Features
Extend learning beyond the classroom
Pearson eText is an easy-to-use digital textbook that students can purchase on their own or you can assign for your course. Creating a course allows you to personalize your Pearson eText so students see the connection between their reading and what they learn in class, motivating them to keep reading, and keep learning. Learn more about Pearson eText.
Keeping pace with innovations in the field
- New - Chapter 1 includes a new section describing trust and trustworthinesstwo key concepts in computer and network security.
- New and Expanded - Coverage of Cloud security; IoT network security; and treatment of stream ciphers to keep pace with their growing importance.
- New - Two new sections cover:
- Rapidly emerging topic of lightweight cryptography in response to the Internet of Things and other small embedded systems that require new approaches to cryptography to accommodate the low power requirements, minimum memory, and limited processing power of IoT devices.
- Post-quantum cryptography in anticipation of the potential threat posed by quantum computers based on considerable research and development of cryptographic algorithms that are resistant to the threat.
Basic issues for network security capability
- Fundamental security design principles in Chapter 1 include a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security.
- A unified, comprehensive treatment of mutual trust topics explores key management and user authentication, which are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved.
- A solid yet easy-to-follow mathematical background provides a foundation to assess the relative strengths of various approaches without needing a prior understanding of number theory and probability, while giving students a clear understanding of the math required. Coverage of number theory and finite fields, including numerous worked-out examples, make the abstract subject matter clear.
Pedagogy that introduces students to cryptography and network security
- Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject.
- Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses.
- Complete coverage of authentication and digital signatures enables students to compare and evaluate competing approaches to understand each approach better.
- Coverage of both PGP and S/MIME for electronic mail security explores the two most important approaches to email security, giving the student an understanding of both schemes at a detailed technical level.
Benefits of creating a Pearson eText course
- Share highlights and notes with students. Add your personal teaching style to important topics, call out need-to-know information, or clarify difficult concepts directly in the eText.
- Access reading analytics. Use the dashboard to gain insight into how students are working in their eText to plan more effective instruction in and out of class.
- Schedule readings. Add due dates so that students know exactly what to read to come to class prepared.
- UPDATED - Read online or offline. Download the mobile app to read wherever life takes you, even offline. The app is available on the App Store® and Google Play Store.
- Integrate with your LMS. Get up and running quickly on the first day of class. LMS integration provides institutions, instructors, and students with single sign-on access to Pearson eText via Blackboard Learn, Canvas, Brightspace® by D2L®, and Moodle. Note: If you integrate Pearson eText with your LMS, students must redeem or purchase access through the LMS.
- NEW - Listen and learn. Play the full eText audiobook on the go or at home. (Available with select titles.)
- Engage learners with compelling media. Videos and animations bring key concepts to life, helping students place what they are reading into context. (Available with select titles.)
- UPDATED - Let students check their understanding. Flashcards help students review key terms and concepts. Students can use pre-built flashcards or create their own to study how they like. (Available with select titles.)
- Copyright 2020
- Pages: 832
- Edition: 8th
-
Alternate Binding
- ISBN-10: 0-13-576403-3
- ISBN-13: 978-0-13-576403-9
Keep pace with the fast-moving field of cryptography and network security
Stallings' Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.
The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.
For courses in Cryptography, Computer Security, and Network Security.
Pearson eText is an easy-to-use digital textbook that you can purchase on your own or instructors can assign for their course. The mobile app lets you keep on learning, no matter where your day takes you, even offline. You can also add highlights, bookmarks, and notes in your Pearson eText to study how you like.
NOTE: This ISBN is for the Pearson eText access card. Pearson eText is a fully digital delivery of Pearson content. Before purchasing, check that you have the correct ISBN. To register for and use Pearson eText, you may also need a course invite link, which your instructor will provide. Follow the instructions provided on the access card to learn more.
Table of Contents
1. Computer and Network Security Concepts
2. Introduction to Number Theory
3. Classical Encryption Techniques
4. Block Ciphers and the Data Encryption Standard
5. Finite Fields
6. Advanced Encryption Standard
7. Block Cipher Operation
8. Random Bit Generation and Stream Ciphers
9. Public-Key Cryptography and RSA
10. Other Public-Key Cryptosystems
11. Cryptographic Hash Functions
12. Message Authentication Codes
13. Digital Signatures
14. Lightweight Cryptography and Post-Quantum Cryptography
15. Key Management and Distribution
16. User Authentication Protocols
17. Transport-Level Security
18. Wireless Network Security
19. Electronic Mail Security
20. IP Security
21. Network Endpoint Security
22. Cloud Security
23. Internet of Things (IoT) Security
Appendix A. Basic Concepts from Linear Algebra
Appendix B. Measures of Security and Secrecy
Appendix C. Data Encryption Standard (DES)
Appendix D. Simplified AES
Appendix E. Mathematical Basis of the Birthday Attack