Title, Comunicaciones y redes de computadores. Comunicaciones y redes de computadores, William Stallings. Author, William Stallings. Translated by, Juan. Comunicaciones y redes de computadores by William Stallings at uk – ISBN – ISBN – Alhambra – : Comunicaciones y redes de computadores () by William Stallings and a great selection of similar New, Used and Collectible.

Author: Zuluran Daijas
Country: Jamaica
Language: English (Spanish)
Genre: Music
Published (Last): 15 July 2010
Pages: 248
PDF File Size: 2.91 Mb
ePub File Size: 14.79 Mb
ISBN: 517-5-57446-170-7
Downloads: 12548
Price: Free* [*Free Regsitration Required]
Uploader: Meztizshura

In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology.

The latter part of the book deals with the practice of network security: Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system.

It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, students learn a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for instructors and students to ensure a successful teaching and learning experience.

Features This title is a Pearson Global Edition. The Editorial team at Pearson has worked closely with educators around the world to include content which is especially relevant to students outside the United States. Cryptography and Network Security offers the following features to facilitate learning: Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes.

A tremendous amount of original supporting material for students is available online, at two Web locations: This is jointly sponsored by the U. National Security Agency and the U. Department of Homeland Security. Attack surfaces and attack trees in Chapter 1 includes a new section describing these two concepts, which are useful in evaluating and classifying security threats.

Chapter 19 has been completely rewritten to provide a comprehensive and up-to-date discussion of email security. Email threats and a comprehensive approach to email security.

Sender Policy Framework SPFthe standardized way for a sending domain to identify and assert the mail senders for a given domain. Domain-based Message Authentication, Reporting, and Conformance DMARCwhich allows email senders to specify policy on how their mail should be handled, the types of reports that receivers can send back, and the frequency those reports should be sent. The narrative throughout has been clarified and tightened while the illustrations are new and improved.


Sage cryptographic algorithms provide numerous examples and are used as the basis for hands-on assignments, offering unmatched means for students to learn this subject. Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important cryptographic algorithms and allow students to assess their relative strengths and weaknesses. Complete coverage of authentication and digital signatures enables students to compare and evaluate competing approaches to understand each better.

Comunicaciones y Redes de Computadores (English, Spanish, Paperback)

A unified, comprehensive treatment of mutual comuniccaiones topics explore key management and user authentication, which are willliam to the successful use of cryptographic services. This treatment gives the student a systematic and comprehensive understanding of the issues involved.

Approximately computadoees reinforce material in the text and introduce new concepts and techniques at the end of each chapter. A solid yet easy-to-follow mathematical background provides a foundation to assess the relative strengths of various approaches without needing a prior understanding of number theory and probability. This gives the student a clear understanding of the math required. Coverage of number theory and finite fields, including numerous worked-out examples, make the abstract subject matter clear.

Comprehensive, up-to-date coverage of IP Security, namely IPSec, one of the most complex and important of the new network security standards. A comprehensive and unified discussion of the threats of intruders hackers and viruses looks at the distinctions and similarities of the two.

Biblioteca ISAE Universidad catalog › Details for: Comunicaciones y redes de computadores

Students gain a greater understanding coumnicaciones both topics by exploring the both in the same chapter. The material on number theory is consolidated into a single chapter, Chapter 2.

This makes for a convenient reference and relevant portions of it can be assigned as needed. The chapter on finite fields is updated and expanded with additional text and new figures to enhance understanding. The relatively new format-preserving encryption mode of encryption is covered in a new section in Chapter 7. Compuutadores format is seeing increasing commercial success, which is covered thoroughly in the section.

Conditioning and health testing for true random number generators provides coverage of these important topics in Chapter 8.

The user authentication model in Chapter 15 includes a new description of a general model for user authentication, which helps to unify the discussion of the various approaches. The material on cloud security in Chapter 16 is updated and expanded in the new edition to reflect its importance and recent developments.


It now includes a discussion of the new TLS version 1. The Seventh Edition offers a tremendous amount of original supporting material for students online at two Web locations: The Companion Web site, at WilliamStallings. The purchase of this textbook also grants access to the Premium Content site for six months.

It includes the following materials: To limit the size and cost of the book, four chapters of the book are provided in PDF format. This includes three chapters on computer and one on legal and ethical issues. There are numerous interesting topics that support material found in the text but whose inclusion is not warranted in the printed text. A total of 20 online appendices cover these topics for the interested student.

Computer Networks II

Homework problems and solutions: To aid the student in understanding the material, a separate set of homework problems with solutions are available. A number of papers from the professional literature, many hard to find, are provided for further reading. A variety of other useful documents are referenced in the wllliam and provided online. The Sage code from the examples in Appendix B is useful in case the student wants to play around with the examples.

The text is accompanied by the following supplementary material to aid instruction: Solutions to all end-of-chapter Review Questions and Problems.

Suggested project assignments for all of the project satllings listed below.

A set of slides covering all chapters, suitable for use in lecturing. Reproductions of all figures and tables from the book.

William Stallings Books

A chapter-by-chapter set of questions with a separate file of answers. The text contains more material than can be conveniently covered in one semester. Accordingly, instructors are provided with several sample syllabuses that reves the use of the text within limited time. These samples are based on real-world experience by professors with the fifth edition. New to this Edition Cryptography and Network Security offers the following features to facilitate learning: Otros libros del autor.