• RRP: £53.99
  • You Save: £2.70 (5%)
FREE Delivery in the UK.
Only 10 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Cryptography and Network ... has been added to your Basket
+ £2.80 UK delivery
Used: Good | Details
Condition: Used: Good
Comment: This item is in good condition. All pages and covers are readable. There are no stains or tears. Dust jacket is present if applicable. May contain small amounts of writing and/or highlighting. Spine and cover may show signs of wear. May not contain supplementary items. We ship within 1 business day. Big Hearted Books shares its profits with schools, churches and non-profit groups throughout New England. Thank you for your support!
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Cryptography and Network Security: Principles and Practice Paperback – 13 Jun 2013

4.3 out of 5 stars 4 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
£51.29
£30.00 £19.42
Promotion Message 10% Bulk Discount 1 Promotion(s)

Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
£51.29 FREE Delivery in the UK. Only 10 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.
click to open popover

Special Offers and Product Promotions

  • Save 10% on Books for Schools offered by Amazon.co.uk when you purchase 10 or more of the same book. Here's how (terms and conditions apply) Enter code SCHOOLS2016 at checkout. Here's how (terms and conditions apply)

Frequently Bought Together

  • Cryptography and Network Security: Principles and Practice
  • +
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Total price: £72.36
Buy the selected items together

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.



Product details

  • Paperback: 756 pages
  • Publisher: Pearson; 6 edition (13 Jun. 2013)
  • Language: English
  • ISBN-10: 0273793357
  • ISBN-13: 978-0273793359
  • Product Dimensions: 17.8 x 2.4 x 23.2 cm
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Bestsellers Rank: 284,052 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

About the Author

Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia.


He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.


In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.


He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.


Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.

--This text refers to the Hardcover edition.


Customer Reviews

4.3 out of 5 stars
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
Purchased for Masters module on Wireless Cryptography and has so far been very useful. Publication date is 2013, and is one of the few I could find that included good coverage of WPA2 for WLAN. But also excellent Foundation topics - Classical Cryptography, symetric ciphers etc, Modern Cryptography: Public Key, Difie Helman etc, Asymetric vs symmetric .... Also good coverage of Network and internet Security. Also equally important the Author William Stallings, writes well and avoids have the mind numbing soporific effect that some other academics induce ....

Also supported by lots of online materials and additional chapters etc

Would Highly recommend this book - especially this 6th edition - expensive but worth the price
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Its a very concrete and well-written book as are all Stallings book. However, it is really frustrating trying to find out where are the books appendices at the internet (those that are not included in the book).
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I bought it for a university course of computer security and I'm very satisfied about it. It covers all the main topics of ancient and modern security mechanisms showing them first in a simple way and then in a more specific one. Besides, there are about ten online chapters that deepens these topics. The only topic that it doesn't expound is access control policy.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
don't buy the kindle edition as you lose the online content that you get if you buy the book. publishers never replied to my email either.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 3.8 out of 5 stars 50 reviews
52 of 54 people found the following review helpful
5.0 out of 5 stars Solid coverage for professionals, students and instructors 27 Nov. 1998
By A Customer - Published on Amazon.com
Format: Hardcover
This book is intended to serve both as a textbook for an academic course of study, and as a self-study and reference guide for practicing professionals. The material has been extended to emphasize encryption and its central position in network protection. The structure and flow have been reorganized with both classroom use and solo instruction in mind, and additional teaching material, such as additional problems, have been added.
Chapter one is an introduction to the topics to be covered. In a practical way it outlines the concerns involved in the phrase computer security, and the priorities occasioned by the networked nature of modern computing. There is also an outline of the chapters and sequence in the rest of the book. While the text does note that cryptographic techniques underlie most of current security technologies this is only done briefly. Examples in the major categories listed would help explain this primary position.
Part one deals with conventional, symmetric, encryption and the various methods of attacking it. Chapter two covers the historical substitution and transposition ciphers. Symmetric block ciphers are discussed in chapter three, illustrated by an explanation of DES (Data Encryption Standard). The additional conventional algorithms of triple DES, IDEA (International Data Encryption Algorithm), and RC5 are reviewed in chapter four. The use of conventional encryption for confidentiality is outlined in chapter five.
Part three looks at public-key encryption and hash functions. Chapter six introduces public-key encryption and its uses in confidentiality, authentication, and key management and exchange. Number theory is the basis of these modern algorithms, so some basic mathematical concepts are outlined in chapter seven. Digital signatures and message authentication is introduced in some detail in chapter eight. The algorithms themselves are explained in chapter nine, including MD5 (Message Digest algorithm), SHA (Secure Hash Algorithm), and others. Protocols using digital signatures are described in chapter ten.
Part three takes this background material and relates its use in security practice. Chapter eleven looks at authentication, concentrating on Kerberos and X.509. The examples of e-mail security systems given in chapter twelve are PGP (Pretty Good Privacy) and S/MIME (Secure/Multipurpose Internet Mail Extension). Security provisions for the Internet Protocol (IP) itself are reviewed in chapter thirteen. Web security, in chapter fourteen, again concentrates on protocol level matters, but also discusses the SET (Secure Electronic Transaction) standard at the application level.
Part four outlines general system security. To the general public the primary concern of security is to deal with intruders and malicious software, so it may seem odd to the uninitiated to find that both of these subjects are lumped together in chapter fifteen. Chapter sixteen finishes off the book with a description of firewalls and the concept of trusted systems that they rely on.
Each chapter ends with a set of recommended readings and problems. Many chapters also have appendices giving additional details of specific topics related to the subject just discussed.
20 of 23 people found the following review helpful
2.0 out of 5 stars Way Overpriced and Cheating on the Content 29 Dec. 2013
By Destination Infinity - Published on Amazon.com
Format: Hardcover Verified Purchase
Most text books are over priced. If that were the only issue I would have not given this book a two star rating. But this book made me feel cheated. After paying $100+ price for this book, what I got was a book printed on thin paper and a lot of important content relegated to appendices that are only available online through the publisher website. Really? After paying $100+, I have to go off to the website, create an account, download the 20 different appendices, print them and staple them together so that I can read how DES encryption works? Also, this book has several typos. Very disappointing for such an expensive book. The book content is good though.
9 of 9 people found the following review helpful
5.0 out of 5 stars Meat and Potatoes 21 Dec. 2003
By Stephen Mathews - Published on Amazon.com
Format: Hardcover
This review is for the 3rd edition -
I'm not a cryptographer by any means. I've owned Applied Cryptography(AC) for 4 years. It's been quite helpful but leans farther into theory (not covered in it) than I was willing or able to research at the time. I often found myself needing to refer to other resources over the years. I purchased this book after thumbing through it a few times at the bookstore. I'm not one to run out and spend $80 on a book in haste. After a couple of collective hours in it at the store I bought it with the intention of returning it in the 30 allotted days for a full refund. That date comes tomorrow and I have no intention on returning it.
I would describe it as a self-contained reference. It covers cryptography principles and practices as the title implies. When discussing the algorithms it covers them with roughly the same notation and detail as AC. However, I found the explained examples to be clearer. When I found myself getting lost I took the text's advice and referred to the chapters on mathematics and number theory. Not only did it clear the fog it also bit me with the math bug. Leading me to buy another great book, Prime Obsession (nothing to do with crypto). I should mention that this book is void of code. I didn't find this to be a problem because if I'm not using a crypto lib I usually have to implement the crypto code from scratch. With the knowledge presented in this book I can do it better. FYI: The OpenSSL lib offers a bunch of implemented algorithims.
18 of 22 people found the following review helpful
5.0 out of 5 stars The all in one overview 9 May 2000
By Amazon Customer - Published on Amazon.com
Format: Hardcover
As CTO of an internet security company I am often required to locate information or explain concepts to people regarding network security and the Public Key Infrastructure. Having a ready reference with excellent drawings has made the communication of key concepts easy. For details of implementations, I send the engineers to Applied Cryptography, but for the overview of the Net protocols, I bought everyone in the company this book.
9 of 11 people found the following review helpful
5.0 out of 5 stars A course oriented book 28 Feb. 2001
By Prem Uppuluri - Published on Amazon.com
Format: Hardcover
One of the better books in Security, concentrating on algorithms, rather than stopping at attack descriptions. Very detailed coverage of converntional and public-key encryption. I recommend this book to anyone interested in Security and has some knowledge on algorithms.
Were these reviews helpful? Let us know


Feedback