首页Cryptography and Network Security Principles and Practice 6th edition
Cryptography and Network Security Principles and Practice 6th ed...
5星 · 超过95%的资源 需积分: 10 131 浏览量 更新于2023-03-16 评论 4 收藏 12.62MB PDF 举报
Cryptography and Network Security Principles and Practice 6th edition
ONLINE ACCESS for Cryptography and Network Security: Principles
and Practice, Sixth Edition
Thank you for purchasing a new copy of Cryptography and Network Security:
Principles and Practice, Sixth Edition. Your textbook includes six months of prepaid
access to the book’s Premium Web site. This prepaid subscription provides you with full
access to the following student support areas:
• VideoNotes are step-by-step video tutorials specifically designed to enhance the
programming concepts presented in this textbook
• Online Chapters
• Online Appendices
• Supplemental homework problems with solutions
• Supplemental papers for reading
Note that this prepaid subscription does not include access to MyProgrammingLab, which is
available at http://www.myprogramminglab.com for purchase.
Use a coin to scratch off the coating and reveal your student access code.
Do not use a knife or other sharp object as it may damage the code.
To access the Cryptography and Network Security: Principles and Practice, Sixth Edition,
Premium Web site for the first time, you will need to register online using a computer with
an Internet connection and a web browser. The process takes just a couple of minutes and
only needs to be completed once.
1. Go to http://www.pearsonhighered.com/stallings/
2. Click on Premium Web site.
3. Click on the Register button.
4. On the registration page, enter your student access code* found beneath the
scratch-off panel. Do not type the dashes. You can use lower- or uppercase.
5. Follow the on-screen instructions. If you need help at any time during the online
registration process, simply click the Need Help? icon.
6. Once your personal Login Name and Password are conrmed, you can begin using
the Cryptography and Network Security: Principles and Practice, Sixth Edition
Premium Web site!
To log in after you have registered:
You only need to register for this Premium Web site once. After that, you can log in any
time at http://www.pearsonhighered.com/stallings/ by providing your Login Name and
Password when prompted.
*Important: The access code can only be used once. This subscription is valid for six months
upon activation and is not transferable. If this access code has already been revealed, it
may�no longer be valid. If this is the case, you can purchase a subscription by going to
http://www.pearsonhighered.com/stallings/ and following the on-screen instructions.
This page intentionally left blank
PrinciPles and Practice
Boston Columbus Indianapolis New York San Francisco Upper Saddle River
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
ISBN 10: 0-13-335469-5
ISBN 13: 978-0-13-335469-0
10 9 8 7 6 5 4 3 2 1
Editorial Director, ECS: Marcia Horton
Executive Editor: Tracy Johnson
Associate Editor: Carole Snyder
Director of Marketing: Christy Lesko
Marketing Manager: Yez Alayan
Director of Production: Erin Gregg
Managing Editor: Scott Disanno
Associate Managing Editor: Robert Engelhardt
Production Manager: Pat Brown
Art Director: Jayne Conte
Cover Designer: Bruce Kenselaar
Permissions Supervisor: Michael Joyce
Permissions Administrator: Jenell Forschler
Director, Image Asset Services: Annie Atherton
Manager, Visual Research: Karen Sanatar
Cover Photo: © Valery Sibrikov/Fotolia
Media Project Manager: Renata Butera
Full-Service Project Management: Shiny Rajesh/
Integra Software Services Pvt. Ltd.
Composition: Integra Software Services Pvt. Ltd.
Printer/Binder: Courier Westford
Cover Printer: Lehigh-Phoenix
Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook
appear in the Credits section in the end matter of this text.
Copyright © 2014, 2011, 2006 Pearson Education, Inc., All rights reserved. Printed in the United States of America.
This publication is protected by Copyright, and permission should be obtained from the publisher prior to any
prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic,
mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please
submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle
River, New Jersey 07458, or you may fax your request to 201-236-3290.
Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where
those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been
printed in initial caps or all caps.
Library of Congress Cataloging-in-Publication Data on file.
For Tricia never dull never boring
the smartest and bravest
person I know
The Journal of Cybersecurity is a peer-reviewed academic journal that focuses on the study of cybersecurity and related topics. The journal publishes original research articles, review articles, and short communications in the field of cybersecurity, including topics such as cybercrime, data protection, network security, cryptography, and digital forensics. The Journal of Cybersecurity is an important resource for researchers, practitioners, and policy makers in the field of cybersecurity, providing them with up-to-date information on the latest developments and best practices in the field. 翻译一下
cryptographydeprecationwarning: python 3.6 is no longer supported by the python core team. therefore, support for it is deprecated in cryptography and will be removed in a future release. from cryptography.hazmat.backends import default_backend
使用SHA-1分别计算“Introduction to Computer security”，“Information Security”，“School of Computer Science”和“Cryptography”的散列值，用python写出完整代码
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额