For courses in Cryptography, Computer Security, and Network Security   The Principles and Practice of Cryptography and Network Security Stallings’ Cryptography and Network Security introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security.   This edition streamlines subject matter with new and updated material — including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, students learn a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for instructors and students to ensure a successful teaching and learning experience. 
Les mer
1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Key Management and Distribution 15. User Authentication Protocols 16. Network Access Control and Cloud Security 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security   Appendix A Projects for Teaching Cryptography and Network Security Appendix B Sage Examples
Les mer
Cryptography and Network Security offers the following features to facilitate learning:   NEW! Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes. NEW! Fundamental security design principles in Chapter 1 includes a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security. NEW! Attack surfaces and attack trees in Chapter 1 includes a new section describing these two concepts, which are useful in evaluating and classifying security threats. NEW! Email Security: Chapter 19 has been completely rewritten to provide a comprehensive and up-to-date discussion of email security. These discussions include:   Email threats and a comprehensive approach to email security. How STARTTLS provides confidentiality and authentication for SMTP. DNSSEC and its role in supporting email security. DNS-based Authentication of Named Entities (DANE) and the use of this approach to enhance security for certificate use in SMTP and S/MIME. Sender Policy Framework (SPF),  the standardised way for a sending domain to identify and assert the mail senders for a given domain. Domain-based Message Authentication, Reporting, and Conformance (DMARC), which allows email senders to specify policy on how their mail should be handled, the types of reports that receivers can send back, and the frequency those reports should be sent. Treatment of S/MIME reflects the latest version 3.2. DomainKeys Identified Mail (DKIM) is updated. NEW! The narrative throughout has been clarified and tightened while the illustrations are new and improved. UPDATED! Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject. UPDATED! Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses. Complete coverage of authentication and digital signatures enables students to compare and evaluate competing approaches to understand each better. A unified, comprehensive treatment of mutual trust topics explore key management and user authentication, which are fundamental to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved. Approximately 300 problems reinforce material in the text and introduce new concepts and techniques at the end of each chapter. A solid yet easy-to-follow mathematical background provides a foundation to assess the relative strengths of various approaches without needing a prior understanding of number theory and probability. This gives the student a clear understanding of the math required. Coverage of number theory and finite fields, including numerous worked-out examples, make the abstract subject matter clear. UPDATED! Comprehensive, up-to-date coverage of IP Security, namely IPSec, one of the most complex and important of the new network security standards. Coverage of both PGP and S/MIME for electronic mail security explores the two most important approaches to email security, giving the student an understanding of both schemes at a detailed technica
Les mer
Cryptography and Network Security offers the following features to facilitate learning: Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes. A tremendous amount of original supporting material for students is available online, at two Web locations: The Companion Web site The Premium Content site Fundamental security design principles in Chapter 1 includes a section discussing the security design principles listed as fundamental by the National Centers of Academic Excellence in Information Assurance/Cyber Defense. This is jointly sponsored by the U.S. National Security Agency and the U.S. Department of Homeland Security. Attack surfaces and attack trees in Chapter 1 includes a new section describing these two concepts, which are useful in evaluating and classifying security threats. Email Security: Chapter 19 has been completely rewritten to provide a comprehensive and up-to-date discussion of email security. These discussions include:   Email threats and a comprehensive approach to email security. How STARTTLS provides confidentiality and authentication for SMTP. DNSSEC and its role in supporting email security. DNS-based Authentication of Named Entities (DANE) and the use of this approach to enhance security for certificate use in SMTP and S/MIME. Sender Policy Framework (SPF),  the standardized way for a sending domain to identify and assert the mail senders for a given domain. Domain-based Message Authentication, Reporting, and Conformance (DMARC), which allows email senders to specify policy on how their mail should be handled, the types of reports that receivers can send back, and the frequency those reports should be sent. Treatment of S/MIME reflects the latest version 3.2. DomainKeys Identified Mail (DKIM) is updated. The narrative throughout has been clarified and tightened while the illustrations are new and improved. UPDATED! Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering  unmatched means for students to learn this subject. UPDATED! Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses. UPDATED! Comprehensive, up-to-date coverage of IP Security, namely IPSec, one of the most complex and important of the new network security standards. UPDATED! A comprehensive and unified discussion of the threats of intruders (hackers) and viruses looks at the distinctions and similarities of the two. Students gain a greater understanding of both topics by exploring the both in the same chapter. UPDATED! The material on number theory is consolidated into a single chapter, Chapter 2. This makes for a convenient reference and relevant portions of it can be assigned as needed. UPDATED! The chapter on finite fields is updated and expanded with additional text and new figures to enhance understanding. UPDATED! The relatively new format-preserving encryption mode of encryption is covered in a new section in Chapter 7. The format is seeing increasing commercial success, which is covered thoroughly in the section.   UPDATED! The user authentication model in Chapter 15 includes a new description of a general model for user authentication, which helps to unify the discussion of the various approaches. UPDATED! The material on cloud security in Chapter 16 is updated and expanded in the new edition to reflect its importance and recent develop
Les mer

Produktdetaljer

ISBN
9781292158587
Publisert
2016-10-11
Utgave
7. utgave
Utgiver
Vendor
Pearson Education Limited
Vekt
1302 gr
Høyde
235 mm
Bredde
180 mm
Dybde
40 mm
Aldersnivå
U, P, 05, 06
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
768

Forfatter