Book description
Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.
The 8th Edition captures innovations and improvements in cryptography and network security, while maintaining broad and comprehensive coverage of the entire field. In many places, the narrative has been clarified and tightened, and illustrations have been improved based on extensive reviews by professors who teach the subject and by professionals working in the field.
Table of contents
- Cover
- About Pearson
- Title Page
- Dedication
- Contents
- Notation
- Preface
- About the Author
-
Part One: Background
- Chapter 1: Information and Network Security Concepts
-
Chapter 2: Introduction to Number Theory
- 2.1 Divisibility and the Division Algorithm
- 2.2 The Euclidean Algorithm
- 2.3 Modular Arithmetic
- 2.4 Prime Numbers
- 2.5 Fermat’s and Euler’s Theorems
- 2.6 Testing for Primality
- 2.7 The Chinese Remainder Theorem
- 2.8 Discrete Logarithms
- 2.9 Key Terms, Review Questions, and Problems
- Appendix 2A: The Meaning of Mod
- Part Two: Symmetric Ciphers
- Part Three: Asymmetric Ciphers
-
Part Four: Cryptographic Data Integrity Algorithms
- Chapter 11: Cryptographic Hash Functions
-
Chapter 12: Message Authentication Codes
- 12.1 Message Authentication Requirements
- 12.2 Message Authentication Functions
- 12.3 Requirements for Message Authentication Codes
- 12.4 Security of MACs
- 12.5 MACs Based on Hash Functions: HMAC
- 12.6 MACs Based on Block Ciphers: DAA and CMAC
- 12.7 Authenticated Encryption: CCM and GCM
- 12.8 Key Wrapping
- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs
- 12.10 Key Terms, Review Questions, and Problems
- Chapter 13: Digital Signatures
- Chapter 14: Lightweight Cryptography and Post-Quantum Cryptography
- Part Five: Mutual Trust
-
Part Six: Network and Internet Security
- Chapter 17: Transport-Level Security
- Chapter 18: Wireless Network Security
-
Chapter 19: Electronic Mail Security
- 19.1 Internet Mail Architecture
- 19.2 Email Formats
- 19.3 Email Threats and Comprehensive Email Security
- 19.4 S/MIME
- 19.5 DNSSEC
- 19.6 DNS-Based Authentication of Named Entities
- 19.7 Sender Policy Framework
- 19.8 DomainKeys Identified Mail
- 19.9 Domain-Based Message Authentication, Reporting, and Conformance
- 19.10 Key Terms, Review Questions, and Problems
- Chapter 20: IP Security
- Chapter 21: Network Endpoint Security
- Chapter 22: Cloud Security
- Chapter 23: Internet of Things (IoT) Security
- Appendix A: Basic Concepts from Linear Algebra
- Appendix B: Measures of Secrecy and Security
- Appendix C: Data Encryption Standard
- Appendix D: Simplified AES
- Appendix E: Mathematical Basis of the Birthday Attack
- Glossary
- References
- Index
- Acronyms
- Copyright
Product information
- Title: Cryptography and Network Security Principles and Practice, 8th Edition - Pearson
- Author(s):
- Release date: December 2023
- Publisher(s): Pearson India
- ISBN: 9789357054911
You might also like
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Network Defense and Countermeasures: Principles and Practices, 4th Edition
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, …
book
Computer Security Fundamentals, 5th Edition
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's …
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …