Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Cryptography and Network Security: Principles and Practice (3rd Edition) 3rd Edition

3.9 out of 5 stars 49 customer reviews
ISBN-13: 978-0130914293
ISBN-10: 0130914290
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
Condition: Used - Good
Condition: Used: Good
Comment: Ships direct from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $25. Overnight and 2 day shipping available!
Access codes and supplements are not guaranteed with used items.
33 Used from $0.97
More Buying Choices
13 New from $9.52 33 Used from $0.97

There is a newer edition of this item:

Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Save Up to 90% on Textbooks Textbooks

Editorial Reviews

From the Back Cover

William Stallings' book provides comprehensive and completely up-to-date coverage of computer organization and architecture including memory, I/O, and parallel systems. The text covers leading-edge areas, including superscalar design, IA-64 design features, and parallel processor organization trends. It meets students' needs by addressing both the fundamental principles as well as the critical role of performance in driving computer design. Providing an unparalleled degree of instructor and student support, including supplements and on-line resources through the book's website, the sixth edition is in the forefront in its field.

New Material

  • IA-64/Itanium architecture: The chapter-length description and analysis includes predicated execution and speculative loading.
  • Cache memory: The new edition devotes an entire chapter to this central element in the design of high-performance processors.
  • Optical memory: Coverage is expanded and updated.
  • Advanced DRAM architecture: More material has been added to cover this topic, including an updated discussion of SDRAM and RDRAM.
  • SMPs, clusters, and NUMA systems: The chapter on parallel organization has been expanded and updated.
  • Expanded instructor support: The book now provides extensive support for projects with its new website.
  • Pedagogy: Each chapter now includes a list of review questions (as well as homework problems) and a list of key words.

Distinguishing Treatment

  • Bus organization: detailed treatment and evaluation of key design issues.
  • RISC: broad, unified presentation
  • Microprogrammed implementation: full treatment for a firm grasp
  • I/O functions and structures: full coverage, including interaction of I/O modules with the outside world and the CPU.
  • Pedagogical Features

    • Running examples: Provides numerous concrete examples, especially Pentium 4 and Power PC G4
    • Unified instructional approach: Enables student to evaluate instruction set design issues.
    • Instructors Resource CD-ROM: Includes solutions to homework problems, list of research projects, and list of simulation projects, plus student manual for both SimpleScalar and SMPCache, and a list of suggested reading assignments.

    The author's website: http://www.WilliamStallings.com/COA6e provides support for students, instructors and professionals:
    • Links to important up-to-date site-related text materials
    • Provides transparency masters of figures and tables from the book in PDF format
    • Offers course notes in PDF for handouts
    • Includes a set of PowerPoint slides for lecturing

    About the Author

    William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 48 books on various aspects of this subject. 1 lc has won the annual Text and Academic Authors Association award five times for the best computer science and engineering text. He is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He maintains the Computer Science Technical Resciurce site at http://www.WilliamStallings.com/StudentSupport.html. Dr. Stallings holds a Ph.D. degree in Computer Science from M.LT. All of his Prentice Hall title's can he found at the Prentice Hall web site http://www.prenhall.com/stallings.


    Product Details

    • Series: The William Stallings books on computer & data communications technology
    • Hardcover: 696 pages
    • Publisher: Prentice Hall; 3 edition (August 27, 2002)
    • Language: English
    • ISBN-10: 0130914290
    • ISBN-13: 978-0130914293
    • Product Dimensions: 7 x 1.3 x 9.9 inches
    • Shipping Weight: 2.6 pounds
    • Average Customer Review: 3.9 out of 5 stars  See all reviews (49 customer reviews)
    • Amazon Best Sellers Rank: #1,475,187 in Books (See Top 100 in Books)

    More About the Author

    Discover books, learn about writers, read author blogs, and more.

    Customer Reviews

    Top Customer Reviews

    Format: Hardcover
    This book is intended to serve both as a textbook for an academic course of study, and as a self-study and reference guide for practicing professionals. The material has been extended to emphasize encryption and its central position in network protection. The structure and flow have been reorganized with both classroom use and solo instruction in mind, and additional teaching material, such as additional problems, have been added.
    Chapter one is an introduction to the topics to be covered. In a practical way it outlines the concerns involved in the phrase computer security, and the priorities occasioned by the networked nature of modern computing. There is also an outline of the chapters and sequence in the rest of the book. While the text does note that cryptographic techniques underlie most of current security technologies this is only done briefly. Examples in the major categories listed would help explain this primary position.
    Part one deals with conventional, symmetric, encryption and the various methods of attacking it. Chapter two covers the historical substitution and transposition ciphers. Symmetric block ciphers are discussed in chapter three, illustrated by an explanation of DES (Data Encryption Standard). The additional conventional algorithms of triple DES, IDEA (International Data Encryption Algorithm), and RC5 are reviewed in chapter four. The use of conventional encryption for confidentiality is outlined in chapter five.
    Part three looks at public-key encryption and hash functions. Chapter six introduces public-key encryption and its uses in confidentiality, authentication, and key management and exchange. Number theory is the basis of these modern algorithms, so some basic mathematical concepts are outlined in chapter seven.
    Read more ›
    Comment 51 of 53 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse
    Format: Hardcover
    This review is for the 3rd edition -
    I'm not a cryptographer by any means. I've owned Applied Cryptography(AC) for 4 years. It's been quite helpful but leans farther into theory (not covered in it) than I was willing or able to research at the time. I often found myself needing to refer to other resources over the years. I purchased this book after thumbing through it a few times at the bookstore. I'm not one to run out and spend $80 on a book in haste. After a couple of collective hours in it at the store I bought it with the intention of returning it in the 30 allotted days for a full refund. That date comes tomorrow and I have no intention on returning it.
    I would describe it as a self-contained reference. It covers cryptography principles and practices as the title implies. When discussing the algorithms it covers them with roughly the same notation and detail as AC. However, I found the explained examples to be clearer. When I found myself getting lost I took the text's advice and referred to the chapters on mathematics and number theory. Not only did it clear the fog it also bit me with the math bug. Leading me to buy another great book, Prime Obsession (nothing to do with crypto). I should mention that this book is void of code. I didn't find this to be a problem because if I'm not using a crypto lib I usually have to implement the crypto code from scratch. With the knowledge presented in this book I can do it better. FYI: The OpenSSL lib offers a bunch of implemented algorithims.
    Comment 9 of 9 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse
    Format: Hardcover Verified Purchase
    Most text books are over priced. If that were the only issue I would have not given this book a two star rating. But this book made me feel cheated. After paying $100+ price for this book, what I got was a book printed on thin paper and a lot of important content relegated to appendices that are only available online through the publisher website. Really? After paying $100+, I have to go off to the website, create an account, download the 20 different appendices, print them and staple them together so that I can read how DES encryption works? Also, this book has several typos. Very disappointing for such an expensive book. The book content is good though.
    Comment 18 of 21 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse
    Format: Hardcover
    As CTO of an internet security company I am often required to locate information or explain concepts to people regarding network security and the Public Key Infrastructure. Having a ready reference with excellent drawings has made the communication of key concepts easy. For details of implementations, I send the engineers to Applied Cryptography, but for the overview of the Net protocols, I bought everyone in the company this book.
    Comment 18 of 22 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse
    Format: Hardcover
    One of the better books in Security, concentrating on algorithms, rather than stopping at attack descriptions. Very detailed coverage of converntional and public-key encryption. I recommend this book to anyone interested in Security and has some knowledge on algorithms.
    Comment 9 of 11 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse
    Format: Hardcover
    I adored this book! It's one of my favourite texts of all time. I used it for a computer security subject and it's a great primer. It covers a middle ground in computer encryption and network security that serves wonderfully as a primer for the novice and a reference for the experienced.

    The contents are roughly evenly split between detailed descriptions of currently used encyrption protocols, and descriptions of network security protocols. For a complete reference library on this field, you would also need a book on network communications protocols, a mathematics-heavy text on the design of encryption algorithms and a programming-heavy text on encryption algorithm implementation.

    But if you have prior knowledge of network comms, aren't ineterested in encryption design or maths, and can do the coding yourself, then this book has all you need to understand practical encryption and security currently used in industry and to implement the protocols yourself.

    Stallings has a great writing style and explains concepts in clear and interesting English. You can't go wrong with this book. As a primer for the primer, I'd recommend The Code Book by Simon Singh (very readable) or any of Stallings' other books specifically dealing with data comms.
    Comment 3 of 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback.
    Sorry, we failed to record your vote. Please try again
    Report abuse

    Most Recent Customer Reviews

    Want to discover more products? Check out these pages to see more: encryption software reviews, cryptography theory and practice