Cryptography and Network Security Principles and Practices, Fourth Edition By William Stallings



Table of Contents

Part One: Symmetric Ciphers

  • Chapter 1. Introduction
  • Chapter 2. Classical Encryption Techniques 
  • Chapter 3. Block Ciphers and the Data Encryption Standard
  • Chapter 4. Finite Fields
  • Chapter 5. Advanced Encryption Standard
  • Chapter 6. More on Symmetric Ciphers
  • Chapter 7. Confidentiality Using Symmetric Encryption

Part Two: Public-Key Encryption and Hash Functions

  • Chapter 8. Introduction to Number Theory
  • Chapter 9. Public-Key Cryptography and RSA
  • Chapter 10. Key Management; Other Public-Key Cryptosystems
  • Chapter 11. Message Authentication and Hash Functions
  • Chapter 12. Hash and MAC Algorithms
  • Chapter 13. Digital Signatures and Authentication Protocols

Part Three: Network Security Applications

  • Chapter 14. Authentication Applications
  • Chapter 15. Electronic Mail Security
  • Chapter 16. IP Security
  • Chapter 17. Web Security

Part Four: System Security

  • Chapter 18. Intruders 
  • Chapter 19. Malicious Software
  • Chapter 20. Firewalls




0/Post a reply/Replies

Previous Post Next Post