Paramount Books PVT Ltd.
Home About us Contact us FAQ/ Help How to Pay Customer Feedback
Search Item
LOGIN / REGISTER ADVANCE SEARCH
SEARCH     
Untitled Document
 OUR PUBLICATIONS NEW ARRIVALS BESTSELLER TOP BOOKS DISCOUNT OFFERS QUOTATION REQUEST REFER TO A FRIEND
CATEGORIES
BUSINESS
CHILDREN BOOKS
COMPUTER SCIENCE
ENGINEERING
GENERAL INTEREST
MEDICAL BOOKS
SCIENCE
SOCIAL SCIENCES
LOOK FOR MORE
  AUTHORS
  PUBLISHERS
  SERIES
CATALOGUES
  GENERAL BOOKS 2017
  PRE-PRIMARY & PRIMARY 2017
  SECONDARY 2017
  MEDICAL BOOKS 2017
Untitled Document
Special Offer
Free Delivery in Pakistan
Untitled Document
Untitled Document
BEST OF 2016
CAMBRIDGE IGCSE® COMPUTER SCIENCE (FREE WEB RESOURCES) (pb) 2015
DATA AND COMPUTER COMMUNICATION 9e (pb) 2014
CAMBRIDGE IGCSE® ICT, 2e (W/CD) (pb) 2015
Untitled Document
NEW ARRIVALS
8088 AND 8086 MICROPROCESSORS: PROGRAMMING, INTERFACING, SOFTWARE, HARDWARE AND APPLICATION, THE 4e(pb)
BUILDING NEURAL NETWORKS (pb)1996
MOVING TO THE CLOUD: DEVELOPING APPS IN THE NEW WORLD OF CLOUD COMPUTING (pb) 2012
FUNDAMENTALS OF EMBEDDED SOFTWARE WITH THE ARM CORTEX-M3, 2e (pb) 2012
MICROPROCESSORS AND INTERFACING SIE 3e(pb)2012
DESIGN AND ANALYSIS OF ALGORITHMS, 2e (pb) 2013
PROBLEM SOLVING AND PROGRAMMING CONCEPTS, 9e (pb) 2013
ADOBE DREAMWEAVER CC: CLASSROOM IN A BOOK (pb) 2013
C++ PRIMER, 5e (pb) 2013
DATA AND COMPUTER COMMUNICATION 9e (pb) 2014
Untitled Document
SPECIAL PRICES
WEB M@RKETING IN A WEEK: 2e(pb)2003
WRITING COPY FOR THE WEB IN A WEEK: (pb)2003
E-BUSINESS IN A WEEK: (pb)2002
SUCCESSFUL E-COMMERCE IN A WEEK: (pb)1999
MANAGEMENT INFORMATION SYSTEMS (W/CD) 3e(pb)2003
ELECTRONIC COMMERCE 2004: A MANAGERIAL PERSPECTIVE (pb)2004
PROBLEM SOLVING AND PROGRAMMING CONCEPTS 7e(pb)2007
ELECTRONIC COMMERCE 2004: A MANAGERIAL PERSPECTIVE (pb)2004
CRYPTOGRAPHY AND NETWORK SECURITY 5e(pb)2011
SOS DATA STRUCTURES (pb)
Untitled Document
URDU BOOKS
RAPIDEX COMPUTER COURSE (URDU) (pb) 2009
AT FOR KIDS: FIILL COLORS IN COMPUTER (pb)
AT FOR KIDS: MICROSOFT WORD PART-4 (pb)
Untitled Document
MOST POPULAR
CAMBRIDGE INTERNATIONAL AS AND A LEVEL COMPUTER SCIENCE REVISION GUIDE (CAMBRIDGE INTERNATIONAL EXAMINATIONS) (pb) 2017
THE MICROPROCESSOR, ARCHITECTURE, PROGRAMMING AND SYSTEMS FEATURING 8085, (hb) 2006
WIRELESS # CERTIFICATION OFFICIAL STUDY GUIDE (pb)2006
MICROSOFT WINDOWS: AT A GLANCE (pb)
DYNAMICS OF STRUCTURES
ADOBE PHOTOSHOP CS3: COMPLETE CONCEPTS AND TECHNIQUES (pb)2008
WIRELESS APPLICATION PROTOCOL, THE (pb)2002
ALGORITHM DESIGN: FOUNDATION, ANALYSIS AND INTERNET EXAMPLES (pb)
NEW PERSPECTIVES ON MICROSOFT® WINDOWS 7 INTRODUCTORY (pb)2010
SECURITY ARCHITECT (pb) 2015
FREE NEWSLETTER
Join our mailing list to receive newsletter
 
Book Visit:1421
Refer to a Friend
Untitled Document
 PRICE INFORMATION
List Price: INR 450.00
Our Price: PKR 295.00 (US$ 2.84)
You Save: PKR 556.00
Discount:  (65.31%)

Note: The prices here are applicable only for our Retail customers. Libraries, Institutions and International customer can check the ‘List Price’ option.
SimilarAuthorItemsAuthor
 ALSO RECOMMENDED
Computer Networking With Internet Protocols And Technology (pb)2004 by Stallings
Cryptography And Network Security 4e(pb)2006 by Stallings
Cryptography And Network Security 4e(pb)2008 by Stallings
Cryptography And Network Security: Principles And Practice 6e(pb) by Stallings
Cryptography And Network Security: Principles And Practices 4e(pb)2006 by Stallings
Cryptography And Network: Principles And Practice (pb)2006 by Stallings
Foundations Of Modern Networking: Sdn, Nfv, Qoe, Iot, And Cloud (pb)2016 by Stallings
High-speed Networks And Internets: Performance And Quality Of Service 2e(pb)2010 by Stallings
High-speed Networks And Internets: Performance And Quality Of Service 2e(pb)2010 by Stallings
Network Security Essential 4e(pb)2011 by Stallings
ISBNSpecification
 SPECIFICATION
CRYPTOGRAPHY AND NETWORK SECURITY 5e(pb)2011
Author: STALLINGS
ISBN: 9788131761663
Year: 2011
Publisher: PEARSON EDUCATION ASIA
Category: COMPUTER SCIENCE  >-- HARDWARE  >-- NETWORKING / DISTRIBUTED SYSTEM Untitled Document
Edition: 5
Format: Paperback
Language: English
Pages: 743
 ABOUT THE TITLE
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.


The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.

Untitled Document
 TABLE OF CONTENTS
PREFACE
Chapter 0. Reader's Guide
0.1. Outline of This Book
0.2. A Roadmap for Readers and Instructors
0.3. Internet and Web Resources
0.4. Standards
Chapter 1. Overview
1.1. Computer Security Concepts
1.2. The OSI Security Architecture
1.3. Security Attacks
1.4. Security Services
1.5. Security Mechanisms
1.6. A Model for Network Security
1.7. Recommended Reading and Web Sites
1.8. Key Terms, Review Questions, and Problems
PART ONE SYMMETRIC CIPHERS
Chapter 2. Classical Encryption Techniques
2.1. Symmetric Cipher Model
2.2. Substitution Techniques
2.3. Transposition Techniques
2.4. Rotor Machines
2.5. Steganography
2.6. Recommended Reading and Web Sites
2.7. Key Terms, Review Questions, and Problems
Chapter 3. Block Ciphers and the Data Encryption Standard
3.1. Block Cipher Principles
3.2. The Data Encryption Standard (DES)
3.3. A DES Example
3.4. The Strength of DES
3.5. Differential and Linear Cryptanalysis
3.6. Block Cipher Design Principles
3.7. Recommended Reading and Web Site
3.8. Key Terms, Review Questions, and Problems
Chapter 4. Basic Concepts in Number Theory and Finite Fields
4.1. Divisibility and the Division Algorithm
4.2. The Euclidean Algorithm
4.3. Modular Arithmetic
4.4. Groups, Rings, and Fields
4.5. Finite Fields of the Form GF(p)
4.6. Polynomial Arithmetic
4.7. Finite Fields of the Form GF(2n)
4.8. Recommended Reading and Web Sites
4.9. Key Terms, Review Questions, and Problems
APPENDIX 4A The Meaning of mod
Chapter 5. Advanced Encryption Standard
5.1. The Origins AES
5.2. AES Structure
5.3. AES Round Functions
5.4. AES Key Expansion
5.5. An AES Example
5.6. AES Implementation
5.7. Recommended Reading and Web Sites
5.8. Key Terms, Review Questions, and Problems
APPENDIX 5A Polynomials with Coefficients in GF(28)
APPENDIX 5B Simplified AES
Chapter 6. Block Cipher Operation
6.1. Multiple Encryption and Triple DES
6.2. Electronic Codebook Mode
6.3. Cipher Block Chaining Mode
6.4. Cipher Feedback Mode
6.5. Output Feedback Mode
6.6. Counter Mode
6.7. XTS Mode for Block-Oriented Storage Devices
6.8. Recommended Web Site
6.9. Key Terms, Review Questions, and Problems
Chapter 7. Pseudorandom Number Generation and Stream Ciphers
7.1. Principles of Pseudorandom Number Generation
7.2. Pseudorandom Number Generators
7.3. Pseudorandom Number Generation Using a Block Cipher
7.4. Stream Ciphers
7.5. RC4
7.6. True Random Numbers
7.7. Recommended Reading
7.8. Key Terms, Review Questions, and Problems
PART TWO ASYMMETRIC CIPHERS
Chapter 8. More Number Theory
8.1. Prime Numbers
8.2. Fermat's and Euler's Theorems
8.3. Testing for Primality
8.4. The Chinese Remainder Theorem
8.5. Discrete Logarithms
8.6. Recommended Reading and Web Sites
8.7. Key Terms, Review Questions, and Problems
Chapter 9. Public-Key Cryptography and RSA
9.1. Principles of Public-Key Cryptosystems
9.2. The RSA Algorithm
9.3. Recommended Reading and Web Sites
9.4. Key Terms, Review Questions, and Problems
Appendix 9A: Proof of the RSA Algorithm
Appendix 9B: The Complexity of Algorithms
Chapter 10 Other Public-Key Cryptosystems
10.1 Diffie-Hellman Key Exchange
10.2 ElGamal Cryptosystem
10.3 Elliptic Curve Arithmetic
10.4 Elliptic Curve Cryptography
10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher
10.6 Recommended Reading and Web Sites
10.7 Key Terms, Review Questions, and Problems
PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 11 Cryptographic Hash Functions
11.1 Applications of Cryptographic Hash Functions
11.2 Two Simple Hash Functions
11.3 Requirements and Security
11.4 Hash Functions Based on Cipher Block Chaining
11.5 Secure Hash Algorithm (SHA)
11.6 SHA-3
11.7 Recommended Reading and Web Sites
11.8 Key Terms, Review Questions, and Problems
Appendix 11A: Mathematical Basis of Birthday Attack
Chapter 12 Message Authentication Codes
12.1 Message Authentication Requirements
12.2 Message Authentication Functions
12.3 Message Authentication Codes
12.4 Security of MACs
12.5 MACs Based on Hash Functions: HMAC
12.6 MACs Based on Block Ciphers: DAA and CMAC
12.7 Authenticated Encryption: CCM and GCM
12.8 Pseudorandom Number Generation using Hash Functions and MACs
12.9 Recommended Reading
12.10 Key Terms, Review Questions, and Problems
Chapter 13 Digital Signatures
13.1 Digital Signatures
13.2 ElGamal Digital Signature Scheme
13.3 Schnorr Digital Signature Scheme
13.4 Digital Signature Standard (DSS)
13.5 Recommended Reading and Web Sites
13.6 Key Terms, Review Questions, and Problems
PART FOUR MUTUAL TRUST
Chapter 14 Key Management and Distribution
14.1 Symmetric Key Distribution Using Symmetric Encryption
14.2 Symmetric Key Distribution Using Asymmetric Encryption
14.3 Distribution of Public Keys
14.4 X.509 Certificates
14.5 Public Key Infrastructure
14.6 Recommended Reading and Web Sites
14.7 Key Terms, Review Questions, and Problems
Chapter 15 User Authentication Protocols
15.1 Remote User Authentication Principles
15.2 Remote User Authentication Using Symmetric Encryption
15.3 Kerberos
15.4 Remote User Authentication Using Asymmetric Encryption
15.5 Federated Identity Management
15.6 Recommended Reading and Web Sites
15.7 Key Terms, Review Questions, and Problems
Appendix 15A: Kerberos Encryption Techniques
PART FIVE NETWORK AND INTERNET SECURITY
Chapter 16 Transport-Level Security
16.1 Web Security Issues
16.2 Secure Sockets Layer (SSL)
16.3 Transport Layer Security (TLS)
16.4 HTTPS
16.5 Secure Shell (SSH)
16.6 Recommended Reading and Web Sites
16.7 Key Terms, Review Questions, and Problems
Chapter 17 Wireless Network Security
17.1 IEEE 802.11 Wireless LAN Overview
17.2 IEEE 802.11i Wireless LAN Security
17.3 Wireless Application Protocol Overview
17.4 Wireless Transport Layer Security
17.5 WAP End-to-End Security
17.6 Recommended Reading and Web Sites
17.7 Key Terms, Review Questions, and Problems
Chapter 18 Electronic Mail Security
18.1 Pretty Good Privacy (PGP)
18.2 S/MIME
18.3 DomainKeys Identified Mail (DKIM)
18.4 Recommended Web Sites
18.5 Key Terms, Review Questions, and Problems
Appendix 18A: Radix-64 Conversion
Chapter 19 IP Security
19.1 IP Security Overview
19.2 IP Security Policy
19.3 Encapsulating Security Payload
19.4 Combining Security Associations
19.5 Internet Key Exchange
19.6 Cryptographic Suites
19.7 Recommended Reading and Web Sites
19.8 Key Terms, Review Questions, and Problems
APPENDICES
Appendix A. Projects for Teaching Cryptography and Network Security
A.1. Sage Computer Algebra Projects
A.2. Hacking Project
A.3. Block Cipher Projects
A.4. Laboratory Exercises
A.5. Research Projects
A.6. Programming Projects
A.7. Practical Security Assessments
A.8. Writing Assignments
A.9. Reading/Report Assignments
Appendix B. Sage Examples
B.1.
Appendix C. Sage Problems
C.1.
ONLINE CHAPTERS
PART SIX SYSTEM SECURITY
Chapter 20 Intruders
20.1 Intruders
20.2 Intrusion Detection
20.3 Password Management
20.4 Recommended Reading and Web Sites
20.5 Key Terms, Review Questions, and Problems
Appendix 20A The Base-Rate Fallacy
Chapter 21 Malicious Software
21.1 Types of Malicious Software
21.2 Viruses
21.3 Virus Countermeasures
21.4 Worms
21.5 Distributed Denial of Service Attacks
21.6 Recommended Reading and Web Sites
21.7 Key Terms, Review Questions, and Problems
Chapter 22 Firewalls
22.1 The Need for Firewalls
22.2 Firewall Characteristics
22.3 Types of Firewalls
22.4 Firewall Basing
22.5 Firewall Location and Configurations
22.6 Recommended Reading and Web Sites
22.7 Key Terms, Review Questions, and Problems
PART SEVEN LEGAL AND ETHICAL ISSUES
Chapter 23 Legal and Ethical Issues
23.1 Cybercrime and Computer Crime
23.2 Intellectual Property
23.3 Privacy
23.4 Ethical Issues
23.5 Recommended Reading and Web Sites
23.6 Key Terms, Review Questions, and Problems
ONLINE APPENDICES
WilliamStallings.com/Crypto/Crypto5e.html
APPENDIX D Standards and Standards-Setting Organizations
D.1. The Importance of Standards
D.2. Internet Standards and the Internet Society
D.3. National Institute of Standards and Technology
APPENDIX E Basic Concepts from Linear Algebra
APPENDIX F Measures of Security and Secrecy
APPENDIX G Simplified DES
E.1. Overview
E.2. S-DES Key Generation
E.3. S-DES Encryption
E.4. Analysis of Simplified DES
E.5. Relationship to DES
APPENDIX H Evaluation Criteria for AES
H.1. The Origins of AES
H.2. AES Evaluation
APPENDIX I More on Simplified AES
G.1. Arithmetic in GF(24)
G.2. The Mix Column Function
APPENDIX J Knapsack Public-Key Algorithm
I.1. The Knapsack Problem
I.2. The Knapsack Cryptosystem
I.3. Example
APPENDIX K Proof of the Digital Signature Algorithm
APPENDIX L TCP/IP and OSI
K.1. Protocols and Protocol Architectures
K.2. The TCP/IP Protocol Architecture
K.3. The Role of an Internet Protocol
K.4. IPv4
K.5. IPv6
K.6. The OSI Protocol Architecture
APPENDIX M Java Cryptographic APIs
M.1. Introduction
M.2. JCA and JCE Architecture
M.3. JCA Classes
M.4. JCE Classes
M.5. Conclusion and References
M.6. Using the Cryptographic Application
M.7. JCA/JCE Cryptography Example
APPENDIX N The Whirlpool Hash Function
N.1. Whirlpool Hash Structure
N.2. Block Cipher W
N.3. Performance of Whirlpool
APPENDIX O Data Compression Using ZIP
APPENDIX P PGP Random Number Generation
GLOSSARY
REFERENCES
INDEX
LIST OF ACRONYMS
SimilarItems
 YOU MAY ALSO LIKE THESE BOOKS
50 Min: Networking For Success: The Art Of Establishing Personal Contacts (pb)2005 by Flynn
Active Defense: A Comprehansive Guide To Network Security (w/cd) by Brenton
Ad Hoc Networking (pb)2008 by Perkins
Ad Hoc Wireless Networks: Architectures And Protocols (pb) 2004 by Murthy
All In One Security+certification Exam Guide (pb)2006 by White

Application, Security, And Privacy (pb) by Frafinkel
Artificial Neural Networks (pb)2004 by Yegnanarayana
Artificial Neural Networks (pb)2011 by Schalkoff
Artificial Neural Networks: An Introduction (pb)2005 by Priddy
Atm Network: Concepts And B-isdn Signalling, Protocols, Networking (pb)2010 by Verma

Atm Networks 3e(pb)2009 by Foley
Atm Networks: Concepts Protocols Applications 3e(pb)2009 by Handel
Basics Of Networking (pb)2004 by Niit
Biometrics For Network Security (pb)2004 by Reid
Business Data Communications And Networking 7e(pb)2003 by Dennis

Cbspss: problems And Solutions Of Network And Systems (pb)2010 by Jairath
Cbspss: Problems And Solutons In Network Analysis (pb)2005 by Gopal
Ccna Cisco Certified Network Associate Security Study Guide With Cd Rom (exam 640-553) (pb)2009 by Deal
Ccna Guide To Cisco Networking Fundamentals, 4e (pb) 2008 by Cannon
Ccna Security 640-554 Official Cert Guide (pb) 2014 by Barker

SameCategoryBooks
 BOOKS OF THE SAME CATEGORY
Computer Networking And The Internet 5e (pb)
Network Analysis And Synthesis (pb) 2015
Algebraic And Stochastic Coding Theory (hb)2012
Game Theory And Learning For Wireless Network (hb) 2011
Practical Opnet User Guide For Computer Network Simulation (hb)2012
Building Single Page App Using Asp.net Core With Entity Framework Core And Angular Js (pb)2016
Introduction To Analog And Digital Communications 2e (hb) 2007
Handbook Of Energy-aware And Green Computing (2 Vols Set) (hb)2012
Neural Networks And Fuzzy Systems: A Dynamical Systems Approach To Machine Intelligence (pb) 2013
Internetworking With Tcp/ip Volume I, 6e (pb) 2015
ALL BOOKS OF THE SAME CATEGORY
SameAuthorBooks
 BOOKS OF THE SAME AUTHOR (Last Name)
Foundations Of Modern Networking: Sdn, Nfv, Qoe, Iot, And Cloud (pb)2016
Cryptography And Network Security: Principles And Practice 6e(pb)
Isdn And Broadband Isdn With Frame Reley And Atm 4e(pb)1997
Snmp Snmpv2 Snmpv3 And Rmon 1 And2 3e(pb)2005
Operating Systems 4e(pb)2004
Data And Computer Communication 7e(pb)2004
Data And Computer Communications 8e(pb)2007
Data And Computer Communication 7e(pb)2007
Cryptography And Network: Principles And Practice (pb)2006
Operating Systems 2e(pb)2001
  ALL BOOKS OF THE SAME AUTHOR  
Session Order View Right Pane LeftCategory
COMPUTER SCIENCE
COMPUTER SCIENCE
. Computer Science
GENERAL REFERENCE
. Artificial Intelligence
. General Reference
. Numerical Methods / Discreate Mathematics
. Organization / Architecture
HARDWARE
. Certifications
. Communication
. Hardware
. Input And Output Devices
. Maintanance / Repairing
. Mis / It
. Networking / Distributed System
SOFTWARE
. Applications
. Certifications
. Computer Packages
. Data Structure
. Database
. E-commerce / E-marketing
. Engineering
. Internet
. Multimedia
. Operating System
. Programming / Language
. Software
. System Analysis And Designing
. Web Designing / Graphics
Untitled Document
PARAMOUNT'S MEDICAL
PARAMOUNT'S GENERAL
PARAMOUNT'S CHILDREN
PARAMOUNT'S ENGINEERING
BOOKS OF SUBSTANCE (DAWN BOOKS & AUTHORS)
MR AND MRS. JINNAH: THE MARRIAGE THAT SHOOK INDIA
JASMINE AND JOURNEYS: THE LIFE QUEST OF A SOUTH ASIAN WOMAN
THE SPY
Footer
Paramount Books (Pvt) Ltd.
Copyright © 2012-2015
Email: info@paramountbooks.com.pk
Facebook Paramount Books Twitter ParamountB
Branches & Outlets - Karachi    Islamabad   Lahore   Peshawar   Faisalabad   Hyderabad   Abbotabad
    650