- Capa dura: 731 páginas
- Editora: Prentice Hall; Edição: 6 (16 de março de 2013)
- Idioma: Inglês
- ISBN-10: 0133354695
- ISBN-13: 978-0133354690
- Dimensões do produto: 18,3 x 3 x 23,4 cm
- Peso de envio: 1 Kg
- Avaliação média: Seja o primeiro a avaliar este item
- Lista de mais vendidos da Amazon: no. 323,351 em Livros (Conheça o Top 100 na categoria Livros)
Cryptography and Network Security: Principles and Practice (Inglês)
|Novo a partir de||Usado a partir de|
Há uma nova edição deste item:
Leia Enquanto Enviamos
Compre e comece a ler a amostra digital deste livro enquanto espera ele chegar. Saiba mais aqui.
Clientes que visualizaram este item também visualizaram
Faça download dos Aplicativos de Leitura Kindle Gratuitos e comece a ler eBooks Kindle nos mais populares smartphones, tablets e computadores pessoais. Para enviar o link de download para seu smartphone por SMS, use o formato internacional sem espaços (Código Internacional+DDD+Número. Exemplo: +551199999999)
Para receber o link de download digite seu celular:
Veja todos os livros aqui
Detalhes do produto
Descrição do Produto
Sobre o Autor
Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia.
He has 11 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.
In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products.
He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.
Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.
Avaliação de clientes
|5 estrelas (0%)|
|4 estrelas (0%)|
|3 estrelas (0%)|
|2 estrelas (0%)|
|1 estrela (0%)|
Avaliações mais úteis de consumidores na Amazon.com
All of this doesn't even begin to help when the author introduces an example it takes 2-3 more examples to fully understand the first example. Nested examples are about as wonderful as "GOTO" statements in Basic.
This author needs an editor for the book that will make it easy to understand the principles and practice of cryptography and network security easy enough for a layperson to understand. This book looks like it was just stamped through for publishing without any proof reading.
It's a shame on Pearson and this Author to allow such a book to be published
A resource that a subsystem needs exclusive access to at all times. In this class of resources, no sharing policy is needed since only a single component ever requires use of the resource. Examples of dedicated abstractions include interrupts and counters (Stallings 585).
An abstraction is dedicated if it is a resource which a subsystem needs exclusive access to at all times. In this class of resources, no sharing policy is needed since only a single component ever requires use of the resource. Examples of dedicated abstractions include interrupts and counters (Klues, Levis and Gay).
Every client of a virtualized resource interacts with it as if it were a dedicated resource, with all virtualized instances being multiplexed on top of a single underlying resource (Stallings 585).
Every client of a virtualized resource interacts with it as if it were a dedicated resource, with all virtualized instances being multiplexed on top of a single underlying resource (Klues, Levis and Gay).
Not only did the author plagiarize, he seemed to relish writing in a verbose manner. For example, this is his explanation of deadline criteria: "When process completion deadlines can be specified, the scheduling discipline should subordinate other goals to that of maximizing the percentage of deadlines met.” He couldn't just write that the maximum number of deadline should be met? This is typical, and it makes reading this textbook a chore.
Klues, Kevin, et al. "Resource Arbitration." Documentary. n.d. Web.
Stallings, William. Operating Systems: Internals and Design Principles. Upper Saddle River: Pearson, 2015.