HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Reflects continuous innovations and improvements while maintaining broad and comprehensive coverage of the entire field.
Familiarizes students with this conventional encryption algorithm designed to replace DES and triple DES.
Offers students a clear, succinct description of the necessary concepts in this area.
Explores a public-key technique that is becoming increasingly important and widespread.
Gives students the opportunity to practice and apply what they have learned.
Presents students with design principles and up-to-date descriptions of current cryptographic algorithms, as well as an in-depth survey of network-based and Internet-based security applications.
Discusses system-level security issues, including the threat of and counter measures for intruders and viruses, and the use of firewalls and trusted systems.
Exposes students to Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET.
Encourages students to expand and advance their knowledge and understanding of text topics.
Offers guidance on how to assign and structure the projects from a broad range of text topics.
William Stallings' book provides comprehensive and completely up-to-date coverage of computer organization and architecture including memory, I/O, and parallel systems. The text covers leading-edge areas, including superscalar design, IA-64 design features, and parallel processor organization trends. It meets students' needs by addressing both the fundamental principles as well as the critical role of performance in driving computer design. Providing an unparalleled degree of instructor and student support, including supplements and on-line resources through the book's website, the sixth edition is in the forefront in its field.
New Material
Distinguishing Treatment
Pedagogical Features
1. Overview.
I. CONVENTIONAL ENCRYPTION.
2. Conventional Encryption: Classical Techniques.II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS.
8. Introduction to Number Theory.III. NETWORK SECURITY PRACTICE.
14. Authentication Applications.IV. SYSTEM SECURITY.
18. Intruders and Viruses.