Description
Book SynopsisDr. William Stallings hasauthored 19 titles, and counting revised editions, over 40 books on computersecurity, computer networking, and computer architecture. His writings haveappeared in numerous publications, including the Proceedings of the IEEE,ACM Computing Reviews and Cryptologia. He has received 13 times theaward for the best Computer Science textbook of the year from the Text andAcademic Authors Association.
In over 30 years in thefield, he has been a technical contributor, technical manager, and an executivewith several high-technology firms. He has designe
Table of Contents
- Computer and Network Security Concepts
- Introduction to Number Theory
- Classical Encryption Techniques
- Block Ciphers and the Data Encryption Standard
- Finite Fields
- Advanced Encryption Standard
- Block Cipher Operation
- Random Bit Generation and Stream Ciphers
- Public-Key Cryptography and RSA
- Other Public-Key Cryptosystems
- Cryptographic Hash Functions
- Message Authentication Codes
- Digital Signatures
- Lightweight Cryptography and Post-Quantum Cryptography
- Key Management and Distribution
- User Authentication Protocols
- Transport-Level Security
- Wireless Network Security
- Electronic Mail Security
- IP Security
- Network Endpoint Security
- Cloud Security
- Internet of Things (IoT) Security
- Appendix A. Basic Concepts from Linear Algebra
- Appendix B. Measures of Security and Secrecy
- Appendix C. Data Encryption Standard (DES)
- Appendix D. Simplified AES
- Appendix E. Mathematical Basis of the Birthday Attack