Home > Store

Cryptography and Network Security: Principles and Practice (POD File), 8th Edition

Register your product to gain access to bonus material or receive a coupon.

Cryptography and Network Security: Principles and Practice (POD File), 8th Edition

eBook (Adobe DRM)

  • Your Price: $94.99
  • About Adobe DRM eBooks
  • This eBook requires the free Adobe® Digital Editions software.

    Before downloading this DRM-encrypted PDF, be sure to:


    • Install the free Adobe Digital Editions software on your machine. Adobe Digital Editions only works on Macintosh and Windows, and requires the Adobe Flash Player. Please see the official system requirements.
    • Authorize your copy of Adobe Digital Editions using your Adobe ID (select AdobeID as the eBook vendor). If you don't already have an Adobe ID, you can create one here.
Not for Sale

Description

  • Copyright 2020
  • Pages: 832
  • Edition: 8th
  • eBook (Adobe DRM)
  • ISBN-10: 0-13-576416-5
  • ISBN-13: 978-0-13-576416-9

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.

For courses in Cryptography, Computer Security, and Network Security.

This ISBN is for the Pearson eText access card.


NOTE: Pearson eText is a fully digital delivery of Pearson content and should only be purchased when required by your instructor. This ISBN is for the Pearson eText access card. In addition to your purchase, you will need a course invite link, provided by your instructor, to register for and use Pearson eText.

Keep pace with the fast-moving field of cryptography and network security

Stallings’ Cryptography and Network Security: Principles and Practice, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering  practical applications that have been implemented and are in use to provide network security.

The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.

Pearson eText is a simple-to-use, mobile-optimized, personalized reading experience. It lets students highlight, take notes, and review key vocabulary all in one place, even when offline. Seamlessly integrated videos and other rich media engage students and give them access to the help they need, when they need it. Educators can easily customize the table of contents, schedule readings, and share their own notes with students so they see the connection between their eText and what they learn in class – motivating them to keep reading, and keep learning. And, reading analytics offer insight into how students use the eText, helping educators tailor their instruction. Learn more about Pearson eText.




Sample Content

Table of Contents

1. Computer and Network Security Concepts

2. Introduction to Number Theory

3. Classical Encryption Techniques

4. Block Ciphers and the Data Encryption Standard

5. Finite Fields

6. Advanced Encryption Standard

7. Block Cipher Operation

8. Random Bit Generation and Stream Ciphers

9. Public-Key Cryptography and RSA

10. Other Public-Key Cryptosystems

11. Cryptographic Hash Functions

12. Message Authentication Codes

13. Digital Signatures

14. Lightweight Cryptography and Post-Quantum Cryptography

15. Key Management and Distribution

16. User Authentication Protocols

17. Transport-Level Security

18. Wireless Network Security

19. Electronic Mail Security

20. IP Security

21. Network Endpoint Security

22. Cloud Security

23. Internet of Things (IoT) Security

Appendix A  Basic Concepts from Linear Algebra

Appendix B  Measures of Security and Secrecy

Appendix C  Data Encryption Standard (DES)

Appendix D  Simplified AES

Appendix E  Mathematical Basis of the Birthday Attack

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.