Thursday, August 15, 2019

Cryptography and Network Security Principles and Practice (5th Edition)



File Size: 8.21 Mb

Description
It is the purpose of this book to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security.

The subject, and therefore this book, draws on a variety of disciplines. In particular, it is impossible to appreciate the significance of some of the techniques discussed in this book without a basic understanding of number theory and some results from probability theory. Nevertheless, an attempt has been made to make the book self-contained.The book presents not only the basic mathematical results that are needed but provides the reader with an intuitive understanding of those results. Such background material is introduced as needed. This approach helps to motivate the material that is introduced, and the author considers this preferable to simply presenting all of the mathematical material in a lump at the beginning of the book.

Content:-
Notation
Preface
About the Author
Chapter 0: Reader’s Guide
Chapter 1: Overview
PART ONE: SYMMETRIC CIPHERS
Chapter 2: Classical Encryption Techniques
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 4: Basic Concepts in Number Theory and Finite Fields
Chapter 5: Advanced Encryption Standard
Chapter 6: Block Cipher Operation
Chapter 7: Pseudorandom Number Generation and Stream Ciphers
PART TWO: ASYMMETRIC CIPHERS
Chapter 8: More Number Theory
Chapter 9: Public-Key Cryptography and RSA
Chapter 10: Other Public-Key Cryptosystems
PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 11: Cryptographic Hash Functions
Chapter 12: Message Authentication Codes
Chapter 13: Digital Signatures
PART FOUR: MUTUAL TRUST
Chapter 14: Key Management and Distribution
Chapter 15: User Authentication Protocols
PART FIVE: NETWORK AND INTERNET SECURITY
Chapter 16: Transport-Level Security
Chapter 17: Wireless Network Security
Chapter 18: Electronic Mail Security
Chapter 19: IP Security
Chapter 20: Intruders
Chapter 21: Malicious Software
Chapter 22: Firewalls
PART SEVEN: LEGAL AND ETHICAL ISSUES
Chapter 23: Legal and Ethical Issues
ONLINE APPENDICES
Glossary

Author Details
"William Stallings"




Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment