The Next Threat to National Security and What to Do About it
by Richard A. Clarke & Robert K. Knake
Few understand the devastation cyber weapons can wreak or how the United States will use them in a crisis. Security expert Richard A. Clarke goes beyond 'geek talk' to succinctly explain how cyber weapons work and how vulnerable America is to the ...
Applications and Attacks
by Lynn Margaret Batten
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these ...
by Lorrie Faith Cranor & Simson Garfinkel
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues - both because they often failed to recognize the importance ...
by Richard Bird
Richard Bird takes a radically new approach to algorithm design, namely, design by calculation. These 30 short chapters each deal with a particular programming problem drawn from sources as diverse as games and puzzles, intriguing combinatorial ...
A Practical Approach
by Arne Mikalsen & Per Borgesen
How to use LANs to help your company grow A vital component of today's business, Local Area Networks (LANs) allow organizations to link their computers together for maximum work sharing, collaboration among geographically disparate teams, and ...
by James Westervelt
Simulation models enable land and watershed managers to make precise, authoritative determinations about the affects of various changes on the environment over time. This book discusses the role of modeling in the management process and gives an ...
Logics for the 21st Century
by Dov M. Gabbay, Sergei Goncharov & Michael Zakharyaschev
This book presents contributions from world-renowned logicians, discussing important topics of logic from the point of view of their further development in light of requirements arising from successful application in Computer Science and AI language.
What the Computer Security Industry Doesn't Want You to Know
by John Viega
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the ...
First IFIP Tc 5 Advanced Production Management Systems Conference (Apms' 2006), Wroclaw, Poland, September 18-20, 2006
by Tomasz Koch
This book constitutes the refereed proceedings of the IFIP TC5 Advanced Production Management Systems Conference held in Poland, September 2006. The IFIP series publishes state-of-the-art results in the sciences and technologies of information ...
by Eric Goetz & Sujeet Shenoi
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major ...
First IFIP WG 12.5 International Conference on Computer and Computing Technologies in Agriculture (CCTA2007) Wuyishan, China, August 18-20, 2007
by Daoliang Li
This book constitutes the first volume of the proceedings of the First IFIP WG 12.5 CCTA 2007 held in Wuyishan, China. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.
Essays in Honour of Gilles Kahn
by Yves Bertot, Gerard Huet, Jean-Jacques Levy & others
Gilles Kahn was one of the most influential figures in the development of computer science and information technology, not only in Europe but throughout the world. This volume of articles by several leading computer scientists serves as a fitting ...
by Ernest G. Manes
A central problem in the design of programming systems is to provide methods for verifying that computer code performs to specification. This book presents a rigorous foundation for defining Boolean categories, in which the relationship between ...
by Francesco Parisi & Mark Grady
Cybersecurity is a leading national problem for which the market may fail to produce a solution. The ultimate source of the problem is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their ...
by Jane Hillston
This is the first book presenting a stochastic extension of process algebra, PEPA; this is shown to be suitable for specifying a Markov process, which can then be applied to performance modelling. The method, which is illustrated with case ...
An Introduction to Quantum Entanglement
by Ingemar Bengtsson & Karol Zyczkowski
Quantum information theory is at the frontiers of physics, mathematics and information science, offering a variety of solutions that are impossible using classical theory. This book provides an introduction to the key concepts used in processing ...
by Hava T. Siegelmann
The theoretical foundations of Neural Networks and Analog Computation conceptualize neural networks as a particular type of computer consisting of multiple assemblies of basic processors interconnected in an intricate structure. Examining these ...
by H. Bunke, Peter J. Dickinson, Miro Kraetzl & others
This monograph treats the application of numerous graph-theoretic algorithms to a comprehensive analysis of dynamic enterprise networks. Network dynamics analysis yields valuable information about network performance, efficiency, fault ...
by P-.L. Curien
This book is a thoroughly revised edition of a monograph that presents an approach to the design and implementation of sequential programming languages based on the relationship between lambda-calculus and category theory. The foundations of a ...
by Allen Kent & James G. Williams
This comprehensive reference work provides immediate, fingertip access to state-of-the-art technology in nearly 700 self-contained articles written by over 900 international authorities. Each article in the Encyclopedia features current ...