments—In the Instructor's Manual.
- On-line transparency masters, an Internet mailing list, and links to relevant Instructor's Support web site are available via http://www.williamstallings.com/
- Copyright 2003
- Edition: 3rd
- ISBN-10: 0-13-091429-0
- ISBN-13: 978-0-13-091429-3
William Stallings' book provides comprehensive and completely up-to-date coverage of computer organization and architecture including memory, I/O, and parallel systems. The text covers leading-edge areas, including superscalar design, IA-64 design features, and parallel processor organization trends. It meets students' needs by addressing both the fundamental principles as well as the critical role of performance in driving computer design. Providing an unparalleled degree of instructor and student support, including supplements and on-line resources through the book's website, the sixth edition is in the forefront in its field.
- IA-64/Itanium architecture: The chapter-length description and analysis includes predicated execution and speculative loading.
- Cache memory: The new edition devotes an entire chapter to this central element in the design of high-performance processors.
- Optical memory: Coverage is expanded and updated.
- Advanced DRAM architecture: More material has been added to cover this topic, including an updated discussion of SDRAM and RDRAM.
- SMPs, clusters, and NUMA systems: The chapter on parallel organization has been expanded and updated.
- Expanded instructor support: The book now provides extensive support for projects with its new website.
- Pedagogy: Each chapter now includes a list of review questions (as well as homework problems) and a list of key words.
Distinguishing Treatment Bus organization: detailed treatment and evaluation of key design issues. RISC: broad, unified presentation Microprogrammed implementation: full treatment for a firm grasp I/O functions and structures: full coverage, including interaction of I/O modules with the outside world and the CPU.
- Running examples: Provides numerous concrete examples, especially Pentium 4 and Power PC G4
- Unified instructional approach: Enables student to evaluate instruction set design issues.
- Instructors Resource CD-ROM: Includes solutions to homework problems, list of research projects, and list of simulation projects, plus student manual for both SimpleScalar and SMPCache, and a list of suggested reading assignments.
The author's website: http://www.WilliamStallings.com/COA6e provides support for students, instructors and professionals:
- Links to important up-to-date site-related text materials
- Provides transparency masters of figures and tables from the book in PDF format
- Offers course notes in PDF for handouts
- Includes a set of PowerPoint slides for lecturing
Table of Contents
I. CONVENTIONAL ENCRYPTION. 2. Conventional Encryption: Classical Techniques. 3. Conventional Encryption: Modern Techniques. 4. Introduction to Finite Fields. 5. Conventional Encryption: AES. 6. Contemporary Symmetric Ciphers. 7. Confidentiality Using Conventional Encryption.
II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS. 8. Introduction to Number Theory. 9. Public-Key Cryptography. 10. Key Management. 11. Message Authentication and Hash Functions. 12. Hash and Mac Algorithms. 13. Digital Signatures and Authentication Protocols.
III. NETWORK SECURITY PRACTICE. 14. Authentication Applications. 15. Electronic Mail Security. 16. IP Security. 17. Web Security.
IV. SYSTEM SECURITY. 18. Intruders and Viruses. 19. Firewalls. Appendix A. Standards and Standard-Setting Organizations. Appendix B. Projects for Teaching Cryptography and Network Security. Glossary. References. Index. List of Acronyms.