Home > Store

Cryptography and Network Security: Principles and Practice, 3rd Edition

Register your product to gain access to bonus material or receive a coupon.

Cryptography and Network Security: Principles and Practice, 3rd Edition


  • Sorry, this book is no longer in print.
Not for Sale



  • NEW - Revised and clarified content throughout—Features improved illustrations.
    • Reflects continuous innovations and improvements while maintaining broad and comprehensive coverage of the entire field.

  • NEW - Detailed discussion of Advanced Encryption Standard.
    • Familiarizes students with this conventional encryption algorithm designed to replace DES and triple DES.

  • NEW - Added chapter on finite fields—Chapter 4.
    • Offers students a clear, succinct description of the necessary concepts in this area.

  • NEW - Expanded treatment of Elliptic Curve Cryptography.
    • Explores a public-key technique that is becoming increasingly important and widespread.

  • NEW - More field-tested problems.
    • Gives students the opportunity to practice and apply what they have learned.

  • A comprehensive treatment of cryptography.
    • Presents students with design principles and up-to-date descriptions of current cryptographic algorithms, as well as an in-depth survey of network-based and Internet-based security applications.

  • Chapters on IP security and Web security.
    • Discusses system-level security issues, including the threat of and counter measures for intruders and viruses, and the use of firewalls and trusted systems.

  • Coverage of important network security tools and applications.
    • Exposes students to Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET.

  • List of resources—Includes suggestions for further reading and recommended Web sites.
    • Encourages students to expand and advance their knowledge and understanding of text topics.

  • Programming projects and research & report assignments—In the Instructor's Manual.
    • Offers guidance on how to assign and structure the projects from a broad range of text topics.

  • On-line transparency masters, an Internet mailing list, and links to relevant Instructor's Support web site are available via http://www.williamstallings.com/


  • Copyright 2003
  • Edition: 3rd
  • Book
  • ISBN-10: 0-13-091429-0
  • ISBN-13: 978-0-13-091429-3

William Stallings' book provides comprehensive and completely up-to-date coverage of computer organization and architecture including memory, I/O, and parallel systems. The text covers leading-edge areas, including superscalar design, IA-64 design features, and parallel processor organization trends. It meets students' needs by addressing both the fundamental principles as well as the critical role of performance in driving computer design. Providing an unparalleled degree of instructor and student support, including supplements and on-line resources through the book's website, the sixth edition is in the forefront in its field.

New Material

  • IA-64/Itanium architecture: The chapter-length description and analysis includes predicated execution and speculative loading.
  • Cache memory: The new edition devotes an entire chapter to this central element in the design of high-performance processors.
  • Optical memory: Coverage is expanded and updated.
  • Advanced DRAM architecture: More material has been added to cover this topic, including an updated discussion of SDRAM and RDRAM.
  • SMPs, clusters, and NUMA systems: The chapter on parallel organization has been expanded and updated.
  • Expanded instructor support: The book now provides extensive support for projects with its new website.
  • Pedagogy: Each chapter now includes a list of review questions (as well as homework problems) and a list of key words.

Distinguishing Treatment

  • Bus organization: detailed treatment and evaluation of key design issues.
  • RISC: broad, unified presentation
  • Microprogrammed implementation: full treatment for a firm grasp
  • I/O functions and structures: full coverage, including interaction of I/O modules with the outside world and the CPU.
  • Pedagogical Features

    • Running examples: Provides numerous concrete examples, especially Pentium 4 and Power PC G4
    • Unified instructional approach: Enables student to evaluate instruction set design issues.
    • Instructors Resource CD-ROM: Includes solutions to homework problems, list of research projects, and list of simulation projects, plus student manual for both SimpleScalar and SMPCache, and a list of suggested reading assignments.

    The author's website: http://www.WilliamStallings.com/COA6e provides support for students, instructors and professionals:
    • Links to important up-to-date site-related text materials
    • Provides transparency masters of figures and tables from the book in PDF format
    • Offers course notes in PDF for handouts
    • Includes a set of PowerPoint slides for lecturing

    Sample Content

    Table of Contents

     1. Overview.


     2. Conventional Encryption: Classical Techniques.
     3. Conventional Encryption: Modern Techniques.
     4. Introduction to Finite Fields.
     5. Conventional Encryption: AES.
     6. Contemporary Symmetric Ciphers.
     7. Confidentiality Using Conventional Encryption.


     8. Introduction to Number Theory.
     9. Public-Key Cryptography.
    10. Key Management.
    11. Message Authentication and Hash Functions.
    12. Hash and Mac Algorithms.
    13. Digital Signatures and Authentication Protocols.


    14. Authentication Applications.
    15. Electronic Mail Security.
    16. IP Security.
    17. Web Security.


    18. Intruders and Viruses.
    19. Firewalls.
    Appendix A. Standards and Standard-Setting Organizations.
    Appendix B. Projects for Teaching Cryptography and Network Security.
    List of Acronyms.


    Submit Errata

    More Information

    Unlimited one-month access with your purchase
    Free Safari Membership