Programming Books C Java PHP Python Learn more Browse Programming Books
Buy Used
$4.00
FREE Shipping on orders over $35.
Used: Good | Details
Sold by apex_media
Condition: Used: Good
Comment: Ships direct from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $25. Overnight and 2 day shipping available!
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Cryptography and Network Security: Principles and Practice (3rd Edition) Hardcover – August 27, 2002

ISBN-13: 978-0130914293 ISBN-10: 0130914290 Edition: 3rd

Used
Price: $4.00
14 New from $24.98 33 Used from $0.01 1 Collectible from $30.01
Amazon Price New from Used from
Hardcover, August 27, 2002
$24.98 $0.01

There is a newer edition of this item:

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Editorial Reviews

From the Back Cover

William Stallings' book provides comprehensive and completely up-to-date coverage of computer organization and architecture including memory, I/O, and parallel systems. The text covers leading-edge areas, including superscalar design, IA-64 design features, and parallel processor organization trends. It meets students' needs by addressing both the fundamental principles as well as the critical role of performance in driving computer design. Providing an unparalleled degree of instructor and student support, including supplements and on-line resources through the book's website, the sixth edition is in the forefront in its field.

New Material

  • IA-64/Itanium architecture: The chapter-length description and analysis includes predicated execution and speculative loading.
  • Cache memory: The new edition devotes an entire chapter to this central element in the design of high-performance processors.
  • Optical memory: Coverage is expanded and updated.
  • Advanced DRAM architecture: More material has been added to cover this topic, including an updated discussion of SDRAM and RDRAM.
  • SMPs, clusters, and NUMA systems: The chapter on parallel organization has been expanded and updated.
  • Expanded instructor support: The book now provides extensive support for projects with its new website.
  • Pedagogy: Each chapter now includes a list of review questions (as well as homework problems) and a list of key words.

Distinguishing Treatment

  • Bus organization: detailed treatment and evaluation of key design issues.
  • RISC: broad, unified presentation
  • Microprogrammed implementation: full treatment for a firm grasp
  • I/O functions and structures: full coverage, including interaction of I/O modules with the outside world and the CPU.
  • Pedagogical Features

    • Running examples: Provides numerous concrete examples, especially Pentium 4 and Power PC G4
    • Unified instructional approach: Enables student to evaluate instruction set design issues.
    • Instructors Resource CD-ROM: Includes solutions to homework problems, list of research projects, and list of simulation projects, plus student manual for both SimpleScalar and SMPCache, and a list of suggested reading assignments.

    The author's website: http://www.WilliamStallings.com/COA6e provides support for students, instructors and professionals:
    • Links to important up-to-date site-related text materials
    • Provides transparency masters of figures and tables from the book in PDF format
    • Offers course notes in PDF for handouts
    • Includes a set of PowerPoint slides for lecturing

    About the Author

    William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 48 books on various aspects of this subject. 1 lc has won the annual Text and Academic Authors Association award five times for the best computer science and engineering text. He is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He maintains the Computer Science Technical Resciurce site at http://www.WilliamStallings.com/StudentSupport.html. Dr. Stallings holds a Ph.D. degree in Computer Science from M.LT. All of his Prentice Hall title's can he found at the Prentice Hall web site http://www.prenhall.com/stallings.

    NO_CONTENT_IN_FEATURE

    Shop the new tech.book(store)
    New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

    Product Details

    • Series: The William Stallings books on computer & data communications technology
    • Hardcover: 696 pages
    • Publisher: Prentice Hall; 3 edition (August 27, 2002)
    • Language: English
    • ISBN-10: 0130914290
    • ISBN-13: 978-0130914293
    • Product Dimensions: 7 x 1.3 x 9.9 inches
    • Shipping Weight: 2.6 pounds
    • Average Customer Review: 4.3 out of 5 stars  See all reviews (14 customer reviews)
    • Amazon Best Sellers Rank: #1,490,297 in Books (See Top 100 in Books)

    More About the Author

    Discover books, learn about writers, read author blogs, and more.

    Customer Reviews

    4.3 out of 5 stars
    Share your thoughts with other customers

    Most Helpful Customer Reviews

    50 of 52 people found the following review helpful By A Customer on November 27, 1998
    Format: Hardcover
    This book is intended to serve both as a textbook for an academic course of study, and as a self-study and reference guide for practicing professionals. The material has been extended to emphasize encryption and its central position in network protection. The structure and flow have been reorganized with both classroom use and solo instruction in mind, and additional teaching material, such as additional problems, have been added.
    Chapter one is an introduction to the topics to be covered. In a practical way it outlines the concerns involved in the phrase computer security, and the priorities occasioned by the networked nature of modern computing. There is also an outline of the chapters and sequence in the rest of the book. While the text does note that cryptographic techniques underlie most of current security technologies this is only done briefly. Examples in the major categories listed would help explain this primary position.
    Part one deals with conventional, symmetric, encryption and the various methods of attacking it. Chapter two covers the historical substitution and transposition ciphers. Symmetric block ciphers are discussed in chapter three, illustrated by an explanation of DES (Data Encryption Standard). The additional conventional algorithms of triple DES, IDEA (International Data Encryption Algorithm), and RC5 are reviewed in chapter four. The use of conventional encryption for confidentiality is outlined in chapter five.
    Part three looks at public-key encryption and hash functions. Chapter six introduces public-key encryption and its uses in confidentiality, authentication, and key management and exchange. Number theory is the basis of these modern algorithms, so some basic mathematical concepts are outlined in chapter seven.
    Read more ›
    Comment Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback. If this review is inappropriate, please let us know.
    Sorry, we failed to record your vote. Please try again
    7 of 7 people found the following review helpful By Stephen Mathews on December 21, 2003
    Format: Hardcover
    This review is for the 3rd edition -
    I'm not a cryptographer by any means. I've owned Applied Cryptography(AC) for 4 years. It's been quite helpful but leans farther into theory (not covered in it) than I was willing or able to research at the time. I often found myself needing to refer to other resources over the years. I purchased this book after thumbing through it a few times at the bookstore. I'm not one to run out and spend $80 on a book in haste. After a couple of collective hours in it at the store I bought it with the intention of returning it in the 30 allotted days for a full refund. That date comes tomorrow and I have no intention on returning it.
    I would describe it as a self-contained reference. It covers cryptography principles and practices as the title implies. When discussing the algorithms it covers them with roughly the same notation and detail as AC. However, I found the explained examples to be clearer. When I found myself getting lost I took the text's advice and referred to the chapters on mathematics and number theory. Not only did it clear the fog it also bit me with the math bug. Leading me to buy another great book, Prime Obsession (nothing to do with crypto). I should mention that this book is void of code. I didn't find this to be a problem because if I'm not using a crypto lib I usually have to implement the crypto code from scratch. With the knowledge presented in this book I can do it better. FYI: The OpenSSL lib offers a bunch of implemented algorithims.
    Comment Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback. If this review is inappropriate, please let us know.
    Sorry, we failed to record your vote. Please try again
    17 of 21 people found the following review helpful By John Lebourgeois on May 9, 2000
    Format: Hardcover
    As CTO of an internet security company I am often required to locate information or explain concepts to people regarding network security and the Public Key Infrastructure. Having a ready reference with excellent drawings has made the communication of key concepts easy. For details of implementations, I send the engineers to Applied Cryptography, but for the overview of the Net protocols, I bought everyone in the company this book.
    Comment Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback. If this review is inappropriate, please let us know.
    Sorry, we failed to record your vote. Please try again
    9 of 11 people found the following review helpful By Prem Uppuluri on February 27, 2001
    Format: Hardcover
    One of the better books in Security, concentrating on algorithms, rather than stopping at attack descriptions. Very detailed coverage of converntional and public-key encryption. I recommend this book to anyone interested in Security and has some knowledge on algorithms.
    Comment Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback. If this review is inappropriate, please let us know.
    Sorry, we failed to record your vote. Please try again
    3 of 3 people found the following review helpful By J. Yasmineh on January 12, 2006
    Format: Hardcover
    I adored this book! It's one of my favourite texts of all time. I used it for a computer security subject and it's a great primer. It covers a middle ground in computer encryption and network security that serves wonderfully as a primer for the novice and a reference for the experienced.

    The contents are roughly evenly split between detailed descriptions of currently used encyrption protocols, and descriptions of network security protocols. For a complete reference library on this field, you would also need a book on network communications protocols, a mathematics-heavy text on the design of encryption algorithms and a programming-heavy text on encryption algorithm implementation.

    But if you have prior knowledge of network comms, aren't ineterested in encryption design or maths, and can do the coding yourself, then this book has all you need to understand practical encryption and security currently used in industry and to implement the protocols yourself.

    Stallings has a great writing style and explains concepts in clear and interesting English. You can't go wrong with this book. As a primer for the primer, I'd recommend The Code Book by Simon Singh (very readable) or any of Stallings' other books specifically dealing with data comms.
    Comment Was this review helpful to you? Yes No Sending feedback...
    Thank you for your feedback. If this review is inappropriate, please let us know.
    Sorry, we failed to record your vote. Please try again

    Most Recent Customer Reviews


    Frequently Bought Together

    Cryptography and Network Security: Principles and Practice (3rd Edition) + Security in Computing, 4th Edition
    Buy the selected items together
    • Security in Computing, 4th Edition $84.08