Ch. 1. Overview -- Pt. 1. Symmetric Ciphers -- Ch. 2. Classical Encryption Techniques -- Ch. 3. Block Ciphers and the Data Encryption Standard -- Ch. 4. Introduction to Finite Fields -- Ch. 5. Advanced Encryption Standard -- Ch. 6. Contemporary Symmetric Ciphers -- Ch. 7. Confidentiality Using Symmetric Encryption -- Pt. 2. Public-Key Encryption and Hash Functions -- Ch. 8. Introduction to Number Theory -- Ch. 9. Public-Key Cryptography and RSA -- Ch. 10. Key Management; Other Public-Key Cryptosystems -- Ch. 11. Message Authentication and Hash Functions -- Ch. 12. Hash Algorithms -- Ch. 13. Digital Signatures and Authentication Protocols -- Pt. 3. Network Security Practice -- Ch. 14. Authentication Applications -- Ch. 15. Electronic Mail Security -- Ch. 16. IP Security -- Ch. 17. Web Security -- Pt. 4. System Security -- Ch. 18. Intruders -- Ch. 19. Malicious Software -- Ch. 20. Firewalls. App. B. Projects for Teaching Cryptography and Network Security
Summary
"Stallings has provided a state-of-the-art text covering the basic issues and principles and surveying cryptographic and network security techniques. The later part of the book deals with the real-world practice of network security: practical applications that have been implemented and are in use to provide network security. This book is intended for both an academic and a professional audience."--BOOK JACKET