Listing 1 - 10 of 29 | << page >> |
Sort by
|
Choose an application
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The chapters in Part 1 offer a brief introduction to the mathematical foundations: modular arithmetic, groups, finite fields, and probability; primality testing and factoring; discrete logarithms; elliptic curves; and lattices. Part 2 of the book shows how historical ciphers were broken, thus motivating the design of modern cryptosystems since the 1960s; this part also includes a chapter on information-theoretic security. Part 3 covers the core aspects of modern cryptography: the definition of security; modern stream ciphers; block ciphers and modes of operation; hash functions, message authentication codes, and key derivation functions; the "naive" RSA algorithm; public key encryption and signature algorithms; cryptography based on computational complexity; and certificates, key transport and key agreement. Finally, Part 4 addresses advanced prot ocols, where the parties may have different or even conflicting security goals: secret sharing schemes; commitments and oblivious transfer; zero-knowledge proofs; and secure multi-party computation. The author balances a largely non-rigorous style — many proofs are sketched only — with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.
Computer Science --- Engineering & Applied Sciences --- Data structures (Computer science) --- Computer science. --- Data Structures and Information Theory. --- Mathematics of Computing. --- Security Science and Technology. --- Discrete Mathematics. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Data structures (Computer scienc. --- Cryptography. --- Data structures (Computer science). --- Computer science—Mathematics. --- System safety. --- Discrete mathematics. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Prevention --- Information theory. --- Computer science --- Security systems. --- Mathematics. --- Security measures --- Burglary protection --- Computer mathematics --- Mathematics --- Communication theory --- Communication --- Cybernetics
Choose an application
Disease is everywhere. Everyone experiences disease, everyone knows somebody who is, or has been diseased, and disease-related stories hit the headlines on a regular basis. Many important issues in the philosophy of disease, however, have received remarkably little attention from philosophical thinkers. This book examines a number of important debates in the philosophy of medicine, including 'what is disease?', and the roles and viability of concepts of causation, in clinical medicine and epidemiology. Where much of the existing literature targets conceptual analyses of health and disease, this book provides the reader with an insight into these debates, and develops plausible alternative accounts. The author explores a range of related subjects, discussing a host of interesting philosophical questions within clinical medicine, pathology and epidemiology. In the second part of the book, the author examines the concepts of causation employed by clinicians and pathologists, how one should classify diseases, and whether the epidemiologist's models for inferring the causes of disease are all they're cracked up to be.
Medicine --- Medical Ethics & Philosophy --- Health & Biological Sciences --- Philosophy --- Philosophy. --- Medical logic --- Science --- Metaphysics. --- Social sciences-Philosophy. --- Political science --- Epidemiology. --- Philosophy of Science. --- Social Philosophy. --- Political Philosophy. --- Normal science --- Philosophy of science --- Diseases --- Public health --- Political philosophy --- God --- Ontology --- Philosophy of mind --- Philosophy and science. --- Social sciences—Philosophy. --- Political philosophy. --- Science and philosophy
Choose an application
"Art gallery director and curator Tom Smart examines the construction of self-identity and the wafer-thin distinction between fiction and autobiography in Canadian cartoonist Seth's series of graphic novels."--
Autobiographical comic books, strips, etc. --- Autobiography in art. --- Biographical comic books, strips, etc. --- History and criticism. --- Seth, --- Gallant, Gregory, --- Criticism and interpretation. --- Comic book memoirs --- Comic strip memoirs --- Comics memoirs --- Graphic memoirs --- Memoirs, Comic book --- Memoirs, Comic strip --- Memoirs, Comics --- Memoirs, Graphic
Choose an application
Choose an application
Choose an application
Disease is everywhere. Everyone experiences disease, everyone knows somebody who is, or has been diseased, and disease-related stories hit the headlines on a regular basis. Many important issues in the philosophy of disease, however, have received remarkably little attention from philosophical thinkers. This book examines a number of important debates in the philosophy of medicine, including 'what is disease?', and the roles and viability of concepts of causation, in clinical medicine and epidemiology. Where much of the existing literature targets conceptual analyses of health and disease, this book provides the reader with an insight into these debates, and develops plausible alternative accounts. The author explores a range of related subjects, discussing a host of interesting philosophical questions within clinical medicine, pathology and epidemiology. In the second part of the book, the author examines the concepts of causation employed by clinicians and pathologists, how one should classify diseases, and whether the epidemiologist's models for inferring the causes of disease are all they're cracked up to be.
Science --- wetenschap --- wetenschappen
Choose an application
Choose an application
Choose an application
Choose an application
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The chapters in Part 1 offer a brief introduction to the mathematical foundations: modular arithmetic, groups, finite fields, and probability; primality testing and factoring; discrete logarithms; elliptic curves; and lattices. Part 2 of the book shows how historical ciphers were broken, thus motivating the design of modern cryptosystems since the 1960s; this part also includes a chapter on information-theoretic security. Part 3 covers the core aspects of modern cryptography: the definition of security; modern stream ciphers; block ciphers and modes of operation; hash functions, message authentication codes, and key derivation functions; the "naive" RSA algorithm; public key encryption and signature algorithms; cryptography based on computational complexity; and certificates, key transport and key agreement. Finally, Part 4 addresses advanced prot ocols, where the parties may have different or even conflicting security goals: secret sharing schemes; commitments and oblivious transfer; zero-knowledge proofs; and secure multi-party computation. The author balances a largely non-rigorous style — many proofs are sketched only — with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.
Discrete mathematics --- Mathematics --- Applied physical engineering --- Production management --- Computer science --- Information systems --- Computer. Automation --- discrete wiskunde --- cryptologie --- veiligheid (mensen) --- computers --- informatica --- externe fixatie (geneeskunde --- wiskunde --- programmatielogica --- ingenieurswetenschappen --- computerkunde
Listing 1 - 10 of 29 | << page >> |
Sort by
|