Cryptography and Network Security : Principles and Practice 5th  Edition
    Share

    Cryptography and Network Security : Principles and Practice 5th Edition (English, Paperback, William Stallings)

    Cryptography and Network Security : Principles and Practice 5th Edition  (English, Paperback, William Stallings)

    4.3
    55 Ratings & 6 Reviews
    550
    Sold Out
    This item is currently out of stock
    Highlights
    • Language: English
    • Binding: Paperback
    • Publisher: Pearson
    • ISBN: 9788131761663, 8131761665
    • Edition: 5th Edition, 2011
    • Pages: 744
    Services
    • 10 Days Replacement Policy
      ?
    Description

    Cryptography And Network Security: Principles And Practice is a book that provides a practical introduction to the topics of network security and cryptography.


    Summary Of The Book

    The world is interconnected in many different ways as never before, and global communication networks and the world wide web have shrunk the world so that no part of it is too remote to remain unaffected by this communication explosion.


    Technology has brought up many benefits, bringing communication infrastructure and facilities to every part of the world. If information is empowerment, then anybody who cares to spend some time on a computer is now a privileged citizen of the world. But, like everything else, technology brings with it some major problems, and the most discussed one is security. Not all data is meant to be shared with everyone, and keeping information private and secure is a challenge. Hacking, virus, and other malware and many other threats to information security need to be dealt with everyday, every minute.


    This book introduces its readers to these concepts and the book has been divided into two parts. The first part provides an introduction the the subjects of network security and cryptography. It also explains the features and capabilities of these technologies. The second part takes a look at the various implementations of these technologies, and runs a survey of the technologies at work in the real world.


    The four years since the previous edition has seen a lot of innovations and developments in the field and this edition has been thoroughly revised to integrate the new technologies in the content, while still maintaining the basic format of the book.


    Following an introductory chapter, the book is divided into seven sections. They deal with symmetric and asymmetric ciphers, cryptographic algorithms for data integrity, mutual trust, network and Internet security, system security, and legal and ethical issues involved in security implementations.


    About William Stallings

    William Stallings has more than 30 years of experience in the field of computer and network security, having worked with many high-tech firms.
    Some of his other books are Computer Organization and Architecture: Designing for Performance, Operating Systems: Internals and Design Principles, and Data and Computer Communications.


    Stallings has designed and implemented computer networks based on both OSI and TCP-IP protocols, using a variety of operating systems and computers. As a consultant, his services have been used by government agencies, major technology vendors, and other firms. Stallings has written a number of books on computer networks, network security, and cryptography. He has been the recipient of the award for the best computer textbook of the year from the Text and Academic Authors Association, eleven times.

    Read More
    Specifications
    Book Details
    • Publication Year
      • 2011
    • Table of Contents
      • NOTATION
        PREFACE

        • Reader's Guide
        • Overview

        PART ONE SYMMETRIC CIPHERS

        • Classical Encryption Techniques
        • Block Ciphers and the Data Encryption Standard
        • Basic Concepts in Number Theory and Finite Fields
        • Advanced Encryption Standard
        • Block Cipher Operation
        • Pseudorandom Number Generation and Stream Ciphers

        PART TWO ASYMMETRIC CIPHERS

        • More Number Theory
        • Public-Key Cryptography and RSA
        • Other Public-Key Cryptosystems

        PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

        • Cryptographic Hash Functions
        • Message Authentication Codes
        • Digital Signatures

        PART FOUR MUTUAL TRUST

        • Key Management and Distribution
        • User Authentication Protocols

        PART FIVE NETWORK AND INTERNET SECURITY

        • Transport-Level Security
        • Wireless Network Security
        • Electronic Mail Security
        • IP Security

        Appendix A Projects for Teaching Cryptography and Network Security
        Appendix B Sage Examples
        Appendix C Sage Problems

    Contributors
    • Author
      • William Stallings
    University Books Details
    • Specialization
      • Computer Science Engineering, Electronics and Communication Engineering, Electronics and Communication Engineering, Computer Science Engineering, B.Sc(Mathematics)
    • Term
      • 8th Semester
    Ratings and Reviews
    4.3
    55 Ratings &
    6 Reviews
    • 5
       31
    • 4
       15
    • 3
       3
    • 2
       4
    • 1
       2
    3

    The book is good..but...

    The book is good, language is easy..but the author has dropped many old algorithms such as.
    IDEA
    Blowfish
    RC5 etc.
    These are very important algorithms to learn cryptography from the begining of it.. otherwise book is good..
    READ MORE

    Roshan Bande

    Certified Buyer

    6 May, 2012

    4
    0
    Report Abuse
    5

    Nice Book for Network Security

    I Bought this book for my MS - Software Systems.
    If this is your prescribed text book, go for it.

    Clears the whole course and is quite explanatory.

    And Special thanks to Flipkart for awesome deilvery :)
    READ MORE

    RAHUL SINGH

    Certified Buyer

    19 Jan, 2012

    3
    1
    Report Abuse
    5

    Excellent book on Network Security

    Perscribed textbook for Anna University and many more university this book is one of the most basic book that gives a clear explanation about the various network security measures and cryptography techniques...

    One thing to note for Anna University students is that the 5th unit in the syllabus is not in this book.You will have to refer to William Stallings Fourth edition.

    Overall 5 on 5 for this book.
    READ MORE

    Karthik Abbilash

    Certified Buyer

    15 Oct, 2013

    1
    0
    Report Abuse
    5

    A very good book

    A very good book on the subject. A person having interest over data security should have this book. What is good about this book is the little introduction of number theory which is just adequate to understand the subject nicely.
    Also very good service by flipkart, got it within 24 hrs.
    READ MORE

    Anil Yadav

    Certified Buyer

    8 Feb, 2013

    1
    0
    Report Abuse
    1

    Not all chapters are available !!!

    I have been shopping with FlipKart for long. But this time was taken by surprise and I feel like I have been cheated. The book from Pearson has chapters 1 to 19 and Appendix A&B.
    The rest of chapters, i.e., chapter 20 to 23 along with Appendix C to Q are available online.
    Now to avail these missing content, there is supposed to be a coating at the back of the front cover, which needs to be scratched to get the student code. I was surprised when, after scratching I found out that the coating...
    READ MORE

    Souvik Data

    Certified Buyer

    3 Sep, 2015

    0
    0
    Report Abuse
    2

    Not so good

    First of all, the the delivery took 5 days to be delivered to the address i had mentioned which I felt it was unusual for the standards flipkart had set. On top of that, I was very unhappy with the delivery. The person mentioned I had to walk nearly a km from the address I had mentioned to where he had been delivering as he explained he did not have a vehicle and pleaded me to excuse this time.
    .
    When I did open the package, the book to my surprise did not seem to be a new book. The cover pa...
    READ MORE

    immanuale dhanasheelan

    Certified Buyer

    11 May, 2015

    0
    1
    Report Abuse
    +
    View all 6 reviews
    Have doubts regarding this product?
    Safe and Secure Payments. Easy returns. 100% Authentic products.
    Back to top