Cryptography and Network Security: Principles and Practice, International Edition, 6th Edition Front Cover

Cryptography and Network Security: Principles and Practice, International Edition, 6th Edition

  • Length: 758 pages
  • Edition: International ed of 6th revised ed
  • Publisher:
  • Publication Date: 2014
  • ISBN-10: 0273793357
  • ISBN-13: 9780273793359
  • Sales Rank: #5552386 (See Top 100 Books)
Description

For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a reference for a system engineer, programmer, system manager, network manager, product marketing personnel, or system support specialist.

A practical survey of cryptography and network security with unmatched support for instructors and students

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

Table of Contents

Chapter 1 Overview

PART ONE: SYMMETRIC CIPHERS
Chapter 2 Classical Encryption Techniques
Chapter 3 Block Ciphers and the Data Encryption Standard
Chapter 4 Basic Concepts in Number Theory and Finite Fields
Chapter 5 Advanced Encryption Standard
Chapter 6 Block Cipher Operation
Chapter 7 Pseudorandom Number Generation and Stream Ciphers

PART TWO: ASYMMETRIC CIPHERS
Chapter 8 More Number Theory
Chapter 9 Public-Key Cryptography and RSA
Chapter 10 Other Public-Key Cryptosystems

PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 11 Cryptographic Hash Functions
Chapter 12 Message Authentication Codes
Chapter 13 Digital Signatures

PART FOUR: MUTUAL TRUST
Chapter 14 Key Management and Distribution
Chapter 15 User Authentication

PART FIVE: NETWORK AND INTERNET SECURITY
Chapter 16 Network Access Control and Cloud Security
Chapter 17 Transport-Level Security
Chapter 18 Wireless Network Security
Chapter 19 Electronic Mail Security
Chapter 20 IP Security

Appendix A Projects for Teaching Cryptography and Network Security
Appendix B Sage Examples

To access the link, solve the captcha.
Subscribe