Warning: session_start(): open(/tmp/sess_4075089167db1aab18f7c184f4fef97e, O_RDWR) failed: Disk quota exceeded (122) in /home/accounts/elsoluci/public_html/wp-content/plugins/custom-sidebars/inc/external/wpmu-lib/inc/class-thelib.php on line 145
Cryptography and Network Security - William Stallings - 4th Edition

Cryptography and Network Security – William Stallings – 4th Edition

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.

As the disciplines of and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of and network security.

First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today.

0: Reader’S Guide
1: Overview

Part One Symmetric Ciphers
2: Classical Encryption
3: Block Ciphers And The Encryption Standard
4: Introduction To Finite Fields
5: Advanced Encryption Standard
6: More On Symmetric Ciphers
7: Confidentiality Using Symmetric Encryption

Part Two Public-Key Encryption And Hash
8: Introduction To Theory
9: Public-Key Cryptography And Rsa
10: Key ; Other Public-Key Cryptosystems
11: Message Authentication And Hash Functions
12: Hash And Mac Algorithms
13: Digital Signatures And Authentication Protocols

Part Three Network Security Practice
14: Authentication Applications
15: Electronic Mail Security
16: IP Security
17: Web Security

Part Four System Security
18: Intruders
19: Malicious Software
20: Firewalls

Appendix A: Standards And Standard-Setting Organizations
Appendix B: Projects For Teaching Cryptography And Network Security

Online Appendices
Appendix C: Simplified Des
Appendix D: The Meaning Of Mod
Appendix E: More On Simplified Aes
Appendix F: Knapsack Public-Key Algorithm
Appendix G: Proof Of The Digital Signature Algorithm

Title: Cryptography and Network Security
Author: William Stallings
Edition: 4th Edition
ISBN: 0131873164 | 9780131873162
Type: Solution Manual
Language: English

1 Comment

  • Can you please leave feedback and comments here

    Your opinions and comments would be greatly appreciated. If you have comments or questions we've added this section so that we might have a dialogue with you.

Gautam Reply

You get a lot of respect from me for writing these helpful areslcti.

Complete all fields

twenty − six =

Warning: Unknown: open(/tmp/sess_4075089167db1aab18f7c184f4fef97e, O_RDWR) failed: Disk quota exceeded (122) in Unknown on line 0

Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (/tmp) in Unknown on line 0