没有合适的资源?快使用搜索试试~ 我知道了~
首页Cryptography and Network Security Principles and Practice, Edition(6th) 无水印原版pdf
Cryptography and Network Security Principles and Practice, Editi...
需积分: 10 450 浏览量
更新于2023-03-16
评论 6
收藏 37.12MB PDF 举报
Cryptography and Network Security Principles and Practice, International Edition(6th) 英文无水印原版pdf 第6版 pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
资源详情
资源评论
资源推荐


ONLINE ACCESS for Cryptography and Network Security: Principles
and Practice, Sixth Edition
Thank you for purchasing a new copy of Cryptography and Network Security:
Principles and Practice, Sixth Edition. Your textbook includes six months of prepaid
access to the book’s Premium Web site. This prepaid subscription provides you with full
access to the following student support areas:
• VideoNotes are step-by-step video tutorials specifically designed to enhance the
programming concepts presented in this textbook
• Online Chapters
• Online Appendices
• Supplemental homework problems with solutions
• Supplemental papers for reading
Note that this prepaid subscription does not include access to MyProgrammingLab, which is
available at http://www.myprogramminglab.com for purchase.
Use a coin to scratch off the coating and reveal your student access code.
Do not use a knife or other sharp object as it may damage the code.
To access the Cryptography and Network Security: Principles and Practice, Sixth Edition,
Premium Web site for the first time, you will need to register online using a computer with
an Internet connection and a web browser. The process takes just a couple of minutes and
only needs to be completed once.
1. Go to http://www.pearsoninternationaleditions.com/stallings/
2. Click on Premium Web site.
3. Click on the Register button.
4. On the registration page, enter your student access code* found beneath the
scratch-off panel. Do not type the dashes. You can use lower- or uppercase.
5. Follow the on-screen instructions. If you need help at any time during the online
registration process, simply click the Need Help? icon.
6. Once your personal Login Name and Password are conrmed, you can begin using
the Cryptography and Network Security: Principles and Practice, Sixth Edition
Premium Web site!
To log in after you have registered:
You only need to register for this Premium Web site once. After that, you can log in any
time at http://www.pearsoninternationaleditions.com/stallings/ by providing your Login
Name and Password when prompted.
*Important: The access code can only be used once. This subscription is valid for six months
upon activation and is not transferable. If this access code has already been revealed, it
mayno longer be valid. If this is the case, you can purchase a subscription by going to http://
www.pearsoninternationaleditions.com/stallings/ and following the on-screen instructions.

ONLINE ACCESS for Cryptography and Network Security: Principles
and Practice, Sixth Edition
Thank you for purchasing a new copy of Cryptography and Network Security:
Principles and Practice, Sixth Edition. Your textbook includes six months of prepaid
access to the book’s Premium Web site. This prepaid subscription provides you with full
access to the following student support areas:
• VideoNotes are step-by-step video tutorials specifically designed to enhance the
programming concepts presented in this textbook
• Online Chapters
• Online Appendices
• Supplemental homework problems with solutions
• Supplemental papers for reading
Note that this prepaid subscription does not include access to MyProgrammingLab, which is
available at http://www.myprogramminglab.com for purchase.
Use a coin to scratch off the coating and reveal your student access code.
Do not use a knife or other sharp object as it may damage the code.
To access the Cryptography and Network Security: Principles and Practice, Sixth Edition,
Premium Web site for the first time, you will need to register online using a computer with
an Internet connection and a web browser. The process takes just a couple of minutes and
only needs to be completed once.
1. Go to http://www.pearsoninternationaleditions.com/stallings/
2. Click on Premium Web site.
3. Click on the Register button.
4. On the registration page, enter your student access code* found beneath the
scratch-off panel. Do not type the dashes. You can use lower- or uppercase.
5. Follow the on-screen instructions. If you need help at any time during the online
registration process, simply click the Need Help? icon.
6. Once your personal Login Name and Password are conrmed, you can begin using
the Cryptography and Network Security: Principles and Practice, Sixth Edition
Premium Web site!
To log in after you have registered:
You only need to register for this Premium Web site once. After that, you can log in any
time at http://www.pearsoninternationaleditions.com/stallings/ by providing your Login
Name and Password when prompted.
*Important: The access code can only be used once. This subscription is valid for six months
upon activation and is not transferable. If this access code has already been revealed, it
mayno longer be valid. If this is the case, you can purchase a subscription by going to http://
www.pearsoninternationaleditions.com/stallings/ and following the on-screen instructions.
Acronyms
3DES Triple DES
AES Advanced Encryption Standard
AH Authentication Header
ANSI American National Standards Institute
CBC Cipher Block Chaining
CESG Communications-Electronics Security
Group
CFB Cipher Feedback
CMAC Cipher-Based Message Authentication
Code
CRT Chinese Remainder Theorem
DoS Denial of Service
DEA Data Encryption Algorithm
DES Data Encryption Standard
DoS Denial of Service
DSA Digital Signature Algorithm
DSS Digital Signature Standard
ECB Electronic Codebook
ECC Elliptic Curve Cryptography
ECDSA Elliptic Curve Digital Signature
Algorithm
ESP Encapsulating Security Payload
FIPS Federal Information Processing
Standard
IAB Internet Architecture Board
IETF Internet Engineering Task Force
IP Internet Protocol
IPsec IP Security
ISO International Organization for
Standardization
ITU International Telecommunication
Union
ITU-T ITU Telecommunication
Standardization Sector
IV Initialization Vector
KDC Key Distribution Center
LAN Local Area Network
MAC Message Authentication Code
MIC Message Integrity Code
MIME Multipurpose Internet Mail
Extension
MD5 Message Digest, Version 5
MTU Maximum Transmission Unit
NIST National Institute of Standards and
Technology
NSA National Security Agency
OFB Output Feedback
PCBC Propagating Cipher Block Chaining
PGP Pretty Good Privacy
PIV Personal Identity Verication
PKI Public Key Infrastructure
PRNG Pseudorandom Number Generator
RFC Request for Comments
RNG Random Number Generator
RSA Rivest-Shamir-Adelman
RSA-PSS RSA Probabilistic Signature Scheme
SHA Secure Hash Algorithm
S/MIME Secure MIME
SNMP Simple Network Management
Protocol
SNMPv3 Simple Network Management
Protocol Version 3
SSL Secure Sockets Layer
TCP Transmission Control Protocol
TDEA Triple DEA
TLS Transport Layer Security
UDP User Datagram Protocol
WAN Wide Area Network

Cryptography and
network SeCurity
PrinciPles and Practice
Sixth edition
William Stallings
International Edition contributions by
Mohit P Tahiliani
NITK Surathkal
Boston Columbus Indianapolis New York San Francisco Upper Saddle River
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

Editorial Director, ECS: Marcia Horton
Executive Editor: Tracy Johnson
Associate Editor: Carole Snyder
Director of Marketing: Christy Lesko
Marketing Manager: Yez Alayan
Director of Production: Erin Gregg
Managing Editor: Scott Disanno
Associate Managing Editor: Robert Engelhardt
Production Manager: Pat Brown
Production Project Manager: Kayla Smith-Tarbox
Publisher, International Edition: Angshuman Chakraborty
Publishing Administrator and Business Analyst,
International Edition: Shokhi Shah Khandelwal
Associate Print and Media Editor, International
Edition: Anuprova Dey Chowdhuri
Acquisitions Editor, International Edition: Sandhya Ghoshal
Publishing Administrator, International Edition: Hema Mehta
Project Editor, International Edition: Karthik Subramanian
Art Director: Jayne Conte
Cover Designer: Jodi Notowitz
Permissions Supervisor: Michael Joyce
Permissions Administrator: Jenell Forschler
Director, Image Asset Services: Annie Atherton
Manager, Visual Research: Karen Sanatar
Cover Photo: Bobkeenan Photography
Media Project Manager: Renata Butera
Full-Service Project Management: Shiny Rajesh/
Integra Software Services Pvt. Ltd.
Cover Printer: Courier Westford
Pearson Education Limited
Edinburgh Gate
Harlow
Essex CM20 2JE
England
and Associated Companies throughout the world
Visit us on the World Wide Web at:
www.pearsoninternationaleditions.com
© Pearson Education Limited 2014
The rights of William Stallings to be identified as author of this work have been asserted by him in accordance with the Copyright, Designs
and Patents Act 1988.
Authorized adaptation from the United States edition, entitled Cryptography and Network Security: Principles and Practice, Sixth Edition,
ISBN 978-0-13-335469-0, by William Stallings, published by Pearson Education © 2014.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting
restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS.
All trademarks used herein are the property of their respective owners. The use of any trademark in this text does not vest in the author or
publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement
of this book by such owners.
Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and
related graphics published as part of the services for any purpose. All such documents and related graphics are provided “as is” without
warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information,
including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and
non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or
any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action,
arising out of or in connection with the use or performance of information available from the services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically
added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or
the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified.
Microsoft
®
and Windows
®
are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not
sponsored or endorsed by or affiliated with the Microsoft Corporation.
ISBN 10: 0-273-79335-7
ISBN 13: 978-0-273-79335-9
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
10 9 8 7 6 5 4 3 2 1
14 13 12 11 10
Typeset in TimesTenLTStd Roman by Integra Software Services Pvt. Ltd.
Printed and bound by Courier Westford in The United States of America
The publisher’s policy is to use paper manufactured from sustainable forests.
剩余757页未读,继续阅读










安全验证
文档复制为VIP权益,开通VIP直接复制

评论0