Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE,ACM Computing Reviews and Cryptologia.
He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.
In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.
Chapter 0 Guide for Readers and Instructors
Chapter 1 Classical Encryption Techniques
Chapter 2 Block Ciphers and the Data Encryption Standard
Chapter 3 Basic Concepts in Number Theory and Finite Fields
Chapter 4 Advanced Encryption Standard
Chapter 5 Block Cipher Operation
Chapter 6 Pseudorandom Number Generation and Stream Ciphers
Chapter 7 More Number Theory
Chapter 8 Public-Key Cryptography and RSA
Chapter 9 Other Public-Key Cryptosystems
Chapter 10 Cryptographic Hash Functions
Chapter 11 Message Authentication Codes
Chapter 12 Digital Signatures
Chapter 13 Key Management and Distribution
Chapter 14 User Authentication
Chapter 15 Transport-Level Security
Chapter 16 Wireless Network Security
Chapter 17 Electronic Mail Security
Chapter 18 IP Security
• Use of Sage to illustrate cryptographic algorithms: The Sage computer algebra system is used to provide numerous examples of cryptographic algorithms and is also used as the basis for numerous hands-on assignments.
• Comprehensive up-to-date survey of cryptographic algorithms. The student gains an understanding of all of important cryptographic algorithms and is able to assess their relative strengths and weaknesses.
• Complete coverage of authentication and digital signatures. Enables the student to compare and evaluate competing approaches, and thus understand each better.
• Unified, comprehensive treatment of mutual trust topics. Key management and user authentication are fundamental to the successful use of cryptographic services.
• Excellent collection of homework problems. Approximately 300 problems reinforce material in the text and also introduce new concepts and techniques.
• Solid yet easy-to-follow mathematical background. It is impossible to assess the relative strengths of various approaches without some understanding of number theory and probability.
• Comprehensive, up-to-date coverage of IP Security. IPSec is one of the most complex and one of the most important of the new network security standards.
• Comprehensive, up-to-date coverage of wireless network Security. The student gains an understanding of the importance of this topic.
• Coverage of both PGP and S/MIME for electronic mail security: These are the two most important approaches to email security.
• Comprehensive and unified discussion of intruders and viruses. The threats of intruders (hackers) and viruses are distinct, but there are also similarities