Coding theory and cryptology Books

160 products


  • Cryptography Apocalypse

    John Wiley & Sons Inc Cryptography Apocalypse

    1 in stock

    Book SynopsisWill your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every dayHTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most tTable of ContentsIntroduction xxi I Quantum Computing Primer 1 1 Introduction to Quantum Mechanics 3 What is Quantum Mechanics? 3 Quantum is Counterintuitive 4 Quantum Mechanics is Real 5 The Basic Properties of Quantum Mechanics 8 Photons and Quantum Mechanics 8 Photoelectric Effect 9 Wave-Particle Duality 10 Probability Principle 14 Uncertainty Principle 17 Spin States and Charges 20 Quantum Tunneling 20 Superposition 21 Observer Effect 22 No-Cloning Theorem 24 Spooky Entanglement 24 Decoherence 25 Quantum Examples in Our World Today 27 For Additional Information 28 Summary 29 2 Introduction to Quantum Computers 31 How are Quantum Computers Different? 31 Traditional Computers Use Bits 31 Quantum Computers Use Qubits 33 Quantum Computers are Not Ready for Prime Time Yet 37 Quantum Will Reign Supreme Soon 38 Quantum Computers Improve Qubits Using Error Correction 39 Types of Quantum Computers 44 Superconducting Quantum Computers 44 Quantum Annealing Computers 45 Universal Quantum Computers 47 Topological Quantum Computers 49 Microsoft Majorana Fermion Computers 50 Ion Trap Quantum Computers 51 Quantum Computers in the Cloud 53 Non-U.S. Quantum Computers 53 Components of a Quantum Computer 54 Quantum Software 55 Quantum Stack 55 Quantum National Guidance 56 National Policy Guidance 56 Money Grants and Investments 56 Other Quantum Information Science Besides Computers 57 For More Information 58 Summary 58 3 How Can Quantum Computing Break Today’s Cryptography? 59 Cryptography Basics 59 Encryption 59 Integrity Hashing 72 Cryptographic Uses 73 How Quantum Computers Can Break Cryptography 74 Cutting Time 74 Quantum Algorithms 76 What Quantum Can and Can’t Break 79 Still Theoretical 82 Summary 83 4 When Will the Quantum Crypto Break Happen? 85 It Was Always “10 Years from Now” 85 Quantum Crypto Break Factors 86 Is Quantum Mechanics Real? 86 Are Quantum Computers Real? 87 Is Superposition Real? 87 Is Peter Shor’s Algorithm Real? 88 Do We Have Enough Stable Qubits? 88 Quantum Resources and Competition 89 Do We Have Steady Improvement? 89 Expert Opinions 90 When the Quantum Cyber Break Will Happen 90 Timing Scenarios 90 When Should You Prepare? 93 Breakout Scenarios 95 Stays in the Realm of Nation-States for a Long Time 95 Used by Biggest Companies 97 Mass Proliferation 97 Most Likely Breakout Scenario 97 Summary 98 5 What Will a Post-Quantum World Look Like? 99 Broken Applications 99 Weakened Hashes and Symmetric Ciphers 100 Broken Asymmetric Ciphers 103 Weakened and Broken Random Number Generators 103 Weakened or Broken Dependent Applications 104 Quantum Computing 114 Quantum Computers 114 Quantum Processors 115 Quantum Clouds 115 Quantum Cryptography Will Be Used 116 Quantum Perfect Privacy 116 Quantum Networking Arrives 117 Quantum Applications 117 Better Chemicals and Medicines 118 Better Batteries 118 True Artificial Intelligence 119 Supply Chain Management 120 Quantum Finance 120 Improved Risk Management 120 Quantum Marketing 120 Better Weather Prediction 121 Quantum Money 121 Quantum Simulation 122 More Precise Military and Weapons 122 Quantum Teleportation 122 Summary 126 II Preparing for the Quantum Break 127 6 Quantum-Resistant Cryptography 129 NIST Post-Quantum Contest 129 NIST Security Strength Classifications 132 PKE vs. KEM 133 Formal Indistinguishability Assurances 134 Key and Ciphertext Sizes 135 Types of Post-Quantum Algorithms 136 Code-Based Cryptography 136 Hash-Based Cryptography 137 Lattice-Based Cryptography 138 Multivariate Cryptography 140 Supersingular Elliptic Curve Isogeny Cryptography 140 Zero-Knowledge Proof 141 Symmetric Key Quantum Resistance 142 Quantum-Resistant Asymmetric Encryption Ciphers 143 BIKE 145 Classic McEliece 145 CRYSTALS-Kyber 146 FrodoKEM 146 HQC 147 LAC 148 LEDAcrypt 148 NewHope 149 NTRU 149 NTRU Prime 150 NTS-KEM 150 ROLLO 151 Round5 151 RQC 151 SABER 152 SIKE 152 ThreeBears 153 General Observations on PKE and KEM Key and Ciphertext Sizes 155 Quantum-Resistant Digital Signatures 156 CRYSTALS-Dilithium 156 FALCON 157 GeMSS 158 LUOV 158 MQDSS 159 Picnic 159 qTESLA 160 Rainbow 160 SPHINCS+ 161 General Observations on Signature Key and Sizes 162 Caution Advised 164 A Lack of Standards 164 Performance Concerns 165 Lack of Verified Protection 165 For Additional Information 166 Summary 166 7 Quantum Cryptography 167 Quantum RNGs 168 Random is Not Always Random 168 Why is True Randomness So Important? 170 Quantum-Based RNGs 172 Quantum Hashes and Signatures 177 Quantum Hashes 177 Quantum Digital Signatures 178 Quantum Encryption Ciphers 180 Quantum Key Distribution 181 Summary 188 8 Quantum Networking 189 Quantum Network Components 189 Transmission Media 189 Distance vs. Speed 191 Point-to-Point 192 Trusted Repeaters 193 True Quantum Repeaters 194 Quantum Network Protocols 196 Quantum Network Applications 199 More Secure Networks 199 Quantum Computing Cloud 200 Better Time Syncing 200 Prevent Jamming 201 Quantum Internet 202 Other Quantum Networks 203 For More Information 204 Summary 204 9 Preparing Now 207 Four Major Post-Quantum Mitigation Phases 207 Stage 1: Strengthen Current Solutions 207 Stage 2: Move to Quantum-Resistant Solutions 211 Stage 3: Implement Quantum-Hybrid Solutions 213 Stage 4: Implement Fully Quantum Solutions 214 The Six Major Post-Quantum Mitigation Project Steps 214 Step 1: Educate 215 Step 2: Create a Plan 220 Step 3: Collect Data 225 Step 4: Analyze 226 Step 5: Take Action/Remediate 228 Step 6: Review and Improve 230 Summary 230 Appendix: Additional Quantum Resources 231 Index 239

    1 in stock

    £22.94

  • Tribe of Hackers Red Team

    John Wiley & Sons Inc Tribe of Hackers Red Team

    2 in stock

    Book SynopsisTable of ContentsIntroduction vi 01 Marcus J. Carey 1 02 David Bell 5 03 Paul Brager 10 04 Beau Bullock 16 05 Christopher Campbell 22 06 Stephanie Carruthers 28 07 Mark Clayton 34 08 Ben Donnelly 39 09 Skip Duckwall 47 10 Ronald Eddings 52 11 Justin Elze 57 12 Mike Felch 62 13 Kevin Figueroa 70 14 Marco Figueroa 75 15 Jared Folkins 80 16 Rob Fuller 86 17 Patrick Fussell 92 18 Chris Gates 97 19 Brian Genz 102 20 Jared Haight 112 21 Stephen Hilt 118 22 Brent Kennedy 122 23 David Kennedy 128 24 Maggie Ligon 139 25 Jeff rey Man 143 26 Tim MalcomVetter 151 27 Brandon McCrillis 161 28 Oddvar Moe 164 29 Chris Nickerson 169 30 Ryan O’Horo 176 31 Carlos Perez 179 32 Francesc Rodriguez 185 33 Derek Rook 190 34 Isaiah Sarju 195 35 Mary Sawyer 200 36 Bradley Schaufenbuel 204 37 Tinker Secor 210 38 Jayson E. Street 217 39 Chris Truncer 223 40 Carl Vincent 230 41 Georgia Weidman 238 42 Adam Willard 244 43 Jake Williams 248 44 Robert Willis 253 45 Robin Wood 259 46 Wirefall 264 47 Phillip Wylie 271 Epilogue 274

    2 in stock

    £17.09

  • Tribe of Hackers Blue Team

    John Wiley & Sons Inc Tribe of Hackers Blue Team

    1 in stock

    Book SynopsisBlue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skiTable of ContentsAcknowledgments vii Foreword ix Introduction xi 01 Marcus J. Carey 1 02 Danny Akacki 6 03 Ricky Banda 9 04 William Bengtson 14 05 Amanda Berlin 20 06 O’Shea Bowens 27 07 John Breth 31 08 Lee Brotherston 38 09 Ronald Bushar 47 10 Christopher Caruso 56 11 Eddie Clark 66 12 Mark Clayton 74 13 Ayman Elsawah 80 14 Sahan Fernando 91 15 Stephen Hilt 96 16 Bea Hughes 101 17 Terence Jackson 109 18 Tanya Janca 113 19 Ruth Juma 119 20 Brendon Kelley 123 21 Shawn Kirkland 129 22 Sami Laiho 139 23 Kat Maddox 143 24 Jeffrey Man 147 25 April Mardock 154 26 Bright Gameli Mawudor 159 27 Duncan McAlynn 164 28 Frank McGovern 170 29 Donald McFarlane 172 30 Nathan McNulty 180 31 James Medlock 187 32 Daniel Miessler 192 33 Alyssa Miller 196 34 Maggie Morganti 205 35 Justin Moss 211 36 Mark Orlando 218 37 Mitch Parker 224 38 Stuart Peck 231 39 Carlos Perez 236 40 Quiessence Phillips 242 41 Lauren Proehl 248 42 Josh Rickard 255 43 Megan Roddie 266 44 Jason Schorr 270 45 Chris Sistrunk 274 46 Jayson E. Street 280 47 Michael Tanji 286 48 Ronnie Tokazowski 294 49 Ashley Tolbert 298 50 Ismael Valenzuela 304 51 Dave Venable 321 52 Robert "TProphet" Walker 326 53 Jake Williams 334 54 Robert Willis 340

    1 in stock

    £17.09

  • Tribe of Hackers Security Leaders

    John Wiley & Sons Inc Tribe of Hackers Security Leaders

    2 in stock

    Book SynopsisTribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the Table of ContentsAcknowledgments vii Introduction viii 01 Marcus J. Carey 1 02 Ian Anderson 6 03 James Arlen 14 04 Mark Arnold 25 05 Andrew Bagrin 31 06 Zate Berg 36 07 Tash Bettridge 46 08 Philip Beyer 50 09 Kyle Bubp 58 10 Joanna Burkey 64 11 Bill Burns 70 12 Lesley Carhart 78 13 Christopher Caruso 83 14 Mike Chapple 91 15 Steve Christey Coley 98 16 Jim Christy 102 17 Chris Cochran 110 18 Edward Contreras 114 19 Dan Cornell 117 20 Mary Ann Davidson 124 21 Kimber Dowsett 132 22 David Evenden 136 23 Martin Fisher 141 24 Chris Hadnagy 147 25 Andrew Hay 153 26 Mark Hillick 157 27 Terence Jackson 165 28 Tanya Janca 168 29 David Kennedy 174 30 Joe Krull 180 31 Robert M. Lee 188 32 Rafal Los 194 33 Tracy Z. Maleeff 199 34 Jeffrey Man 202 35 Angela Marafino 209 36 James Medlock 212 37 Kent Nabors 221 38 Charles Nwatu 228 39 Greg Ose 232 40 Edward Prevost 239 41 Ray [REDACTED] 244 42 Stephen A. Ridley 249 43 David Rook 255 44 Marina Segal 259 45 Khalil Sehnaoui 262 46 Jackie Singh 267 47 Dan Tentler 271 48 Eugene Teo 274 49 Dominique West 279 50 Jake Williams 283 51 Wirefall 288 Appendix: Recommended Reading 293

    2 in stock

    £17.09

  • Fundamentals of Classical and Modern

    Cambridge University Press Fundamentals of Classical and Modern

    1 in stock

    Book SynopsisUsing easy-to-follow mathematics, this textbook provides comprehensive coverage of block codes and techniques for reliable communications and data storage. It covers major code designs and constructions from geometric, algebraic, and graph-theoretic points of view, decoding algorithms, error control additive white Gaussian noise (AWGN) and erasure, and dataless recovery. It simplifies a highly mathematical subject to a level that can be understood and applied with a minimum background in mathematics, provides step-by-step explanation of all covered topics, both fundamental and advanced, and includes plenty of practical illustrative examples to assist understanding. Numerous homework problems are included to strengthen student comprehension of new and abstract concepts, and a solutions manual is available online for instructors. Modern developments, including polar codes, are also covered. An essential textbook for senior undergraduates and graduates taking introductory coding courses, Trade Review'… masterfully provides a comprehensive treatment of both traditional codes as well as new and most promising coding families and decoding algorithms …' Bane Vasić, University of Arizona' an excellent, unique, and valuable contribution to the teaching of the subject.' Ian Blake, University of British Columbia'A highly readable introduction into the theory of block codes, including classical code constructions, an extensive treatment of LDPC codes, with emphasis on quasi-cyclic constructions, and an introduction to polar codes. Recommended for a beginning graduate course in coding, with enough material for either one or two semesters. Numerous examples and problems make the book very student friendly.' Daniel Costello, University of Notre Dame'The book truly explains these highly mathematical subjects to a level that can be accessed and applied with as little background in mathematics as possible. It provides step-by-step explanation of all covered topics, both more theoretical or applied, and includes sufficient illustrative examples to assist understanding.' Nikolay Yankov, zbMATHTable of ContentsPreface; Acknowledgments; 1. Coding for reliable digital information transmission and storage; 2. Some elements of modern algebra and graphs; 3. Linear block codes; 4.Binary cyclic codes; 5. BCH codes; 6. Nonbinary BCH codes and Reed-Solomon codes; 7. Finite geometries, cyclic finite geometry codes, and majority-logic decoding; 8. Reed-Muller codes; 9. Some coding techniques; 10. Correction of error-bursts and erasures; 11. Introduction to low-density parity-check codes; 12. Cyclic and quasi-cyclic LDPC codes on finite geometries; 13. Partial geometries and their associated QC-LDPC codes; 14. Quasi-cyclic LDPC codes based on finite fields; 15. Graph-theoretic LDPC codes; 16. Collective encoding and soft-decision decoding of cyclic codes of prime lengths in Galois Fourier transform domain; 17. Polar codes; Appendices.

    1 in stock

    £71.24

  • Introduction to Quantum Cryptography

    Cambridge University Press Introduction to Quantum Cryptography

    1 in stock

    Book SynopsisThis book provides a comprehensive introduction to quantum cryptography for advanced undergraduate and graduate students in computer science, physics, engineering and applied mathematics. Requiring no background in quantum computing, this title includes discussion of both background theory and key, modern applications of quantum cryptography.Trade Review'If you are intrigued by the prospects of quantum cryptography but not yet familiar with the formalism behind it, then this book is the perfect starting point for you. It playfully introduces the most important concepts in modern quantum cryptography, and at the same time gently but purposefully helps you discover the mathematical framework required to make formal statements.' Marco Tomamichel, National University of Singapore'Vidick and Wehner cover quantum cryptography in its full beauty and depth. Packed with enlightening examples and comprehensive exercises, this book will likely become an indispensable companion next time I hold lectures on the subject.' Renato Renner, ETH Zurich'Thomas Vidick and Stephanie Wehner take readers on an insightful exploration of the full landscape of quantum cryptography, skillfully weaving together theory and applications and providing pedagogical quizzes and exercises. The mathematical formalism is rigorous yet approachable, making this book an excellent introduction to this captivating area.' Anne Broadbent, University of OttawaTable of ContentsPreface; 1. Background material; 2. Quantum tools and a first protocol; 3. Quantum money; 4. The power of entanglement; 5. Quantifying information; 6. From imperfect information to (near) perfect security; 7. Distributing keys; 8. Quantum key distribution protocols; 9. Quantum cryptography using untrusted devices; 10. Quantum cryptography beyond key distribution; 11. Security from physical assumptions; 12. Further topics around encryption; 13. Delegated computation; References; Index.

    1 in stock

    £42.74

  • Codes and Ciphers  A History Of Cryptography

    15 in stock

    £18.04

  • An Introduction to Mathematical Cryptography

    Springer An Introduction to Mathematical Cryptography

    15 in stock

    Book SynopsisAn Introduction to Cryptography.- Discrete Logarithms and Diffie Hellman.- Integer Factorization and RSA.- Combinatorics, Probability and Information Theory.- Elliptic Curves and Cryptography.- Lattices and Cryptography.- Digital Signatures.- Additional Topics in Cryptography.Trade ReviewFrom the reviews: "The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information … . The material is very well organized, and it is self-contained: no prerequisites in higher mathematics are needed. In fact, everything is explained and carefully covered … . there is abundance of examples and proposed exercises at the end of each chapter. … This book is ideal as a textbook for a course aimed at undergraduate mathematics or computer science students." (Fabio Mainardi, The Mathematical Association of America, October, 2008) "This book focuses on public key cryptography … . Hoffstein, Pipher, and Silverman … provide a thorough treatment of the topics while keeping the material accessible. … The book uses examples throughout the text to illustrate the theorems, and provides a large number of exercises … . The volume includes a nice bibliography. … Summing Up: Highly recommended. Upper-division undergraduate through professional collections." (C. Bauer, Choice, Vol. 46 (7), March, 2009) "For most undergraduate students in mathematics or computer science (CS), mathematical cryptography is a challenging subject. … it is written in a way that makes you want to keep reading. … The authors officially targeted the book for advanced undergraduate or beginning graduate students. I believe that this audience is appropriate. … it could even be used with students who are just learning how to execute rigorous mathematical proofs. … I strongly believe that it finds the right tone for today’s students … ." (Burkhard Englert, ACM Computing Reviews, March, 2009) "The exercises and text would make an excellent course for undergraduate independent study. … This is an excellent book. Hoffstein, Pipher and Silverman have written as good a book as is possible to explain public key cryptography. … This book would probably be best suited for a graduate course that focused on public key cryptography, for undergraduate independent study, or for the mathematician who wants to see how mathematics is used in public key cryptography." (Jintai Ding and Chris Christensen, Mathematical Reviews, Issue 2009 m)Table of ContentsAn Introduction to Cryptography.- Discrete Logarithms and Diffie-Hellman.- Integer Factorization and RSA.- Probability Theory and Information Theory.- Elliptic Curves and Cryptography.- Lattices and Cryptography.- Digital Signatures.- Additional Topics in Cryptology.

    15 in stock

    £49.49

  • Primality Testing and Integer Factorization in PublicKey Cryptography 11 Advances in Information Security

    Springer Us Primality Testing and Integer Factorization in PublicKey Cryptography 11 Advances in Information Security

    1 in stock

    Book SynopsisIntended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography.Trade ReviewFrom the reviews of the second edition:"The well-written and self-contained second edition ‘is designed for a professional audience composed of researchers practitioners in industry.’ In addition, ‘this book is also suitable as a secondary text for graduate-level students in computer science, mathematics, and engineering,’ as it contains about 300 problems. … Overall … ‘this monograph provides a survey of recent progress in Primality Testing and Integer Factorization, with implications in factoring-based Public Key Cryptography.’" (Hao Wang, ACM Computing Reviews, April, 2009)“This is the second edition of a book originally published in 2004. … I used it as a reference in preparing lectures for an advanced cryptography course for undergraduates, and it proved to be a wonderful source for a general description of the algorithms. … the book will be a valuable addition to any good reference library on cryptography and number theory … . It contains descriptions of all the main algorithms, together with explanations of the key ideas behind them.” (S. C. Coutinho, SIGACT News, April, 2012)Table of ContentsPreface to the Second Edition.- Preface to the First Edition.- Number-Theoretic Preliminaries.- Problems in Number Theory. Divisibility Properties. Euclid's Algorithm and Continued Fractions. Arithmetic Functions. Linear Congruences. Quadratic Congruences. Primitive Roots and Power Residues. Arithmetic of Elliptic Curves. Chapter Notes and Further Reading.- Primality Testing and Prime Generation.- Computing with Numbers and Curves. Riemann Zeta and Dirichlet L Functions. Rigorous Primality Tests. Compositeness and Pseudoprimality Tests. Lucas Pseudoprimality Test. Elliptic Curve Primality Tests. Superpolynomial-Time Tests. Polynomial-Time Tests. Primality Tests for Special Numbers. Prime Number Generation. Chapter Notes and Further Reading.- Integer Factorization and Discrete Logarithms.- Introduction. Simple Factoring Methods. Elliptic Curve Method (ECM). General Factoring Congruence. Continued FRACtion Method (CFRAC). Quadratic Sieve (QS). Number Field Sieve (NFS). Quantum Factoring Algorithm. Discrete Logarithms. kth Roots. Elliptic Curve Discrete Logarithms. Chapter Notes and Further Reading.- Number-Theoretic Cryptography.- Public-Key Cryptography. RSA Cryptosystem. Rabin Cryptography. Quadratic Residuosity Cryptography. Discrete Logarithm Cryptography. Elliptic Curve Cryptography. Zero-Knowledge Techniques. Deniable Authentication. Non-Factoring Based Cryptography. Chapter Notes and Further Reading.- Bibliography.- Index.- About the Author.

    1 in stock

    £123.25

  • Democratizing Cryptography

    Morgan & Claypool Publishers Democratizing Cryptography

    15 in stock

    Book SynopsisWhile other books have documented the development of public key cryptograpy, this is the first to provide a comprehensive insiders’ perspective on the full impacts of public key cryptography, including six original chapters by nine distiguished scholars.

    15 in stock

    £65.55

  • Codeless Data Structures and Algorithms

    APress Codeless Data Structures and Algorithms

    1 in stock

    Book SynopsisTable of ContentsPart 1: Data Structures.- Chapter 1: Intro to DSA, Types and Big-O.- Chapter 2: Linear Data Structures.- Chapter 3: Tree Data Structures.- Chapter 4: Hash Data Structures.- Chapter 5: Graphs.- Part 2: Algorithms.- Chapter 6: Linear and Binary Search.- Chapter 7: Sorting Algorithms.- Chapter 8: Searching Algorithms.- Chapter 9: Clustering Algorithms.- Chapter 10: Randomness.- Chapter 11: Scheduling Algorithms.- Chapter 12: Algorithm Planning and Design.- Appendix A: Going Further.-

    1 in stock

    £29.99

  • The Quiet Crypto Revolution

    APress The Quiet Crypto Revolution

    1 in stock

    Book SynopsisCrypto is going to change the world, and for those tired of confusing financial jargon and complicated technical terminology, look no further. This book demystifies the world of cryptocurrencies and blockchain technology and explains in accessible language how it will affect your daily life. In The Quiet Crypto Revolution, Klaas Jung dives beneath the surface of Bitcoin to explore the engine that powers it - blockchain. Far surpassing the confines of cryptocurrencies, blockchain's potential for wide-ranging applications is enormous. It's crucial to understand that cryptocurrencies are merely a single manifestation of blockchain's capabilities. This book casts light on the broader spectrum of blockchain applications and the exciting future of this groundbreaking technology. With a focus on real-world applications, you'll gain a deeper understanding of the key concepts behind the innovative technology of blockchain, equipping you to make informed decisions. Whether you're a tech-savvy iTable of Contents1. Introduction to The Crypto Revolution.- 2. Understanding the Blockchain.- 3. The future of blockchain technology.- 4. Cryptocurrency in Practice.- 5. The Future of Decentralized Finance.- 6. Security and Scams.- 7. Crypto Pioneers: Exploring Entrepreneurial Opportunities.- 8. Final Thoughts: The Future of Crypto.

    1 in stock

    £18.99

  • Still Searching for Satoshi

    APress Still Searching for Satoshi

    1 in stock

    Book SynopsisWe are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization. This is sometimes called Web 3.0. While Web 1.0 transformed information sharing and commerce and brought us giants like Google and Amazon and Web 2.0 unlocked the social potential of the internet and created Facebook, Twitter, and Snapchat, exactly what will come of Web 3.0 remains to be seen. It is indisputable that the seed of Web 3.0 is the technological, social, and economic innovations that came together in Bitcoin and the blockchain technology it created. But where the first web iterations were relatively straightforward to understand, the inner workings of Web 3.0 remain more opaque and shrouded in mystique. Current voices on Bitcoin and the blockchain revolution fall squarely into one of two camps; either technological experts who are all also invTable of ContentsIntroduction Part 1 - Genealogy of bitcoin technology The technological developments leading to bitcoin. This part is a technological history that reviews the technological developments that Bitcoin builds on. There are a few strands that developed more or less independently that combine into Bitcoin. Once they are explained it is possible to give a deeper explanation of how Bitcoin works. This understanding will inform the remaining parts of the book. Chapter 1: Cryptography The purpose of cryptography is to keep information private by preserving confidentiality, integrity and access to it. Public private key encryption Hashing Zero knowledge proof Chapter 2: Virtual Money In this chapter we will go into the history of electronic or virtual money before bitcoin. Digicash E gold Bitgold b Money Hash cash Chapter 3: Peer-to-peer technology The internet of today is a centralized type of computing working through a number of web servers that function in a hierarchy. Properties of p2p networks Discovering a peer Secure sharing File Sharing from Napster to BitTorrent Chapter 4: Proof of work An inherent problem with the networked world is that accessing and processing information is essentially free, which makes certain types of disruptive behavior easy, which we see in denial of service attacks, spam mail and robocalling. This brings new problems that did not exist when it cost significant money to send a letter, read a paper or book or make a phone call. DDoS Spam Money transactions Chapter 5: Public record Since the time of the code of Hammurabi, the purpose of a public record has been clear: to establish indisputable truth. While this is seemingly the opposite of the privacy and confidentiality entailed by cryptography it serves the purpose of making information shared and immutable. Historical technologies of public record The purpose of public records The accounting revolution and the development of ledgers, double entry bookkeeping to triple entry bookkeeping Chapter 6: Bitcoin From the previous chapters we are now able to piece together how bitcoin and the block chain works. Virtual money - The Bitcoin Encrypting for privacy - The Wallet Public record - The Blockchain Peer to peer network - The Miners Proof of work - Transactions (cryptographic proof and the consensus algorithm) Part 2 - Still searching for Satoshi - who is the historical Satoshi Nakamoto? Much writing about Bitcoin has focused on who the historical person or persons behind Satoshi Nakamoto is. This part will apply a historical critical perspective to this question and sift through the evidence in order to create a better understanding of what we can and cannot say about the identity of Satoshi Nakamoto. Chapter 7: Who dunnit? A review of previous identifications of the person behind Satoshi. This has previously taken the shape of investigative journalism in the style of true crime reporting Joshua Davis, The New Yorker 2011 Adam Penenberg, Fast Company 2011 Alec Liu, Vice 2013 John Markoff, New York Times 2013 Andy Greenberg, Forbes 2014 Leah McGrath Goodman, Newsweek 2014 Skye Grey, blog 2014 Dominic Frisby, Bitcoin the future of money 2014 Nathaniel Popper, New York Time 2015 Andy Greenberg, Gwern Branwen, Wired 2015 Sam Biddle, Gizmodo 2015 Izabella Kasminska, Financial Times 2016 Evan Ratliff, Wired 2019 Other sources - twitter, youtube, tv Chapter 8: Ad fontes-What do the sources say? By focusing on the sources we are able to extract a number of key characteristics to look for: Historical analysis - establishes a couple of key points for historical analysis The bitcoin whitepaper - the most crucial piece of evidence The forums - the p2p forum and later the bitcoin forum are sources where Satoshi discussed with peers about bitcoin The code - the code in itself may also contain clues The blockchain - the record of transactions also provides an insight into the origin of bitcoin Summary - what can the sources tell us? Chapter 9: Motives What were the motives behind the creation of bitcoin Ideology - what can be said about the ideology of the author based on extant sources? Why the synonym? - what could be the reason for the initial and continued secrecy surrounding the inventor? Summary - why did the inventor invent bitcoin and in this particular way? Chapter 10: The social network of early bitcoin Who were the people involved in the beginning of Bitcoin p2p forum communication Bitcoin forum communication Blockchain transactions Summary - what can we learn from looking at the bitcoin initial network Chapter 11: The usual suspects? Rather than pointing definitively to one or another suspect we will try to integrate the knowledge we have gained with the list of known suspects. An evaluation framework - developing an evaluation framework against which to measure the likelihood of any candidate being Satoshi Nakamoto Prime suspects - the suspects that have gained most attention · Hal Finney · Nick Szabo · Dorian Sakamoto · Craig Wright and David Kleiman · Paul Leroux Secondary suspects - suspects that have gained some attention · Vili Lehdonum and Michael Clear · Neal King, Vladimir Oksman, Charles Bry · Hal Finney, Nick Szabo and Adam Back · Shinichi Mochizuki · Ross Ulbricht · Adam Back · Gavin Andresen · Jed McCaleb · Elon Musk · Len Sassaman · Someone else A new primary suspect - as in the movie The Usual Suspects, careful analysis points towards a surprising suspect who is not in the primary field of suspects. Part 3 - Bitcoin in context How is bitcoin viewed in the wider context of human civilization? Bitcoin does not exist in a technological bubble addressing only technological issues. It is firmly situated in a web of themes that are and have been central to human civilization. This may account for its notoriety but needs to be put in context. Chapter 12: Money Since prehistoric times humans have engaged in exchange. This falls in a continuum from barter, through intermediaries as cowry shells, gold and silver coins to purely symbolic means of exchange. The history of money Medium of exchange Unit of account Standard of deferred payment Store of value Types of money · Commodity · Representative money · Fiat · Digital money · Deposits The politics of money Money as a bridge between domains of value Chapter 13: Ownership Proving that you own something has been a central feature of human societies for millenia and disputes have fueled more than its share of violence and conflict. Owners · Private · Public · Corporate · Communal Property · Tangible · Intangible Establishing and policing ownership · National · Transnational Chapter 14: Social organization Human societies have always been characterized by some sort of social organization. The different options have been debated since classical antiquity. This chapter will take a look at the space of social organization and narrow it down to the particular types associated with bitcoin and blockchain. An ancient discussion: Monarchy, Oligarchy and Democracy - and anarchy Centralization vs decentralization Types of social organization in human groups Open source Cypher punks Chapter 15: Religion A rarely debated issue are the religious aspects surrounding Bitcoin and the blockchain movement. But these aspects are nothing new when it comes to human cultures. Understanding this helps explain a lot of the seemingly strange behavior of bitcoin believers without claiming that Bitcoin is an actual religion. The prophet - Satoshi Nakamoto Sacred scriptures- The Bitcoin whitepaper and the forum posts Believers and heathens Cargo cults Millenarianism Part 4 - Blockchain and the future Where can blockchain technology be applied? Where, if anywhere, might we see cryptocurrencies and the blockchain in the future and how might it affect our lives? A case could be made that we are only in the beginning phases of the blockchain now, sometimes called Web3, where the worst of the teething problems are gone and the wild west ethos is receding. Where not to use blockchain - First let us consider a number of areas where blockchain is currently suggested that might not be particularly relevant. Parameters to be tweaked - Bitcoin was the first version of blockchain technology and certain choices were made. But subsequent and future blockchains need not make the same choices. We need to understand how this can be done in order to ascertain the future utility of the blockchain. Transaction speed Energy consumption Degree of centralization Public availability Mining rewards Banking - even though Bitcoin at its outset was antithetical to the banking industry there are particularly good use cases here. Payment - bitcoin may not in itself have been very successful as a payments solution so far but there is no reason why another cryptocurrency will not be. Current payment systems are slow and expensive compared to what the blockchain can offer. International payments Remittance Peer to peer payments Micropayments Certification - building on the ability to serve as a public record there are good reasons that a blockchain can serve as a public record for information about ownership NFTs Real estate Media Contracts - the ability to establish indisputable truth makes it possible to build contracts that automatically execute according to some logic. This can be used for escrow services and delivery of other services as well as insurance. Regulatory compliance - the immutability of the blockchain makes it good for a great number of use cases where fraud has previously been an issue Forensics - the public nature of the blockchain makes it a valuable tool for law enforcement, especially international law enforcement, which has already proven its worth in a number of high profile cases. Supply chain - the blockchain is well suited for keeping track of things movement across time and place. Health - keeping track of health trackers and personal health records could be done on a blockchain Government - in government there are also areas where blockchain may be useful Special purpose tokens Voting Identity Glossary Key concepts described

    1 in stock

    £38.24

  • Introduction to Biometrics

    Springer-Verlag New York Inc. Introduction to Biometrics

    3 in stock

    Book SynopsisWhile the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students.Table of ContentsIntroduction.- Fingerprint Recognition.- Face Recognition.- Iris Recognition.- Additional Biometric Traits.- Multibiometrics.- Security of Biometric Systems.

    3 in stock

    £49.49

  • HandsOn Smart Contract Development with Solidity

    O'Reilly Media HandsOn Smart Contract Development with Solidity

    1 in stock

    Book SynopsisReady to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distributed computing platform.

    1 in stock

    £42.39

  • Mastering Blockchain

    O'Reilly Media Mastering Blockchain

    1 in stock

    Book SynopsisThis detailed guide distills the complex, fast moving ideas behind blockchain into an easily digestible reference manual, showing what's really going on under the hood.

    1 in stock

    £47.99

  • Bloomsbury Professional Law Insight -

    Bloomsbury Publishing PLC Bloomsbury Professional Law Insight -

    5 in stock

    Book SynopsisThis book explores the specialist area of cryptocurrency in the context of matrimonial finance proceedings. The work is split into two parts. The first part provides a comprehensive primer on cryptocurrency and blockchain technology. It explains what cryptocurrencies are, how they are held by their owners, and how blockchain technology works. This part also considers the legal status and current regulatory treatment of cryptocurrency in England and Wales. The second part provides an overview of financial remedies and the distributive principles applied by the Family Court in matrimonial finance cases. It analyses the current case law on cryptocurrencies as a variety of ‘property’, before exploring issues that practitioners may face when encountering crypto-assets in litigation. This includes the challenges of valuing, tracing, and freezing cryptocurrency, as well as disclosure considerations. The work includes an overview of the principles relating to ‘self-help’ disclosure and associated criminal offences pursuant to the Computer Misuse Act 1990 and the Data Protection Act 2018. It also contains a summary of HMRC’s current guidance on the taxation of crypto-assets for individuals. This title is included in Bloomsbury Professional's Family Law and Cyber Law online services.Table of Contents1. Introduction 2. An Introduction to Cryptocurrency a. Introduction b. Types of cryptoassets c. What is cryptocurrency? d. Comparing transaction systems: ‘traditional’ finance v cryptocurrency e. The legal status of cryptocurrency in the United Kingdom f. Case study: the evolution of Bitcoin 3. Blockchain a. Introduction b. What is blockchain? c. How blockchain works d. The consensus mechanism e. Advantages and disadvantages of blockchain f. Applications of blockchain technology g. Smart contracts h. Non-Fungible Tokens 4. The Cryptocurrency Ecosystem a. Introduction b. Key players and key terms c. Top 10 cryptocurrencies by market capitalisation: Bitcoin, Ethereum, Tether, USD Coin, BNB, Cardano, XRP, Binance USD, Solana, Dogecoin 5. Regulation of cryptocurrency in the United Kingdom a. Introduction b. The FCA regulatory perimeter c. Financial regulation by category: security tokens, e-money tokens, exchange tokens, utility tokens, stablecoins d. AML / CTF financing e. Regulatory developments in the UK 6. Overview of financial remedies in matrimonial finance a. Introduction b. The Court’s powers and statutory discretion c. The distributive principles d. Matrimonial and non-matrimonial property e. Special contributions f. Income g. Summary 7. Cryptocurrency as a matrimonial asset a. Are cryptocurrencies ‘property’ and why does it matter? b. Are cryptocurrencies divisible? c. Disclosure on Form E 8. Practical considerations in litigation a. Introduction b. Identifying and tracing cryptocurrency c. Valuation of cryptocurrency d. Disclosure, freezing orders, and preservation of devices e. Self-help disclosure and associated criminal offences f. Taxation

    5 in stock

    £57.00

  • Serious Cryptography: A Practical Introduction to

    No Starch Press,US Serious Cryptography: A Practical Introduction to

    2 in stock

    Book SynopsisSerious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related toTrade Review“A superb introduction to modern encryption and cryptography. For those looking to quickly get up to speed on the topics, this makes for an excellent go-to guide.”—Ben Rothke, RSA Conference“It's really a love letter to cryptography.”—Nadim Kobeissi“For those who really want to understand how cryptography works, and who need to use it in practice, I thoroughly recommend Serious Cryptography.”—Martijn Grooten, Virus Bulletin“Impressive in its breadth...the state of the art in applied cryptography is distilled here in a mere 282 pages.”—Federico Lucifredi, The Hub“Aumasson successfully ensures that the reader has a strong understanding of cryptography’s core ideas... Serious Cryptography is a must read for anyone wanting to enter cryptographic engineering.”—Infosecurity Magazine“Each chapter not only explains concepts and key implementation details, but also highlights possible pitfalls, common mistakes, and finishes with a list of recommended materials.”—Artificial Truth"Jean-Philippe Aumasson's Serious Cryptography is a classic (and serious) introduction to the field."—Mary Branscombe, ZDNet"It's advanced but the best book I've ever read for PKI is Serious Cryptography by Aumasson. Probably don't want to start with it but if you get serious you'll want to read it."—Chris Sandvick, @ChrisSandvick"My favorite reference."—Colin O'Flynn, Circuit Cellar"For those wanting to go beyond the basics of cryptography in the blockchain, 'Serious Cryptography' by Jean-Philippe Aumasson is an invaluable resource."—Halborn SecurityTable of ContentsForeword by Matthew D. GreenPrefaceAbbreviationsChapter 1: EncryptionChapter 2: RandomnessChapter 3: Cryptographic SecurityChapter 4: Block CiphersChapter 5: Stream CiphersChapter 6: Hash FunctionsChapter 7: Keyed HashingChapter 8: Authenticated EncryptionChapter 9: Hard ProblemsChapter 10: RSAChapter 11: Diffie–HellmanChapter 12: Elliptic CurvesChapter 13: TLSChapter 14: Quantum and Post-QuantumIndex

    2 in stock

    £35.99

  • New Trends in Cryptographic Systems

    Nova Science Publishers Inc New Trends in Cryptographic Systems

    1 in stock

    Book SynopsisCryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, it has expanded in two main ways: firstly, it provides mechanisms for more than just keeping secrets through schemes like digital signatures, digital cash, etc; secondly, cryptography is used by almost all computer users as it is embedded into the infrastructure for computing and telecommunications. Cryptography ensures secure communications through confidentiality, integrity, authenticity and non-repudiation. Cryptography has evolved over the years from Julius Cesar''s cipher, which simply shifts the letters of the words a fixed number of times, to the sophisticated RSA algorithm, which was invented by Ronald L. Rivest, Adi Shamir and Leonard M. Adleman, and the elegant AES cipher (Advanced Encryption Standard), which was invented by Joan Daemen and Vincent Rijmen. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe. Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices. Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations. The content of this book is divided into three main parts, which are focused on new trends in cryptographic hardware, arithmetic and factoring.

    1 in stock

    £173.24

  • Cryptography for Developers

    Syngress Media,U.S. Cryptography for Developers

    15 in stock

    Book SynopsisThe only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.Table of ContentsIntroduction; ASN.1 Encodings; Random Numbers; Large Integer Arithmetic; Symmetric Key Ciphers; One-Way Hashes; Message Authentication Codes; Encrypted Authentication Modes; Public-Key Cryptography

    15 in stock

    £53.76

  • Current Research Topics on Galois Geometrics

    Nova Science Publishers Inc Current Research Topics on Galois Geometrics

    1 in stock

    Book SynopsisGalois geometry is the theory that deals with substructures living in projective spaces over finite fields, also called Galois fields. This collected work presents current research topics in Galois geometry, and their applications. Presented topics include classical objects, blocking sets and caps in projective spaces, substructures in finite classical polar spaces, the polynomial method in Galois geometry, finite semifields, links between Galois geometry and coding theory, as well as links between Galois geometry and cryptography.

    1 in stock

    £166.49

  • Programming with Types

    Manning Publications Programming with Types

    15 in stock

    Book Synopsis

    15 in stock

    £35.99

  • Hygiene in a Globalized & Post-Antibiotic World:

    Nova Science Publishers Inc Hygiene in a Globalized & Post-Antibiotic World:

    1 in stock

    Book SynopsisIn a globalised and post-antibiotic world, it will be difficult to prevent the spread of infections and pathogens that have historically been largely controllable and treatable. In this scenario, efforts to improve public health will intensify the general trend to move away from sickness treatment to illness prevention and health promotion, as well as increased attention to personal and collective hygiene. This development exposes a potential problem in scholarly literature: much of what we know about influencing what people know about hygiene and why they engage in hygiene behaviour is based on very specific contexts (eg: hospitals and healthcare facilities) and populations (eg: children and healthcare workers). Enter the field of hygiene psychology, which is based on linking the best practices in personal hygiene with relevant personality and contextual factors supported by rigorous and innovative psychological research. We know what people must do to maintain good hygiene, but we must draw from psychology to translate this knowledge into promoting key hygiene behaviours. This book will make these connections by applying psychological principles and research methods to understanding, and affecting, hygiene behaviour change for a number of specific contexts.

    1 in stock

    £69.74

  • Software Design X-Rays: Fix Technical Debt with

    Pragmatic Bookshelf Software Design X-Rays: Fix Technical Debt with

    2 in stock

    Book SynopsisAre you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves social design, as well as technical design, you can find surprising dependencies between people and code to resolve coordination bottlenecks among teams. Best of all, the techniques build on behavioral data that you already have: your version-control system. Join the fight for better code! Use statistics and data science to uncover both problematic code and the behavioral patterns of the developers who build your software. This combination gives you insights you can't get from the code alone. Use these insights to prioritize refactoring needs, measure their effect, find implicit dependencies between different modules, and automatically create knowledge maps of your system based on actual code contributions. In a radical, much-needed change from common practice, guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Discover a comprehensive set of practical analysis techniques based on version-control data, where each point is illustrated with a case study from a real-world codebase. Because the techniques are language neutral, you can apply them to your own code no matter what programming language you use. Guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Apply research findings from social psychology to software development, ensuring you get the tools you need to coach your organization towards better code. If you're an experienced programmer, software architect, or technical manager, you'll get a new perspective that will change how you work with code. What You Need: You don't have to install anything to follow along in the book. TThe case studies in the book use well-known open source projects hosted on GitHub. You'll use CodeScene, a free software analysis tool for open source projects, for the case studies. We also discuss alternative tooling options where they exist.

    2 in stock

    £35.14

  • Codebreaking: A Practical Guide

    No Starch Press,US Codebreaking: A Practical Guide

    10 in stock

    Book SynopsisIf you liked Dan Brown’s Da Vinci Code—or want to solve similarly baffling cyphers yourself—this is the book for you! A thrilling exploration of history’s most vexing codes and ciphers that uses hands-on exercises to teach you the most popular historical encryption schemes and techniques for breaking them.Solve history’s most hidden secrets alongside expert codebreakers Elonka Dunin and Klaus Schmeh, as they guide you through the world of encrypted texts. With a focus on cracking real-world document encryptions—including some crime-based coded mysteries that remain unsolved—you’ll be introduced to the free computer software that professional cryptographers use, helping you build your skills with state-of-the art tools. You’ll also be inspired by thrilling success stories, like how the first three parts of Kryptos were broken. Each chapter introduces you to a specific cryptanalysis technique, and presents factual examples of text encrypted using that scheme—from modern postcards to 19-century newspaper ads, war-time telegrams, notes smuggled into prisons, and even entire books written in code. Along the way, you’ll work on NSA-developed challenges, detect and break a Caesar cipher, crack an encrypted journal from the movie The Prestige, and much more.You’ll learn: How to crack simple substitution, polyalphabetic, and transposition ciphers How to use free online cryptanalysis software, like CrypTool 2, to aid your analysis How to identify clues and patterns to figure out what encryption scheme is being used How to encrypt your own emails and secret messages Codebreaking is the most up-to-date resource on cryptanalysis published since World War II—essential for modern forensic codebreakers, and designed to help amateurs unlock some of history’s greatest mysteries.Trade Review“Codebreaking: A Practical Guide is quite the best book on codebreaking I have read: clear, engaging, and fun. A must for would-be recruits to GCHQ and the NSA!”—Sir Dermot Turing, author of Prof, the biography of his uncle, Alan Turing“Riveting. Dunin and Schmeh show us that we each have our own inner code-breaker yearning to be set free. Codebreaking isn’t just for super-geniuses with supercomputers; it’s something we were all born to do.”—Mike Godwin, creator of Godwin’s law and former general counsel for the Wikimedia Foundation“This is THE book about codebreaking. Very concise, very inclusive, and easy to read. Good references for those who would make codes, too, like Kryptos.”—Ed Scheidt, CIA“A compendium of historical cryptography. Approachable, accessible, this book brings back the joy I felt when I first read about these things as a kid.”—Phil Zimmermann, creator of PGP encryption and inductee into the Internet Hall of Fame“One of the most helpful guides outside the NSA to cracking ciphers. But even if you don’t become a codebreaker, this book is full of fascinating crypto lore.”—Steven Levy, New York Times best-selling author of Crypto, Hackers, and Facebook: The Inside Story“Another kind of Applied Cryptography.”—Whitfield Diffie, Turing Laureate and creator of public-key cryptography“This is the book of my dreams. Super-clear, super-fun guide for solving secret messages of all kinds.”—Jason Fagone, author of the best-selling book The Woman Who Smashed Codes“Kool dnoces a htrow era snootrac eht fo ynam.”—Suomynona Ecila“A wonderful mix of ciphers, both famous and little-known, solved and unsolved. Beginners will be hooked on exploring the world of secrets in cipher, and those who have already been introduced to the field will find much that is new.”—Craig Bauer, editor in chief of Cryptologia and author of Unsolved!: The History and Mystery of the World’s Greatest Ciphers“Cryptography? Ciphers? I thought this would be an easy book to put down. I was very wrong.”—Steve Meretzky, co-author with Douglas Adams of The Hitchhiker’s Guide to the Galaxy computer game"Fun, fascinating, and user friendly . . . Expertly written, organized and presented, [Codebreaking] is unreservedly recommended as a supplemental Code Breaking curriculum textbook."—Midwest Book ReviewTable of ContentsPrefaceChapter 1: How can I break an encrypted message? And other introductory questionsChapter 2: The Caesar cipherChapter 3: Simple substitution ciphersChapter 4: Simple substitution ciphers without spaces between words: PatristocratsChapter 5: Simple substitution ciphers in non-English languagesChapter 6: Homophonic ciphersChapter 7: Codes and nomenclatorsChapter 8: Polyalphabetic ciphersChapter 9: Complete columnar transposition ciphersChapter 10: Incomplete columnar transposition ciphersChapter 11: Turning grille transposition ciphersChapter 12: Digraph substitutionChapter 13: Abbreviation ciphersChapter 14: Dictionary codes and book ciphersChapter 15: Additional encryption methodsChapter 16: Solving ciphers with hill climbingChapter 17: What next?Appendix A: KryptosAppendix B: Useful language statisticsAppendix C: GlossaryAppendix D: Morse CodeAppendix E: Figure SourcesReferences

    10 in stock

    £23.99

  • Computer & Internet Security: A Hands-on Approach

    1 in stock

    £56.99

  • Ada Lovelace Cracks the Code

    Rebel Girls Inc Ada Lovelace Cracks the Code

    2 in stock

    Book SynopsisFrom the world of Good Night Stories for Rebel Girls comes a story based on the exciting real-life adventures of Ada Lovelace, one of the world's first computer programmers.Growing up in nineteenth century London, England, Ada is curious about absolutely everything. She is obsessed with machines and with creatures that fly. She even designs her own flying laboratory!According to her mother, Ada is a bit too wild, so she encourages Ada to study math. At first Ada thinks: Bleh! Who can get excited about a subject without pictures? But she soon falls in love with it. One day she encounters a mysterious machine, and from that moment forward Ada imagines a future full of possibility-one that will eventually inspire the digital age nearly two hundred years later.Ada Lovelace Cracks the Code is the story of a pioneer in the computer sciences, and a testament to women's invaluable contributions to STEM throughout history.This historical fiction chapter book also includes additional text on Ada Lovelace's lasting legacy, as well as educational activities designed to teach simple coding and mathematical concepts.About the Rebel Girls Chapter Book SeriesMeet extraordinary real-life heroines in the Good Night Stories for Rebel Girls chapter book series! Introducing stories based on the lives and times of extraordinary women in global history, each stunningly designed chapter book features beautiful illustrations from a female artist as well as bonus activities in the backmatter to encourage kids to explore the various fields in which each of these women thrived. The perfect gift to inspire any young reader!Trade Review"Filled with examples of creativity sparked by small observations, this detailed look at the earliest days of modern computing is engaging, informative, and inspiring." ― Common Sense Media"Activities at the back of the book make [this] great to spark inspiration in girls and boys." ― Metro ParentTable of ContentsENGAGED COMMUNITY - Thanks to a supportive and active global community, Good Night Stories for Rebel Girls broke crowdfunding records. Volume 2 followed in 2017 and broke the record set by volume 1, making the series the highest funded publishing project in crowdfunding history. Since publication, the books have sold over 4 million copies and they have been translated into over 47 languages and are available worldwide. The Rebel Girls community counts on us to tell stories that help every girl in the world dream bigger, aim higher, and fight harder. STEM-ESTEEM - Most people who turn out to be scientists or engineers or mathematicians, first showed interest in those fields in elementary school. In fact, research shows that girls will not study or enter a career in STEM if they do not cultivate interests by age seven. It's incredibly rare to encounter female pioneers in the STEM space. Ada Lovelace is an excellent example of a role model whose ideas are approachable enough for a child to comprehend, and big enough to inspire. EDUCATIONAL ACTIVITIES - The book will include exercises and challenges for the young reader to learn the fundamental rules of coding. FULL-COLOR ILLUSTRATION - Unlike most chapter books for this age range, this title will incorporate at least ten full-color illustrations by Marina Muun. They will depict Ada at all ages, Victorian England, the mechanisms of the infamous difference machine, as well as Ada's incredible handwriting.

    2 in stock

    £9.49

  • Cyber Security: The complete guide to cyber

    BCS Learning & Development Limited Cyber Security: The complete guide to cyber

    1 in stock

    Book SynopsisCyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. • A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession • Offers practical guidance and actionable steps for individuals and businesses to protect themselves • Highly accessible and terminology is clearly explained and supported with current, real-world examplesTrade ReviewDavid Sutton's books provides well researched, comprehensive guide to the multifaceted, rapidly growing cyber domain. It serves as a valuable guide to both current professionals and those wishing to embark on a Cyber Security profession. An excellent read. -- Colonel John S Doody FBCS FCMI CITP ACISP MIOD, Director, Interlocutor Services LimitedA very comprehensive primer on cyber security covering issues, solutions and suggestions for further action. After reading this book anyone that worries about cyber security without necessarily wanting to become an expert will find themself much better informed and quite probably much more interested. -- Susan Perriam MBA MSc CMgr MBCS CISSP, Cyber Security ConsultantThis book manages to strike a perfect balance between technical breadth and depth. It includes enough detail to understand the broad range of concepts and techniques found in a complex industry, along with practical and real-life examples. This latest revision is packed with recent examples, scenarios, tools, and techniques that make it a fascinating read for both industry veterans and recent joiners alike. Highly recommended. -- Martin King FBCS CITP CISSP, Chief Technology Officer, IT TransformedThis book describes the eco system of cyber security and provides excellent go-to guides and considerations for people/teams dealing with both technical and non-technical security. Awareness and training are at the very heart of the book, successfully paralleled by descriptions of how our day-to-day information sharing and protection should take place safely. A useful and insightful read and highly recommended. -- Lesley-Anne Turner, Cyber Compliance, CDDO, Cabinet OfficeThe style and structure makes it an ideal book for students as it covers all the important topics, from the fundamentals of information security such as the CIA model, through to organisational issues (policies and disaster recovery), legal requirements and security standards. Terminology is clearly explained and supported with current, real-world examples. It is a most valuable resource. -- Richard Hind MSc MBCS FHEA, Tutor of Digital Technologies, York CollegeThis book gives a good insight into cyber security, with modern day examples and practical guidance on how to proactively mitigate against risks. This will definitely be a book I refer to frequently. -- Bianca Christian, Business Analyst, Young Business Analysts (YBA)On first reading this book, the biggest impression that greets the reader is that it’s NOT a technical reference book and is widely focused on the wider impact of cyber security on society as a whole. It is not just for technologists and treats a complex subject with just the right level of both technical and socioeconomic balance. Highly recommended. -- Adrian Winckles MBCS CITP CEng, Chair of BCS Cybercrime Forensics SG and OWASP Education CommitteeCyber Security 2e is a rich technical guide on cyber threats. Leaving no stone unturned, the first half touches on key examples and paints a clear picture of the current threat landscape that both individuals and organisations face, and the second half contains solutions. Sutton aptly spotlights a number of actions that anyone could be encouraged to practice for good personal and corporate security. -- Ester Masoapatali MBCS, Information Security Specialist, Partnerships Manager, CybSafeThis book is a fantastic resource for those breaking into the industry, or for non-security leaders who want to know more about the risks faced by their business. Written in an accessible manner, this second edition gives readers updated information and current examples showing the changing trends and tactics of attackers. -- Jim Wright, Managing Director, Principle DefenceThis book is for anyone who wants to understand and learn more about cybersecurity. It provides a foundation of cybersecurity knowledge as well as essential practical skills and techniques for entry and junior-level cybersecurity roles. It is also designed to help learners in building a promising and rewarding career pathway in the cybersecurity field. -- Dr Sherif El-Gendy FBCS, Information Security ExpertThis highly accessible second edition provides a thorough update to the world of cyber security in a non-technical manner; firstly clarifying cyber security issues and then focusing on cyber security solutions. If you are looking for a go-to reference that explains cyber security in plain language, this book is for you. -- Tim Clements FBCS CITP FIP CIPP/E CIPM CIPT, Purpose and MeansThis book demystifies what can, to many, be a rather bewildering topic, and it sets clear context and eloquently describes the landscape of threats and issues, and provides clear, actionable advice across key topics. A handy and well-written reference guide, and highly recommended reading! -- Paul Watts MBCS CITP FCIIS CISSP CISM, former CISO and Distinguished Analyst, Information Security ForumA thought-provoking and excellent read. Essential for cybersecurity practitioners working across numerous specialisations and at all levels of management. This blended use of theory and practical applications sets this book apart, complements industry-leading certifications and make it a must-read for anyone working within cyber. -- Gary Cocklin CITP CISSP, Senior Cyber Security Practitioner, UK Royal Air Force (RAF)This book is not just for cyber professionals, it’s for everyone. This book is easy to follow and clearly articulates what cyber is and why it matters. It provides insights into why cyber-attacks occur and offers practical and technical guidance for individuals and businesses to protect themselves. This will be my go-to resource for cyber security. -- Thando Jacobs, Business Analyst, Senior Leadership Team, Young Business Analysts (YBA)This book delivers a comprehensive overview of cyber security and is packed with numerous interesting, relevant examples to illustrate key points. Readers will gain insights on why they might be attacked and measures to protect against ever increasing cyber threats. Therefore I highly recommend this publication for individuals and organisations alike. -- Olu Odeniyi, Cyber Security, Information Security and Digital Transformation Advisor, Thought Leader and SpeakerEasy to follow, digestible and highly relevant for the world we live in today. Not just for cybersecurity professionals, business continuity practitioners will gain valuable insight as well as hints and tips on what cybersecurity aspects to consider when developing business continuity plans and response arrangements. -- Hilary Estall MBCI, IRCA BCMS Principal Auditor, Business Continuity Practitioner, Director Perpetual SolutionsTable of ContentsPreface 1. Introduction 2. The big issues 3. Cyber targets 4. Cyber vulnerabilities and impacts 5. Cyber threats 6. Risk management overview 7. Business continuity & disaster recovery 8. Basic cyber security steps 9. Organisational security steps 10. Awareness and training 11. Information sharing Bibliography Appendix A - Standards Appendix B - Good practice guidelines Appendix C - Cyber security law Appendix D - Cyber security training Appendix E - Links to other useful organisations

    1 in stock

    £28.49

  • Enigma: How Breaking the Code Helped Win World

    Amber Books Ltd Enigma: How Breaking the Code Helped Win World

    2 in stock

    Book SynopsisAt its peak in January 1945, 10,000 people worked at Bletchley Park, reading 4000 messages a day, decrypting German and Japanese communications and helping the Allies to victory. But while we know that Bletchley was the centre of Britain’s World War II code-breaking, how did its efforts actually change the course of the war? Enigma: How Breaking the Code Helped Win World War II tells the story of Bletchley’s role in defeating U-boats in the Atlantic, breaking the Japanese codes, helping the Allies to victory in North Africa, deciphering the German military intelligence code, learning of most German positions in western Europe before the Normandy Landings, defeating the Italian Navy in the Mediterranean, and helping sink the German battleship Scharnhorst off Norway. In tracing these events, the book also delves into the stories of major Bletchley characters, ‘boffins’ such as Alan Turing and Gordon Welchman, and ‘Debs’ such as Joan Clarke and Margaret Rock. An accessible work of military history that ranges across air, land and naval warfare, the book also touches on the story of early computer science. Illustrated with 120 black-&-white and colour photographs, artworks and maps, Enigma: How Breaking the Code Helped Win World War II is an authoritative and novel perspective on WWII history.Table of ContentsIntroduction: Captain Ridley’s Shooting Party Unlocking Enigma The Battle of Cape Matapan North Africa The Atlantic War The Lorenz Code Battle of the North Cape The Eastern Front Bibliography Index

    2 in stock

    £16.99

  • Alan Turing: The Enigma: The Book That Inspired

    Vintage Publishing Alan Turing: The Enigma: The Book That Inspired

    10 in stock

    Book SynopsisThe official book behind the Academy Award-winning film The Imitation Game, starring Benedict Cumberbatch and Keira Knightley Alan Turing was the mathematician whose cipher-cracking transformed the Second World War. Taken on by British Intelligence in 1938, as a shy young Cambridge don, he combined brilliant logic with a flair for engineering. In 1940 his machines were breaking the Enigma-enciphered messages of Nazi Germany’s air force. He then headed the penetration of the super-secure U-boat communications. But his vision went far beyond this achievement. Before the war he had invented the concept of the universal machine, and in 1945 he turned this into the first design for a digital computer.Turing's far-sighted plans for the digital era forged ahead into a vision for Artificial Intelligence. However, in 1952 his homosexuality rendered him a criminal and he was subjected to humiliating treatment. In 1954, aged 41, Alan Turing took his own life.Trade ReviewOne of the finest scientific biographies I’ve ever read: authoritative, superbly researched, deeply sympathetic and beautifully told * Sylvia Nasar, author of A Beautiful Mind *Andrew Hodges' book is of exemplary scholarship and sympathy. Intimate, perceptive and insightful, it’s also the most readable biography I’ve picked up in some time * Time Out *A first-rate presentation of the life of a first-rate scientific mind * New York Times Book Review *One of the finest scientific biographies ever written * New Yorker *A first-rate presentation of the life of a first-rate scientific mind…it is hard to imagine a more thoughtful and warm biography than this one -- Douglas Hofstadter * New York Times Book Review *

    10 in stock

    £10.44

  • Cybersecurity in Humanities and Social Sciences:

    ISTE Ltd and John Wiley & Sons Inc Cybersecurity in Humanities and Social Sciences:

    1 in stock

    Book SynopsisThe humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?Table of ContentsIntroduction ixDaniel VENTRE, Hugo LOISEAU and Hartmut ADEN Chapter 1 The “Science” of Cybersecurity in the Human and Social Sciences: Issues and Reflections 1Hugo LOISEAU 1.1 Introduction 1 1.2 A method? 4 1.3 Data? 11 1.4 One or more definition(s)? 16 1.5 Conclusion 20 1.6 References 21 Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity 25Daniel VENTRE 2.1 Introduction 25 2.2 Definition 27 2.2.1 What is a definition? 27 2.2.2 Usefulness of definitions 29 2.2.3 Rules for constructing definitions 29 2.2.4 Definitions of cybersecurity 32 2.3 Typology 43 2.3.1 What is a typology? 44 2.3.2 Usefulness of typologies 44 2.3.3 Rules for the construction of typologies 45 2.3.4 Cybersecurity typologies 46 2.4 Taxonomy 48 2.4.1 What is a taxonomy? 48 2.4.2 Usefulness of taxonomy 49 2.4.3 Rules for the construction of taxonomies 49 2.4.4 Taxonomies of cybersecurity 50 2.5 Ontologies 51 2.5.1 What is ontology? 52 2.5.2 Usefulness of ontologies 53 2.5.3 Rules for construction of ontologies 53 2.5.4 Cybersecurity ontologies 54 2.6 Conclusion 56 2.7 References 57 Chapter 3 Cybersecurity and Data Protection – Research Strategies and Limitations in a Legal and Public Policy Perspective 67Hartmut ADEN 3.1 Introduction 67 3.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? 68 3.2.1 Potential tensions between cybersecurity and data protection 69 3.2.2 Potential synergies between cybersecurity and data protection 72 3.3 Methodological approaches and challenges for the study of cybersecurity – legal and public policy perspectives 74 3.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity 74 3.3.2 Public policy approaches to the study of cybersecurity 77 3.3.3 Transdisciplinary synergies between legal and public policy perspectives 78 3.4 Conclusion and outlook 80 3.5 References 81 Chapter 4 Researching State-sponsored Cyber-espionage 85Joseph FITSANAKIS 4.1 Defining cybersecurity and cyber-espionage 85 4.2 Taxonomies of cyber-threats 87 4.3 The structure of this chapter 88 4.4 The significance of state-sponsored cyber-espionage 90 4.5 Research themes in state-sponsored cyber-espionage 94 4.6 Theorizing state-sponsored cyber-espionage in the social sciences 98 4.7 Research methodologies into state-sponsored cyber-espionage 104 4.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research 106 4.9 Detecting state actors in cyber-espionage research 110 4.10 Identifying specific state actors in cyber-espionage research 112 4.11 Conclusion: researching a transformational subject 116 4.12 References 118 Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk 123Michel DACOROGNA and Marie KRATZ 5.1 Introduction 123 5.2 The scientific approach to move from uncertainty to risk 124 5.3 Learning about the data: the exploratory phase 126 5.4 Data cleansing 128 5.5 Statistical exploration on the various variables of the dataset 130 5.6 Univariate modeling for the relevant variables 134 5.7 Multivariate and dynamic modeling 139 5.7.1 A fast-changing environment: time dependency 140 5.7.2 Causal relations 143 5.7.3 Models for prediction 147 5.8 Conclusion 149 5.9 Acknowledgments 151 5.10 References 151 Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research 153Brett VAN NIEKERK and Trishana RAMLUCKAN 6.1 Introduction 153 6.1.1 Previous research 154 6.2 Information warfare and cybersecurity 154 6.3 Researching information warfare and cybersecurity 156 6.4 Qualitative research methodologies for information warfare and cybersecurity 157 6.4.1 Clustering of documents 159 6.4.2 Clustering of words 159 6.4.3 Word frequencies and word clouds 159 6.4.4 Text search and word trees 159 6.4.5 Example use cases of qualitative document analysis 160 6.5 An analysis of national cybersecurity strategies 161 6.5.1 Selection process for the documents 161 6.5.2 Analysis 162 6.5.3 Discussion 167 6.6 An analysis of the alignment of South Africa’s Cybercrimes Bill to international legislation 169 6.6.1 Background to the documents 169 6.6.2 Analysis 170 6.6.3 Discussion 174 6.7 An analysis of the influence of classical military philosophy on seminal information warfare texts 176 6.8 Reflections on qualitative document analysis for information warfare and cybersecurity research 177 6.9 Conclusion 179 6.10 References 180 Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France 185Elena WALDISPUEHL 7.1 Introduction 185 7.2 Localization of an online field 187 7.2.1 Online ethnographic work and empathy 192 7.2.2 Cybersecurity issues of an online field 193 7.3 Online–offline continuum 194 7.4 Continuum between security and insecurity 199 7.5 Conclusion 204 7.6 References 205 List of Authors 211 Index 213

    1 in stock

    £125.06

  • Improving your C# Skills: Solve modern challenges

    Packt Publishing Limited Improving your C# Skills: Solve modern challenges

    2 in stock

    Book SynopsisConquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.Table of ContentsTable of Contents What's New in .NET Core 2 and C# 7? Understanding .NET Core Internals and Measuring Performance Multithreading and Asynchronous Programming in .NET Core Securing and Implementing Resilience in .NET Core Applications Why TDD is Important Setting Up the .NET Test Environment Setting Up a JavaScript Environment What to Know Before Getting Started Tabula Rasa Testing JavaScript Applications Exploring Integrations Changes in Requirements The Legacy Problem Unraveling a Mess Geometry Randomization Files and Directories Advanced C# and .NET Features Cryptography

    2 in stock

    £37.99

  • Channel Coding in Communication Networks: From

    ISTE Ltd and John Wiley & Sons Inc Channel Coding in Communication Networks: From

    10 in stock

    Book SynopsisThis book provides a comprehensive overview of the subject of channel coding. It starts with a description of information theory, focusing on the quantitative measurement of information and introducing two fundamental theorems on source and channel coding. The basics of channel coding in two chapters, block codes and convolutional codes, are then discussed, and for these the authors introduce weighted input and output decoding algorithms and recursive systematic convolutional codes, which are used in the rest of the book. Trellis coded modulations, which have their primary applications in high spectral efficiency transmissions, are then covered, before the discussion moves on to an advanced coding technique called turbocoding. These codes, invented in the 1990s by C. Berrou and A. Glavieux, show exceptional performance. The differences between convolutional turbocodes and block turbocodes are outlined, and for each family, the authors present the coding and decoding techniques, together with their performances. The book concludes with a chapter on the implementation of turbocodes in circuits. As such, anyone involved in the areas of channel coding and error correcting coding will find this book to be of invaluable assistance.Trade Review"The book offers a very good overview of channel coding topics, selected and proposed by a group of experienced researchers including inventors of turbocodes from ENST Bretagne . . . The presented material is well illustrated with examples, referring to both encoding and decoding schemes . . . The most valuable part of the book consists of chapters from 3 to 7 and is connected with convolutional codes, trellis coded modulations and especially turbocodes." (Einzelbeleg, 2010) "This book provides a comprehensive overview of the subject of channel coding . . . as such, anyone involved in the area of channel coding and error correcting coding will find this book to be of invaluable assistance." (Mathematical Reviews, 2010) Table of ContentsHomage to Alain Glavieux xv Chapter 1. Information Theory 1 Gérard BATTAIL 1.1. Introduction: the Shannon paradigm 1 1.2. Principal coding functions 5 1.2.1. Source coding 5 1.2.2. Channel coding 6 1.2.3. Cryptography 7 1.2.4. Standardization of the Shannon diagram blocks 8 1.2.5. Fundamental theorems 9 1.3. Quantitative measurement of information 9 1.3.1. Principle 9 1.3.2. Measurement of self-information 10 1.3.3. Entropy of a source 11 1.3.4. Mutual information measure 12 1.3.5. Channel capacity 14 1.3.6. Comments on the measurement of information 15 1.4. Source coding 15 1.4.1. Introduction 15 1.4.2. Decodability, Kraft-McMillan inequality 16 1.4.3. Demonstration of the fundamental theorem 17 1.4.4. Outline of optimal algorithms of source coding 18 1.5. Channel coding 19 1.5.1. Introduction and statement of the fundamental theorem 19 1.5.2. General comments 20 1.5.3. Need for redundancy 20 1.5.4. Example of the binary symmetric channel 21 1.5.5. A geometrical interpretation 25 1.5.6. Fundamental theorem: Gallager’s proof 26 1.6. Channels with continuous noise 32 1.6.1. Introduction 32 1.6.2. A reference model in physical reality: the channel with Gaussian additive noise 32 1.6.3. Communication via a channel with additive white Gaussian noise 35 1.6.4. Channel with fadings 37 1.7. Information theory and channel coding 38 1.8. Bibliography 40 Chapter 2. Block Codes 41 Alain POLI 2.1. Unstructured codes 41 2.1.1. The fundamental question of message redundancy 41 2.1.2. Unstructured codes 42 2.2. Linear codes 44 2.2.1. Introduction 44 2.2.2. Properties of linear codes 44 2.2.3. Dual code 46 2.2.4. Some linear codes 50 2.2.5. Decoding of linear codes 51 2.3. Finite fields 53 2.3.1. Basic concepts 53 2.3.2. Polynomial modulo calculations: quotient ring 53 2.3.3. Irreducible polynomial modulo calculations: finite field 54 2.3.4. Order and the opposite of an element of F2[X]/(p(X)) 54 2.3.5. Minimum polynomials 59 2.3.6. The field of nth roots of unity 60 2.3.7. Projective geometry in a finite field 61 2.4. Cyclic codes 62 2.4.1. Introduction 62 2.4.2. Base, coding, dual code and code annihilator 63 2.4.3. Certain cyclic codes 68 2.4.4. Existence and construction of cyclic codes 74 2.4.5. Applications of cyclic codes 82 2.5. Electronic circuits 82 2.5.1. Basic gates for error correcting codes 82 2.5.2. Shift registers 83 2.5.3. Circuits for the correct codes 83 2.5.4. Polynomial representation and representation to the power of a primitive representation for a field 87 2.6. Decoding of cyclic codes 88 2.6.1. Meggitt decoding (trapping of bursts) 88 2.6.2. Decoding by the DFT 89 2.6.3. FG-decoding 94 2.6.4. Berlekamp-Massey decoding 99 2.6.5. Majority decoding 105 2.6.6. Hard decoding, soft decoding and chase decoding 110 2.7. 2D codes 111 2.7.1. Introduction 111 2.7.2. Product codes 112 2.7.3. Minimum distance of 2D codes 112 2.7.4. Practical examples of the use of 2D codes 112 2.7.5. Coding 112 2.7.6. Decoding 113 2.8. Exercises on block codes 113 2.8.1. Unstructured codes 113 2.8.2. Linear codes 114 2.8.3. Finite bodies 117 2.8.4. Cyclic codes 119 2.8.5. Exercises on circuits 123 Chapter 3. Convolutional Codes 129 Alain GLAVIEUX and Sandrine VATON 3.1. Introduction 129 3.2. State transition diagram, trellis, tree 135 3.3. Transfer function and distance spectrum 137 3.4. Perforated convolutional codes 140 3.5. Catastrophic codes 142 3.6. The decoding of convolutional codes 142 3.6.1. Viterbi algorithm 143 3.6.2. MAP criterion or BCJR algorithm 156 3.6.3. SubMAP algorithm 169 3.7. Performance of convolutional codes 172 3.7.1. Channel with binary input and continuous output 173 3.7.2. Channel with binary input and output 180 3.8. Distance spectrum of convolutional codes 182 3.9. Recursive convolution codes 184 Chapter 4. Coded Modulations 197 Ezio BIGLIERI 4.1. Hamming distance and Euclidean distance 197 4.2. Trellis code 200 4.3. Decoding 201 4.4. Some examples of TCM 201 4.5. Choice of a TCM diagram 205 4.6. TCM representations 207 4.7. TCM transparent to rotations 209 4.7.1. Partitions transparent to rotations 211 4.7.2. Transparent trellis with rotations 212 4.7.3. Transparent encoder 213 4.7.4. General considerations 215 4.8. TCM error probability 215 4.8.1. Upper limit of the probability of an error event 215 4.8.2. Examples 226 4.8.3. Calculation of áfree 228 4.9. Power spectral density 232 4.10. Multi-level coding 234 4.10.1. Block coded modulation 235 4.10.2. Decoding of multilevel codes by stages 237 4.11. Probability of error for the BCM 238 4.11.1. Additive Gaussian channel 239 4.11.2. Calculation of the transfer function 240 4.12. Coded modulations for channels with fading 241 4.12.1. Modeling of channels with fading 241 4.12.2. Rayleigh fading channel: Euclidean distance and Hamming distance 247 4.13. Bit interleaved coded modulation (BICM) 251 4.14. Bibliography 253 Chapter 5. Turbocodes 255 Claude BERROU, Catherine DOUILLARD, Michel JÉZÉQUEL and Annie PICART 5.1. History of turbocodes 255 5.1.1. Concatenation 256 5.1.2. Negative feedback in the decoder 256 5.1.3. Recursive systematic codes 258 5.1.4. Extrinsic information 258 5.1.5. Parallel concatenation 259 5.1.6. Irregular interleaving 260 5.2. A simple and convincing illustration of the turbo effect 260 5.3. Turbocodes 265 5.3.1. Coding 265 5.3.2. The termination of constituent codes 272 5.3.3. Decoding 275 5.3.4. SISO decoding and extrinsic information 280 5.4. The permutation function 287 5.4.1. The regular permutation 288 5.4.2. Statistical approach 290 5.4.3. Real permutations 291 5.5. m-binary turbocodes 297 5.5.1. m-binary RSC encoders 298 5.5.2. m-binary turbocodes 300 5.5.3. Double-binary turbocodes with 8 states 302 5.5.4. Double-binary turbocodes with 16 states 303 5.6. Bibliography 304 Chapter 6. Block Turbocodes 307 Ramesh PYNDIAH and Patrick ADDE 6.1. Introduction 307 6.2. Concatenation of block codes 308 6.2.1. Parallel concatenation of block codes 309 6.2.2. Serial concatenation of block codes 313 6.2.3. Properties of product codes and theoretical performances 318 6.3. Soft decoding of block codes 323 6.3.1. Soft decoding of block codes 324 6.3.2. Soft decoding of block codes (Chase algorithm) 326 6.3.3. Decoding of block codes by the Viterbi algorithm 334 6.3.4. Decoding of block codes by the Hartmann and Rudolph algorithm 338 6.4. Iterative decoding of product codes 340 6.4.1. SISO decoding of a block code 341 6.4.2. Implementation of the weighting algorithm 345 6.4.3. Iterative decoding of product codes 347 6.4.4. Comparison of the performances of BTC 349 6.5. Conclusion 367 6.6. Bibliography 367 Chapter 7. Block Turbocodes in a Practical Setting 373 Patrick ADDE and Ramesh PYNDIAH 7.1. Introduction 373 7.2. Implementation of BTC: structure and complexity 373 7.2.1. Influence of integration constraints 373 7.2.2. General architecture and organization of the circuit 376 7.2.3. Memorizing of data and results 380 7.2.4. Elementary decoder 384 7.2.5. High flow structure 392 7.3. Flexibility of turbo block codes 397 7.4. Hybrid turbocodes 404 7.4.1. Construction of the code 404 7.4.2. Binary error rates (BER) function of the signal-to-noise ratio in a Gaussian channel 406 7.4.3. Variation of the size of the blocks 408 7.4.4. Variation of the total rate 409 7.5. Multidimensional turbocodes 409 7.6. Bibliography 412 List of Authors 415 Index 417

    10 in stock

    £201.35

  • Codes and Ciphers

    Wooden Books Codes and Ciphers

    10 in stock

    Book Synopsis

    10 in stock

    £8.18

  • The Genesis of Digital Gold: A Comprehensive Look

    1 in stock

    £10.44

  • An Introduction to Kolmogorov Complexity and Its

    Springer Nature Switzerland AG An Introduction to Kolmogorov Complexity and Its

    15 in stock

    Book SynopsisThis must-read textbook presents an essential introduction to Kolmogorov complexity (KC), a central theory and powerful tool in information science that deals with the quantity of information in individual objects. The text covers both the fundamental concepts and the most important practical applications, supported by a wealth of didactic features.This thoroughly revised and enhanced fourth edition includes new and updated material on, amongst other topics, the Miller-Yu theorem, the Gács-Kučera theorem, the Day-Gács theorem, increasing randomness, short lists computable from an input string containing the incomputable Kolmogorov complexity of the input, the Lovász local lemma, sorting, the algorithmic full Slepian-Wolf theorem for individual strings, multiset normalized information distance and normalized web distance, and conditional universal distribution.Topics and features: describes the mathematical theory of KC, including the theories of algorithmic complexity and algorithmic probability; presents a general theory of inductive reasoning and its applications, and reviews the utility of the incompressibility method; covers the practical application of KC in great detail, including the normalized information distance (the similarity metric) and information diameter of multisets in phylogeny, language trees, music, heterogeneous files, and clustering; discusses the many applications of resource-bounded KC, and examines different physical theories from a KC point of view; includes numerous examples that elaborate the theory, and a range of exercises of varying difficulty (with solutions); offers explanatory asides on technical issues, and extensive historical sections; suggests structures for several one-semester courses in the preface.As the definitive textbook on Kolmogorov complexity, this comprehensive and self-contained work is an invaluable resource for advanced undergraduate students, graduate students, and researchers in all fields of science.Table of ContentsPreliminaries Algorithmic Complexity Algorithmic Prefix Complexity Algorithmic Probability Inductive Reasoning The Incompressibility Method Resource-Bounded Complexity Physics, Information, and Computation

    15 in stock

    £71.99

  • Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I

    Springer Nature Switzerland AG Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I

    1 in stock

    Book SynopsisThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​Table of ContentsCryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Fundamental Primitives.- Public Key Encryptions.- Functional Encryption.-Obfuscation Based Cryptography.- Re- Encryption Schemes.- Post Quantum Cryptography.

    1 in stock

    £62.99

  • Reflections on Artificial Intelligence for Humanity

    Springer Nature Switzerland AG Reflections on Artificial Intelligence for Humanity

    15 in stock

    Book SynopsisWe already observe the positive effects of AI in almost every field, and foresee its potential to help address our sustainable development goals and the urgent challenges for the preservation of the environment. We also perceive that the risks related to the safety, security, confidentiality, and fairness of AI systems, the threats to free will of possibly manipulative systems, as well as the impact of AI on the economy, employment, human rights, equality, diversity, inclusion, and social cohesion need to be better assessed. The development and use of AI must be guided by principles of social cohesion, environmental sustainability, resource sharing, and inclusion. It has to integrate human rights, and social, cultural, and ethical values of democracy. It requires continued education and training as well as continual assessment of its effects through social deliberation. The “Reflections on AI for Humanity” proposed in this book develop the following issues and sketch approaches for addressing them: How can we ensure the security requirements of critical applications and the safety and confidentiality of data communication and processing? What techniques and regulations for the validation, certification, and audit of AI tools are needed to develop confidence in AI? How can we identify and overcome biases in algorithms? How do we design systems that respect essential human values, ensuring moral equality and inclusion? What kinds of governance mechanisms are needed for personal data, metadata, and aggregated data at various levels? What are the effects of AI and automation on the transformation and social division of labor? What are the impacts on economic structures? What proactive and accommodation measures will be required? How will people benefit from decision support systems and personal digital assistants without the risk of manipulation? How do we design transparent and intelligible procedures and ensure that their functions reflect our values and criteria? How can we anticipate failure and restore human control over an AI system when it operates outside its intended scope? How can we devote a substantial part of our research and development resources to the major challenges of our time such as climate, environment, health, and education? Table of ContentsReflections on AI for Humanity: Introduction.- Trustworthy AI.- Democratising the digital revolution: the role of data governance.- Artificial Intelligence and the Future of Work.- Reflections on Decision-Making and Artificial Intelligence.- AI and Human values: inequalities, biases, fairness, nudge and feedback loops.- Next big challenges in core AI technology.- AI for Humanity: The Global Challenges.- AI and Constitutionalism: the challenges ahead.- Analyzing the Contributions of ethical charters to building the Future of Artificial Intelligence governance.- What does “Ethical by Design” Mean?.- AI for Digital Humanities and Computational Social Sciences.- Augmented Human and Human-Machine Co-Evolution: efficiency and ethics.- Democratizing AI for Humanity: A Common Goal.- A Framework for Global Cooperation on Artificial Intelligence and its Governance.

    15 in stock

    £56.99

  • Culture and Computing. Design Thinking and Cultural Computing: 9th International Conference, C&C 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part II

    Springer Nature Switzerland AG Culture and Computing. Design Thinking and Cultural Computing: 9th International Conference, C&C 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part II

    15 in stock

    Book SynopsisThe two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-C&C volume set were organized in topical sections as follows: Part I: ICT for cultural heritage; technology and art; visitors’ experiences in digital culture; Part II: Design thinking in cultural contexts; digital humanities, new media and culture; perspectives on cultural computing.Table of ContentsDesign Thinking in Cultural Contexts.- Digital Literacy-based User Experience Design for Medication-allergy Patients Care.- Advancing Inclusive Service Design: Defining, Evaluating & Creating Universally Designed Services.- Civic Community Archiving with the Platform for Experimental Collaborative Ethnography: Double Binds and Design Challenges.- What Could Safety Research Contribute to Technology Design.- User Interface Design of Virtual Conferencing Tools – Towards a Method for Considering Cultural Impact – Exemplified by Zoom.- Infrastructuring for Collective Heritage Knowledge Production.- Core concepts Linking Exhibit Design and the Visitor Experience in Science Centers: an Early Framework.- Socio-Emotional Experience in Human Technology Interaction Design – a Fashion Framework Proposal.- Human Research in Technology Design.- Research on the Public Design Innovation Method based on the Sharing Concept of Cultural Computing.- Digital Humanities, New Media and Culture.- The Ontology of Mixed Reality Agents Memorializing the Dead and Dying.- The Human Mind and Engineering Models.- Social Media Data for the Conservation of Historic Urban Landscapes: Prospects and Challenges.- Questions in Cognitive Mimetics.- Memory Modalities - Opening-up Digital Heritage Infrastructures.- Youth and Algorithmic Memory: Co-Producing Personal Memory on Instagram.- Culture in the Post Pandemic Era.- How to Access and Transform the Unconscious for Cultural Development.- Ethical Stance and Evolving Technosexual Culture – A Case for Human-Computer Interaction.- AI Ethics - Critical Reflections on Embedding Ethical Frameworks in AI Technology.- Using Information Divergence to Differentiate Deep from Superficial Resemblances among Discourses.- On Complexity of GLAMs’ Digital Ecosystem: APIs as Change Makers for Opening Up Knowledge.- Perspectives on Cultural Computing.- Appropriation for Interdisciplinary Practice: The Case of Participatory Design in Brazilian Computer Science.- Towards a Generic Framework for Intercultural User Interface Design to Evoke Positive Cross-Cultural UX.- Transformation of Landscape into Artistic and Cultural Video Using AI for Future Car.- The Collection Method of Heterogeneous Smart Farm Data based on Model Transformation Technique for Human Computer Friendly Learning.- Quick Buttons on Map-based Human Machine Interface in Vehicles is Better or Not: A Cross-Cultural Comparative Study between Chinese and Germans.- Culturally Aware Intelligent Learning Environments for Resource-poor Countries.- A Stranger in the Classroom: Pre-Service Teachers’ Anxiety and Negative Attitudes toward Humanoid Social Robots.- Bie-Modernism and Cultural Computing.

    15 in stock

    £66.49

  • Blockchain, Artificial Intelligence, and the

    Springer Nature Switzerland AG Blockchain, Artificial Intelligence, and the

    1 in stock

    Book SynopsisThis book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries. Table of Contents1) A comprehensive Survey on Blockchain and Cryptocurrency Technologies: Approaches, Challenges and Opportunities2) Intelligent Traffic Management with Prioritized Scheduling System3) Data Mining based Metrics for the Systematic Evaluation of Software Project Management Methodologies4) Blockchain Technology Applications for Next Generation5) An Automated System to Ensure High-Availability Deployment of IoT Devices6) Blockchain based IoT Architecture for Software Defined Networking7) Blockchain Technology use cases in Health Care Management: State of Art Framework and Performance Evaluation8) Secure Vehicular Communication using Blockchain Technology9) BLOCK CHAINS TECHNOLOGY IN HEALTH CARE10) Blockchain utilization in Crowdsensing, Cyber Physical Systems, Cloud Computing, Edge Computing & Social Network11) Blockchain for the Industrial IoT Applications12) Blockchain-Based IOT Architecture

    1 in stock

    £37.49

  • Beginner's Guide to Kotlin Programming

    Springer Nature Switzerland AG Beginner's Guide to Kotlin Programming

    15 in stock

    Book SynopsisThis textbook assumes very little knowledge of programming so whether you have dabbled with a little JavaScript, played with a bit of Python, written Java or have virtually no programming experience at all you will find that it is for you.The first part of the book introduces Kotlin program structures as well as conditional flow of control features such as if and when expressions as well as iteration loops such as for, while and do-while. Subsequent chapters explain how functions are implemented in Kotlin and introduce concepts from functional programming such as higher order functions and curried functions.The second part focusses on object oriented programming techniques, these include classes, inheritance, abstraction and interfaces. The third part presents container data types such as Arrays, and collections including Lists, Sets and Maps and the fourth part considers concurrency and parallelism using Kotlin coroutines. The book concludes with an introduction to Android mobile application development using Kotlin.Clear steps are provided explaining how to set up your environment and get started writing your own Kotlin programs.An important aspect of the book is teaching by example and there are many examples presented throughout the chapters. These examples are supported by a public GitHub repository that provides complete working code as well as sample solutions to the chapter exercises. This helps illustrate how to write well structured, clear, idiomatic Kotlin to build real applications.Table of ContentsIntroduction.- Part 1: Kotlin Programming.- A First Kotlin Program.- Flow of Control.- Number Guessing Game.- Functions in Kotlin.- Higher Order Functions.- Curried Functions.- Part 2: Object Oriented Kotlin.- Kotlin Classes.- Objects and Companion Objects,- Further Kotlin Properties.- Scope and Conditional Functions.- Class Inheritance.- Abstract Classes.- Interfaces, Delegation and Enumerated Types.- Packages.- Nested and Inner Types.- Data Classes.- Sealed and Inline Classes and Typealias.- Operator Overloading.- Error and Exception Handling.- Extension Functions and Properties.- Part 3: Data Containers.- Arrays.- Collections.- Lists.- Sets.- Maps.- Pairs and Triples.- Generic Types.- Functional Programming and Containers.- Part 4: Concurrent Kotlin.- Coroutines.- Coroutine Channel Communications.- Part 5: Android Development.- Android Overview.- Applications and Activities.- Android Layouts and Events.- Android Tic Tac Toe.

    15 in stock

    £47.49

  • New Foundations for Information Theory: Logical Entropy and Shannon Entropy

    Springer Nature Switzerland AG New Foundations for Information Theory: Logical Entropy and Shannon Entropy

    1 in stock

    Book SynopsisThis monograph offers a new foundation for information theory that is based on the notion of information-as-distinctions, being directly measured by logical entropy, and on the re-quantification as Shannon entropy, which is the fundamental concept for the theory of coding and communications.Information is based on distinctions, differences, distinguishability, and diversity. Information sets are defined that express the distinctions made by a partition, e.g., the inverse-image of a random variable so they represent the pre-probability notion of information. Then logical entropy is a probability measure on the information sets, the probability that on two independent trials, a distinction or “dit” of the partition will be obtained. The formula for logical entropy is a new derivation of an old formula that goes back to the early twentieth century and has been re-derived many times in different contexts. As a probability measure, all the compound notions of joint, conditional, and mutual logical entropy are immediate. The Shannon entropy (which is not defined as a measure in the sense of measure theory) and its compound notions are then derived from a non-linear dit-to-bit transform that re-quantifies the distinctions of a random variable in terms of bits—so the Shannon entropy is the average number of binary distinctions or bits necessary to make all the distinctions of the random variable. And, using a linearization method, all the set concepts in this logical information theory naturally extend to vector spaces in general—and to Hilbert spaces in particular—for quantum logical information theory which provides the natural measure of the distinctions made in quantum measurement.Relatively short but dense in content, this work can be a reference to researchers and graduate students doing investigations in information theory, maximum entropy methods in physics, engineering, and statistics, and to all those with a special interest in a new approach to quantum information theory.Table of Contents- Logical entropy.- The relationship between logical entropy and Shannon entropy.- The compound notions for logical and Shannon entropies.- Further developments of logical entropy.- Logical Quantum Information Theory.- Conclusion.- Appendix: Introduction to the logic of partitions.

    1 in stock

    £49.49

  • Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings

    Springer Nature Switzerland AG Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings

    15 in stock

    Book SynopsisThis book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.Table of ContentsQuantum Cryptography.- Tight Bounds for Simon's Algorithm.- Constructions for Quantum Indistinguishability Obfuscation.- On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer.- Post-Quantum Cryptography.- Post-Quantum Key-Blinding for Authentication in Anonymity Networks.- Implementing and measuring KEMTLS.- A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates.- Attribute-Based Access Control for Inner Product Functional Encryption from LWE.- Asymmetric Cryptanalysis.- Classical Attacks on a Variant of the RSA Cryptosystem.- Improved attacks against key reuse in learning with errors key exchange.- Cryptanalysis and Side-Channel Analysis.- Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis.- Train or Adapt a Deeply Learned Profile.- Autocorrelations of vectorial Boolean functions.- Automatic Search for Bit-based Division Property.- TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption.- Distributed Cryptographic Protocols.- Weight-Based Nakamoto-Style Blockchains.- LOVE a Pairing.- Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo.- Stronger Notions and a More E cient Construction of Threshold Ring Signatures.- Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms.- Multiparty Computation.- Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling.- The Cost of IEEE Arithmetic in Secure Computation.- Honest Majority MPC with Abort with Minimal Online Communication.

    15 in stock

    £66.49

  • Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    Springer Nature Switzerland AG Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lübeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic.The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations. Table of ContentsSide-Channel Attacks.- Fault Attacks.- Public Key.- Secure Implementations.

    1 in stock

    £49.49

  • Ad Hoc Networks and Tools for IT: 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings

    Springer Nature Switzerland AG Ad Hoc Networks and Tools for IT: 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings

    15 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021. Both conferences were held virtually due to COVID 19 pandemic. The 15 full papers of ADHOCNETS 2021 were selected from 29 submissions and cover a variety of network paradigms including ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (Vanets), airborne networks, underwater networks, underground networks, personal area networks, and home networks, etc. It promises a wide range of applications in civilian, commercial, and military areas. The 18 full papers were selected from 47 submissions and deal the emerging technologies such as Industry 4.0, blockchain, deep learning, cloud/edge/fog computing, cyber physical systems, cybersecurity and computer communications.Table of ContentsNetwork Routing.- Analysis of Routing Attacks in FANET.- Context-Aware Routing and Forwarding Model for NDN-based VANET.- A Novel Adaptive Hello Mechanism based Geographic Routing Protocol for FANETs.- Network Security 4 Evaluation of Denial of Service Attacks in Software Defined-Cognitive Radio Networks.- The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack.- Investigating the effectiveness of Spectrum Sensing Data Falsification Attacks Defense Mechanisms in Cognitive Radio Ad hoc Networks.- Active attack that exploits biometric similarity difference and basic countermeasures.- Network Protocols.- LEACH-S enhancement to ensure WSN stability.- M-ODD: A Standard Protocol for Reporting MANET Related Models, Simulations, and Findings.- Frame Design for Adaptability in Long-range Underwater Communication.- Adaptive Data Rate Based Congestion Control in Vehicular Ad Hoc Networks (VANET).- Network Applications.- Analyzing Aggregate User Behavior on a Large Multi-platform Content Distribution Service.- An AI-based Transmission Power-control Certificate Omission in Vehicular Ad-Hoc Networks.- Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids.- A Blockchain-Based Data-Sharing Scheme for Inter[1]Vehicular Safety Applications.- A Trust-based and Secure Real-Time Traffic Information Sharing Scheme.- TuneIn: Framework Design and Implementation for Education Using Dynamic Difficulty Adjustment Based on Deep Reinforcement Learning and Mathematical Approach.- P-sharding: Streamline emergency medical transactions via priority sharding.- BiDKT: Deep Knowledge Tracing with BERT.- Vision - An innovative management system based on private DLT.- Value-aware Collaborative Data Pricing for Federated Learning in Vehicular Networks.- Dual Scheme Privacy-Preserving Approach for Location[1]Aware Application in Edge Computing.- Survey on Bridge Discovery in Tor.

    15 in stock

    £66.49

  • Quorum Systems: With Applications to Storage and Consensus

    Springer International Publishing AG Quorum Systems: With Applications to Storage and Consensus

    1 in stock

    Book SynopsisA quorum system is a collection of subsets of nodes, called quorums, with the property that each pair of quorums have a non-empty intersection. Quorum systems are the key mathematical abstraction for ensuring consistency in fault-tolerant and highly available distributed computing. Critical for many applications since the early days of distributed computing, quorum systems have evolved from simple majorities of a set of processes to complex hierarchical collections of sets, tailored for general adversarial structures. The initial non-empty intersection property has been refined many times to account for, e.g., stronger (Byzantine) adversarial model, latency considerations or better availability. This monograph is an overview of the evolution and refinement of quorum systems, with emphasis on their role in two fundamental applications: distributed read/write storage and consensus. Table of Contents: Introduction / Preliminaries / Classical Quorum Systems / Classical Quorum-Based Emulations / Byzantine Quorum Systems / Latency-efficient Quorum Systems / Probabilistic Quorum SystemsTable of ContentsIntroduction.- Preliminaries.- Classical Quorum Systems.- Classical Quorum-Based Emulations.- Byzantine Quorum Systems.- Latency-efficient Quorum Systems.- Probabilistic Quorum Systems.

    1 in stock

    £26.99

  • HCI for Cybersecurity, Privacy and Trust: 4th

    Springer International Publishing AG HCI for Cybersecurity, Privacy and Trust: 4th

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The HCI-CPT 2022 proceedings focuses on to user privacy and data protection, trustworthiness and User Experience in cybersecurity, multi-faceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments, as well as the impact of the Covid-19 pandemic on cybersecurityTable of ContentsUser Privacy and Data Protection.- Trustworthiness and User Experience in Cybersecurity.- Multi-faceted Authentication Methods and Tools.- HCI in Cyber Defense and Protection.- Studies on Usable Security in Intelligent Environments.- The Impact of the Covid-19 Pandemic on Cybersecurity.

    1 in stock

    £71.99

  • Next Generation Arithmetic: Third International

    Springer International Publishing AG Next Generation Arithmetic: Third International

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the Third International Conference on Next Generation Arithmetic, CoNGA 2022, which was held in Singapore, during March 1–3, 2022. The 8 full papers included in this book were carefully reviewed and selected from 12 submissions. They deal with emerging technologies for computer arithmetic focusing on the demands of both AI and high-performance computing. Table of ContentsOn the Implementation of Edge Detection Algorithms with SORN Arithmetic.- A Posit8 Decompression Operator for Deep Neural Network Inference.- Qtorch+: Next Generation Arithmetic for Pytorch Machine Learning.- ACTION: Automated Hardware-Software Codesign Framework for Low-precision Numerical Format SelecTION in TinyML.- MultiPosits: Universal Coding of Rn.- Comparing Different Decodings for Posit Arithmetic.- Universal⋆: Reliable, Reproducible, and Energy-Efficient Numerics.- Small reals representations for Deep Learning at the edge: a comparison.

    1 in stock

    £47.49

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account