Coding theory and cryptology Books

221 products


  • Understanding Cryptography

    Larsen and Keller Education Understanding Cryptography

    Out of stock

    Book Synopsis

    Out of stock

    £105.34

  • Introduction to Cryptography

    Willford Press Introduction to Cryptography

    Out of stock

    Book Synopsis

    Out of stock

    £100.49

  • Software Design X-Rays: Fix Technical Debt with

    Pragmatic Bookshelf Software Design X-Rays: Fix Technical Debt with

    2 in stock

    Book SynopsisAre you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves social design, as well as technical design, you can find surprising dependencies between people and code to resolve coordination bottlenecks among teams. Best of all, the techniques build on behavioral data that you already have: your version-control system. Join the fight for better code! Use statistics and data science to uncover both problematic code and the behavioral patterns of the developers who build your software. This combination gives you insights you can't get from the code alone. Use these insights to prioritize refactoring needs, measure their effect, find implicit dependencies between different modules, and automatically create knowledge maps of your system based on actual code contributions. In a radical, much-needed change from common practice, guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Discover a comprehensive set of practical analysis techniques based on version-control data, where each point is illustrated with a case study from a real-world codebase. Because the techniques are language neutral, you can apply them to your own code no matter what programming language you use. Guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Apply research findings from social psychology to software development, ensuring you get the tools you need to coach your organization towards better code. If you're an experienced programmer, software architect, or technical manager, you'll get a new perspective that will change how you work with code. What You Need: You don't have to install anything to follow along in the book. TThe case studies in the book use well-known open source projects hosted on GitHub. You'll use CodeScene, a free software analysis tool for open source projects, for the case studies. We also discuss alternative tooling options where they exist.

    2 in stock

    £35.14

  • Codebreaking: A Practical Guide

    No Starch Press,US Codebreaking: A Practical Guide

    10 in stock

    Book SynopsisIf you liked Dan Brown’s Da Vinci Code—or want to solve similarly baffling cyphers yourself—this is the book for you! A thrilling exploration of history’s most vexing codes and ciphers that uses hands-on exercises to teach you the most popular historical encryption schemes and techniques for breaking them.Solve history’s most hidden secrets alongside expert codebreakers Elonka Dunin and Klaus Schmeh, as they guide you through the world of encrypted texts. With a focus on cracking real-world document encryptions—including some crime-based coded mysteries that remain unsolved—you’ll be introduced to the free computer software that professional cryptographers use, helping you build your skills with state-of-the art tools. You’ll also be inspired by thrilling success stories, like how the first three parts of Kryptos were broken. Each chapter introduces you to a specific cryptanalysis technique, and presents factual examples of text encrypted using that scheme—from modern postcards to 19-century newspaper ads, war-time telegrams, notes smuggled into prisons, and even entire books written in code. Along the way, you’ll work on NSA-developed challenges, detect and break a Caesar cipher, crack an encrypted journal from the movie The Prestige, and much more.You’ll learn: How to crack simple substitution, polyalphabetic, and transposition ciphers How to use free online cryptanalysis software, like CrypTool 2, to aid your analysis How to identify clues and patterns to figure out what encryption scheme is being used How to encrypt your own emails and secret messages Codebreaking is the most up-to-date resource on cryptanalysis published since World War II—essential for modern forensic codebreakers, and designed to help amateurs unlock some of history’s greatest mysteries.Trade Review“Codebreaking: A Practical Guide is quite the best book on codebreaking I have read: clear, engaging, and fun. A must for would-be recruits to GCHQ and the NSA!”—Sir Dermot Turing, author of Prof, the biography of his uncle, Alan Turing“Riveting. Dunin and Schmeh show us that we each have our own inner code-breaker yearning to be set free. Codebreaking isn’t just for super-geniuses with supercomputers; it’s something we were all born to do.”—Mike Godwin, creator of Godwin’s law and former general counsel for the Wikimedia Foundation“This is THE book about codebreaking. Very concise, very inclusive, and easy to read. Good references for those who would make codes, too, like Kryptos.”—Ed Scheidt, CIA“A compendium of historical cryptography. Approachable, accessible, this book brings back the joy I felt when I first read about these things as a kid.”—Phil Zimmermann, creator of PGP encryption and inductee into the Internet Hall of Fame“One of the most helpful guides outside the NSA to cracking ciphers. But even if you don’t become a codebreaker, this book is full of fascinating crypto lore.”—Steven Levy, New York Times best-selling author of Crypto, Hackers, and Facebook: The Inside Story“Another kind of Applied Cryptography.”—Whitfield Diffie, Turing Laureate and creator of public-key cryptography“This is the book of my dreams. Super-clear, super-fun guide for solving secret messages of all kinds.”—Jason Fagone, author of the best-selling book The Woman Who Smashed Codes“Kool dnoces a htrow era snootrac eht fo ynam.”—Suomynona Ecila“A wonderful mix of ciphers, both famous and little-known, solved and unsolved. Beginners will be hooked on exploring the world of secrets in cipher, and those who have already been introduced to the field will find much that is new.”—Craig Bauer, editor in chief of Cryptologia and author of Unsolved!: The History and Mystery of the World’s Greatest Ciphers“Cryptography? Ciphers? I thought this would be an easy book to put down. I was very wrong.”—Steve Meretzky, co-author with Douglas Adams of The Hitchhiker’s Guide to the Galaxy computer game"Fun, fascinating, and user friendly . . . Expertly written, organized and presented, [Codebreaking] is unreservedly recommended as a supplemental Code Breaking curriculum textbook."—Midwest Book ReviewTable of ContentsPrefaceChapter 1: How can I break an encrypted message? And other introductory questionsChapter 2: The Caesar cipherChapter 3: Simple substitution ciphersChapter 4: Simple substitution ciphers without spaces between words: PatristocratsChapter 5: Simple substitution ciphers in non-English languagesChapter 6: Homophonic ciphersChapter 7: Codes and nomenclatorsChapter 8: Polyalphabetic ciphersChapter 9: Complete columnar transposition ciphersChapter 10: Incomplete columnar transposition ciphersChapter 11: Turning grille transposition ciphersChapter 12: Digraph substitutionChapter 13: Abbreviation ciphersChapter 14: Dictionary codes and book ciphersChapter 15: Additional encryption methodsChapter 16: Solving ciphers with hill climbingChapter 17: What next?Appendix A: KryptosAppendix B: Useful language statisticsAppendix C: GlossaryAppendix D: Morse CodeAppendix E: Figure SourcesReferences

    10 in stock

    £23.99

  • Computer & Internet Security: A Hands-on Approach

    1 in stock

    £56.99

  • Ada Lovelace Cracks the Code

    Rebel Girls Inc Ada Lovelace Cracks the Code

    2 in stock

    Book SynopsisFrom the world of Good Night Stories for Rebel Girls comes a story based on the exciting real-life adventures of Ada Lovelace, one of the world's first computer programmers.Growing up in nineteenth century London, England, Ada is curious about absolutely everything. She is obsessed with machines and with creatures that fly. She even designs her own flying laboratory!According to her mother, Ada is a bit too wild, so she encourages Ada to study math. At first Ada thinks: Bleh! Who can get excited about a subject without pictures? But she soon falls in love with it. One day she encounters a mysterious machine, and from that moment forward Ada imagines a future full of possibility-one that will eventually inspire the digital age nearly two hundred years later.Ada Lovelace Cracks the Code is the story of a pioneer in the computer sciences, and a testament to women's invaluable contributions to STEM throughout history.This historical fiction chapter book also includes additional text on Ada Lovelace's lasting legacy, as well as educational activities designed to teach simple coding and mathematical concepts.About the Rebel Girls Chapter Book SeriesMeet extraordinary real-life heroines in the Good Night Stories for Rebel Girls chapter book series! Introducing stories based on the lives and times of extraordinary women in global history, each stunningly designed chapter book features beautiful illustrations from a female artist as well as bonus activities in the backmatter to encourage kids to explore the various fields in which each of these women thrived. The perfect gift to inspire any young reader!Trade Review"Filled with examples of creativity sparked by small observations, this detailed look at the earliest days of modern computing is engaging, informative, and inspiring." ― Common Sense Media"Activities at the back of the book make [this] great to spark inspiration in girls and boys." ― Metro ParentTable of ContentsENGAGED COMMUNITY - Thanks to a supportive and active global community, Good Night Stories for Rebel Girls broke crowdfunding records. Volume 2 followed in 2017 and broke the record set by volume 1, making the series the highest funded publishing project in crowdfunding history. Since publication, the books have sold over 4 million copies and they have been translated into over 47 languages and are available worldwide. The Rebel Girls community counts on us to tell stories that help every girl in the world dream bigger, aim higher, and fight harder. STEM-ESTEEM - Most people who turn out to be scientists or engineers or mathematicians, first showed interest in those fields in elementary school. In fact, research shows that girls will not study or enter a career in STEM if they do not cultivate interests by age seven. It's incredibly rare to encounter female pioneers in the STEM space. Ada Lovelace is an excellent example of a role model whose ideas are approachable enough for a child to comprehend, and big enough to inspire. EDUCATIONAL ACTIVITIES - The book will include exercises and challenges for the young reader to learn the fundamental rules of coding. FULL-COLOR ILLUSTRATION - Unlike most chapter books for this age range, this title will incorporate at least ten full-color illustrations by Marina Muun. They will depict Ada at all ages, Victorian England, the mechanisms of the infamous difference machine, as well as Ada's incredible handwriting.

    2 in stock

    £9.49

  • Cyber Security: The complete guide to cyber

    BCS Learning & Development Limited Cyber Security: The complete guide to cyber

    1 in stock

    Book SynopsisCyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. • A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession • Offers practical guidance and actionable steps for individuals and businesses to protect themselves • Highly accessible and terminology is clearly explained and supported with current, real-world examplesTrade ReviewDavid Sutton's books provides well researched, comprehensive guide to the multifaceted, rapidly growing cyber domain. It serves as a valuable guide to both current professionals and those wishing to embark on a Cyber Security profession. An excellent read. -- Colonel John S Doody FBCS FCMI CITP ACISP MIOD, Director, Interlocutor Services LimitedA very comprehensive primer on cyber security covering issues, solutions and suggestions for further action. After reading this book anyone that worries about cyber security without necessarily wanting to become an expert will find themself much better informed and quite probably much more interested. -- Susan Perriam MBA MSc CMgr MBCS CISSP, Cyber Security ConsultantThis book manages to strike a perfect balance between technical breadth and depth. It includes enough detail to understand the broad range of concepts and techniques found in a complex industry, along with practical and real-life examples. This latest revision is packed with recent examples, scenarios, tools, and techniques that make it a fascinating read for both industry veterans and recent joiners alike. Highly recommended. -- Martin King FBCS CITP CISSP, Chief Technology Officer, IT TransformedThis book describes the eco system of cyber security and provides excellent go-to guides and considerations for people/teams dealing with both technical and non-technical security. Awareness and training are at the very heart of the book, successfully paralleled by descriptions of how our day-to-day information sharing and protection should take place safely. A useful and insightful read and highly recommended. -- Lesley-Anne Turner, Cyber Compliance, CDDO, Cabinet OfficeThe style and structure makes it an ideal book for students as it covers all the important topics, from the fundamentals of information security such as the CIA model, through to organisational issues (policies and disaster recovery), legal requirements and security standards. Terminology is clearly explained and supported with current, real-world examples. It is a most valuable resource. -- Richard Hind MSc MBCS FHEA, Tutor of Digital Technologies, York CollegeThis book gives a good insight into cyber security, with modern day examples and practical guidance on how to proactively mitigate against risks. This will definitely be a book I refer to frequently. -- Bianca Christian, Business Analyst, Young Business Analysts (YBA)On first reading this book, the biggest impression that greets the reader is that it’s NOT a technical reference book and is widely focused on the wider impact of cyber security on society as a whole. It is not just for technologists and treats a complex subject with just the right level of both technical and socioeconomic balance. Highly recommended. -- Adrian Winckles MBCS CITP CEng, Chair of BCS Cybercrime Forensics SG and OWASP Education CommitteeCyber Security 2e is a rich technical guide on cyber threats. Leaving no stone unturned, the first half touches on key examples and paints a clear picture of the current threat landscape that both individuals and organisations face, and the second half contains solutions. Sutton aptly spotlights a number of actions that anyone could be encouraged to practice for good personal and corporate security. -- Ester Masoapatali MBCS, Information Security Specialist, Partnerships Manager, CybSafeThis book is a fantastic resource for those breaking into the industry, or for non-security leaders who want to know more about the risks faced by their business. Written in an accessible manner, this second edition gives readers updated information and current examples showing the changing trends and tactics of attackers. -- Jim Wright, Managing Director, Principle DefenceThis book is for anyone who wants to understand and learn more about cybersecurity. It provides a foundation of cybersecurity knowledge as well as essential practical skills and techniques for entry and junior-level cybersecurity roles. It is also designed to help learners in building a promising and rewarding career pathway in the cybersecurity field. -- Dr Sherif El-Gendy FBCS, Information Security ExpertThis highly accessible second edition provides a thorough update to the world of cyber security in a non-technical manner; firstly clarifying cyber security issues and then focusing on cyber security solutions. If you are looking for a go-to reference that explains cyber security in plain language, this book is for you. -- Tim Clements FBCS CITP FIP CIPP/E CIPM CIPT, Purpose and MeansThis book demystifies what can, to many, be a rather bewildering topic, and it sets clear context and eloquently describes the landscape of threats and issues, and provides clear, actionable advice across key topics. A handy and well-written reference guide, and highly recommended reading! -- Paul Watts MBCS CITP FCIIS CISSP CISM, former CISO and Distinguished Analyst, Information Security ForumA thought-provoking and excellent read. Essential for cybersecurity practitioners working across numerous specialisations and at all levels of management. This blended use of theory and practical applications sets this book apart, complements industry-leading certifications and make it a must-read for anyone working within cyber. -- Gary Cocklin CITP CISSP, Senior Cyber Security Practitioner, UK Royal Air Force (RAF)This book is not just for cyber professionals, it’s for everyone. This book is easy to follow and clearly articulates what cyber is and why it matters. It provides insights into why cyber-attacks occur and offers practical and technical guidance for individuals and businesses to protect themselves. This will be my go-to resource for cyber security. -- Thando Jacobs, Business Analyst, Senior Leadership Team, Young Business Analysts (YBA)This book delivers a comprehensive overview of cyber security and is packed with numerous interesting, relevant examples to illustrate key points. Readers will gain insights on why they might be attacked and measures to protect against ever increasing cyber threats. Therefore I highly recommend this publication for individuals and organisations alike. -- Olu Odeniyi, Cyber Security, Information Security and Digital Transformation Advisor, Thought Leader and SpeakerEasy to follow, digestible and highly relevant for the world we live in today. Not just for cybersecurity professionals, business continuity practitioners will gain valuable insight as well as hints and tips on what cybersecurity aspects to consider when developing business continuity plans and response arrangements. -- Hilary Estall MBCI, IRCA BCMS Principal Auditor, Business Continuity Practitioner, Director Perpetual SolutionsTable of ContentsPreface 1. Introduction 2. The big issues 3. Cyber targets 4. Cyber vulnerabilities and impacts 5. Cyber threats 6. Risk management overview 7. Business continuity & disaster recovery 8. Basic cyber security steps 9. Organisational security steps 10. Awareness and training 11. Information sharing Bibliography Appendix A - Standards Appendix B - Good practice guidelines Appendix C - Cyber security law Appendix D - Cyber security training Appendix E - Links to other useful organisations

    1 in stock

    £28.49

  • Enigma: How Breaking the Code Helped Win World

    Amber Books Ltd Enigma: How Breaking the Code Helped Win World

    2 in stock

    Book SynopsisAt its peak in January 1945, 10,000 people worked at Bletchley Park, reading 4000 messages a day, decrypting German and Japanese communications and helping the Allies to victory. But while we know that Bletchley was the centre of Britain’s World War II code-breaking, how did its efforts actually change the course of the war? Enigma: How Breaking the Code Helped Win World War II tells the story of Bletchley’s role in defeating U-boats in the Atlantic, breaking the Japanese codes, helping the Allies to victory in North Africa, deciphering the German military intelligence code, learning of most German positions in western Europe before the Normandy Landings, defeating the Italian Navy in the Mediterranean, and helping sink the German battleship Scharnhorst off Norway. In tracing these events, the book also delves into the stories of major Bletchley characters, ‘boffins’ such as Alan Turing and Gordon Welchman, and ‘Debs’ such as Joan Clarke and Margaret Rock. An accessible work of military history that ranges across air, land and naval warfare, the book also touches on the story of early computer science. Illustrated with 120 black-&-white and colour photographs, artworks and maps, Enigma: How Breaking the Code Helped Win World War II is an authoritative and novel perspective on WWII history.Table of ContentsIntroduction: Captain Ridley’s Shooting Party Unlocking Enigma The Battle of Cape Matapan North Africa The Atlantic War The Lorenz Code Battle of the North Cape The Eastern Front Bibliography Index

    2 in stock

    £16.99

  • Alan Turing: The Enigma: The Book That Inspired

    Vintage Publishing Alan Turing: The Enigma: The Book That Inspired

    10 in stock

    Book SynopsisThe official book behind the Academy Award-winning film The Imitation Game, starring Benedict Cumberbatch and Keira Knightley Alan Turing was the mathematician whose cipher-cracking transformed the Second World War. Taken on by British Intelligence in 1938, as a shy young Cambridge don, he combined brilliant logic with a flair for engineering. In 1940 his machines were breaking the Enigma-enciphered messages of Nazi Germany’s air force. He then headed the penetration of the super-secure U-boat communications. But his vision went far beyond this achievement. Before the war he had invented the concept of the universal machine, and in 1945 he turned this into the first design for a digital computer.Turing's far-sighted plans for the digital era forged ahead into a vision for Artificial Intelligence. However, in 1952 his homosexuality rendered him a criminal and he was subjected to humiliating treatment. In 1954, aged 41, Alan Turing took his own life.Trade ReviewOne of the finest scientific biographies I’ve ever read: authoritative, superbly researched, deeply sympathetic and beautifully told * Sylvia Nasar, author of A Beautiful Mind *Andrew Hodges' book is of exemplary scholarship and sympathy. Intimate, perceptive and insightful, it’s also the most readable biography I’ve picked up in some time * Time Out *A first-rate presentation of the life of a first-rate scientific mind * New York Times Book Review *One of the finest scientific biographies ever written * New Yorker *A first-rate presentation of the life of a first-rate scientific mind…it is hard to imagine a more thoughtful and warm biography than this one -- Douglas Hofstadter * New York Times Book Review *

    10 in stock

    £10.44

  • Cybersecurity and Decision Makers: Data Security

    ISTE Ltd and John Wiley & Sons Inc Cybersecurity and Decision Makers: Data Security

    Out of stock

    Book SynopsisCyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.Table of ContentsForeword xi Preface xiii Introduction xvii Chapter 1. An Increasingly Vulnerable World 1 1.1. The context 1 1.1.1. Technological disruptions and globalization 1 1.1.2. Data at the heart of industrial productivity 3 1.1.3. Cyberspace, an area without boundaries 3 1.1.4. IT resources 4 1.2. Cybercrime 4 1.2.1. The concept of cybercrime 4 1.2.2. Five types of threats 6 1.2.3. Five types of attackers 9 1.3. The cybersecurity market 15 1.3.1. The size of the market and its evolution 15 1.3.2. The market by sector of activity 15 1.3.3. Types of purchases and investments 16 1.3.4. Geographical distribution 17 1.4. Cyber incidents 17 1.4.1. The facts 17 1.4.2. Testimonials versus silence 24 1.4.3. Trends 25 1.4.4. Examples 27 1.5. Examples of particularly exposed sectors of activity 30 1.5.1. Cinema 30 1.5.2. Banks 31 1.5.3. Health 34 1.5.4. Tourism and business hotels 35 1.5.5. Critical national infrastructure 36 1.6. Responsibilities of officers and directors 37 Chapter 2. Corporate Governance and Digital Responsibility 39 2.1. Corporate governance and stakeholders 39 2.2. The shareholders 40 2.2.1. Valuation of the company 41 2.2.2. Cyber rating agencies 42 2.2.3. Insider trading 43 2.2.4. Activist shareholders 44 2.2.5. The stock exchange authorities 45 2.2.6. The annual report 45 2.3. The board of directors47 2.3.1. The facts 47 2.3.2. The four missions of the board of directors. 47 2.3.3. Civil and criminal liability 49 2.3.4. The board of directors and cybersecurity 50 2.3.5. The board of directors and data protection 53 2.3.6. The statutory auditors 54 2.3.7. The numerical responsibility of the board of directors 55 2.4. Customers and suppliers 56 2.5. Operational management 58 2.5.1. The impacts of digital transformation 58 2.5.2. The digital strategy 59 2.5.3. The consequences of poor digital performance 62 2.5.4. Cybersecurity 63 2.5.5. Merger and acquisition transactions 65 2.5.6. Governance and data protection, cybersecurity 66 Chapter 3. Risk Mapping 69 3.1. Cyber-risks 69 3.2. The context 71 3.3. Vulnerabilities 72 3.3.1. Fraud against the president 73 3.3.2. Supplier fraud 73 3.3.3. Other economic impacts 74 3.4. Legal risks 76 3.4.1. Class actions 76 3.4.2. Sanctions by the CNIL and the ICO 77 3.5. The objectives of risk mapping 78 3.6. The different methods of risk analysis 79 3.7. Risk assessment (identify) 81 3.7.1. The main actors 81 3.7.2. The steps 82 3.8. Protecting 83 3.9. Detecting 83 3.10. Reacting 84 3.11. Restoring 85 3.12. Decentralized mapping 85 3.12.1. The internal threat 85 3.12.2. Industrial risks 87 3.12.3. Suppliers, subcontractors and service providers 88 3.12.4. Connected objects 89 3.13. Insurance 94 3.14. Non-compliance risks and ethics 96 Chapter 4. Regulations 99 4.1. The context 99 4.1.1. Complaints filed with the CNIL 100 4.1.2. Vectaury 101 4.1.3. Optical Center 102 4.1.4. Dailymotion 103 4.2. The different international regulations (data protection) 103 4.2.1. The United States 104 4.2.2. China 104 4.2.3. Asia 105 4.2.4. Europe 105 4.3. Cybersecurity regulations, the NIS Directive 105 4.4. Sectoral regulations 106 4.4.1. The banking industry 106 4.4.2. Health 108 4.5. The General Data Protection Regulation (GDPR) 109 4.5.1. The foundations 110 4.5.2. Definition of personal data 110 4.5.3. The so-called “sensitive” data 111 4.5.4. The principles of the GDPR 112 4.5.5. The five actions to be in compliance with the GDPR 113 4.5.6. The processing register 113 4.5.7. The five actions to be carried out 113 4.5.8. Cookies 116 4.6. Consequences for the company and the board of directors 117 Chapter 5. Best Practices of the Board of Directors 119 5.1. Digital skills 120 5.2. Situational awareness 121 5.2.1. The main issues 121 5.2.2. Insurance 125 5.3. Internal governance 126 5.3.1. The CISO 126 5.3.2. The CISO and the company 127 5.3.3. Clarifying responsibilities 131 5.3.4. Streamlining the supplier portfolio 133 5.3.5. Security policies and procedures 134 5.3.6. The human being 137 5.4. Data protection 138 5.4.1. Emails 139 5.4.2. The tools 141 5.4.3. Double authentication: better, but not 100% reliable 142 5.5. Choosing your service providers 142 5.6. The budget 143 5.7. Cyberculture 144 5.8. The dashboard for officers and directors 145 Chapter 6. Resilience and Crisis Management 147 6.1. How to ensure resilience? 147 6.2. Definition of a CERT 149 6.3. Definition of a SOC 149 6.4. The role of ENISA 150 6.5. The business continuity plan 150 6.6. Crisis management 151 6.6.1. The preparation 151 6.6.2. Exiting the state of sideration 152 6.6.3. Ensuring business continuity 153 6.6.4. Story of the TV5 Monde attack 154 6.6.5. Management of the first few hours 159 6.7. Crisis simulation 163 Conclusion. The Digital Committee 165 Appendices 167 Appendix 1. Cybersecurity Dashboard 169 Appendix 2. Ensuring Cybersecurity in Practice and on a Daily Basis 173 Appendix 3. Tools to Identify, Protect, Detect, Train, React and Restore 175 Glossary 179 References 183 Index 187

    Out of stock

    £125.06

  • Cybersecurity in Humanities and Social Sciences:

    ISTE Ltd and John Wiley & Sons Inc Cybersecurity in Humanities and Social Sciences:

    1 in stock

    Book SynopsisThe humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?Table of ContentsIntroduction ixDaniel VENTRE, Hugo LOISEAU and Hartmut ADEN Chapter 1 The “Science” of Cybersecurity in the Human and Social Sciences: Issues and Reflections 1Hugo LOISEAU 1.1 Introduction 1 1.2 A method? 4 1.3 Data? 11 1.4 One or more definition(s)? 16 1.5 Conclusion 20 1.6 References 21 Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity 25Daniel VENTRE 2.1 Introduction 25 2.2 Definition 27 2.2.1 What is a definition? 27 2.2.2 Usefulness of definitions 29 2.2.3 Rules for constructing definitions 29 2.2.4 Definitions of cybersecurity 32 2.3 Typology 43 2.3.1 What is a typology? 44 2.3.2 Usefulness of typologies 44 2.3.3 Rules for the construction of typologies 45 2.3.4 Cybersecurity typologies 46 2.4 Taxonomy 48 2.4.1 What is a taxonomy? 48 2.4.2 Usefulness of taxonomy 49 2.4.3 Rules for the construction of taxonomies 49 2.4.4 Taxonomies of cybersecurity 50 2.5 Ontologies 51 2.5.1 What is ontology? 52 2.5.2 Usefulness of ontologies 53 2.5.3 Rules for construction of ontologies 53 2.5.4 Cybersecurity ontologies 54 2.6 Conclusion 56 2.7 References 57 Chapter 3 Cybersecurity and Data Protection – Research Strategies and Limitations in a Legal and Public Policy Perspective 67Hartmut ADEN 3.1 Introduction 67 3.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? 68 3.2.1 Potential tensions between cybersecurity and data protection 69 3.2.2 Potential synergies between cybersecurity and data protection 72 3.3 Methodological approaches and challenges for the study of cybersecurity – legal and public policy perspectives 74 3.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity 74 3.3.2 Public policy approaches to the study of cybersecurity 77 3.3.3 Transdisciplinary synergies between legal and public policy perspectives 78 3.4 Conclusion and outlook 80 3.5 References 81 Chapter 4 Researching State-sponsored Cyber-espionage 85Joseph FITSANAKIS 4.1 Defining cybersecurity and cyber-espionage 85 4.2 Taxonomies of cyber-threats 87 4.3 The structure of this chapter 88 4.4 The significance of state-sponsored cyber-espionage 90 4.5 Research themes in state-sponsored cyber-espionage 94 4.6 Theorizing state-sponsored cyber-espionage in the social sciences 98 4.7 Research methodologies into state-sponsored cyber-espionage 104 4.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research 106 4.9 Detecting state actors in cyber-espionage research 110 4.10 Identifying specific state actors in cyber-espionage research 112 4.11 Conclusion: researching a transformational subject 116 4.12 References 118 Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk 123Michel DACOROGNA and Marie KRATZ 5.1 Introduction 123 5.2 The scientific approach to move from uncertainty to risk 124 5.3 Learning about the data: the exploratory phase 126 5.4 Data cleansing 128 5.5 Statistical exploration on the various variables of the dataset 130 5.6 Univariate modeling for the relevant variables 134 5.7 Multivariate and dynamic modeling 139 5.7.1 A fast-changing environment: time dependency 140 5.7.2 Causal relations 143 5.7.3 Models for prediction 147 5.8 Conclusion 149 5.9 Acknowledgments 151 5.10 References 151 Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research 153Brett VAN NIEKERK and Trishana RAMLUCKAN 6.1 Introduction 153 6.1.1 Previous research 154 6.2 Information warfare and cybersecurity 154 6.3 Researching information warfare and cybersecurity 156 6.4 Qualitative research methodologies for information warfare and cybersecurity 157 6.4.1 Clustering of documents 159 6.4.2 Clustering of words 159 6.4.3 Word frequencies and word clouds 159 6.4.4 Text search and word trees 159 6.4.5 Example use cases of qualitative document analysis 160 6.5 An analysis of national cybersecurity strategies 161 6.5.1 Selection process for the documents 161 6.5.2 Analysis 162 6.5.3 Discussion 167 6.6 An analysis of the alignment of South Africa’s Cybercrimes Bill to international legislation 169 6.6.1 Background to the documents 169 6.6.2 Analysis 170 6.6.3 Discussion 174 6.7 An analysis of the influence of classical military philosophy on seminal information warfare texts 176 6.8 Reflections on qualitative document analysis for information warfare and cybersecurity research 177 6.9 Conclusion 179 6.10 References 180 Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France 185Elena WALDISPUEHL 7.1 Introduction 185 7.2 Localization of an online field 187 7.2.1 Online ethnographic work and empathy 192 7.2.2 Cybersecurity issues of an online field 193 7.3 Online–offline continuum 194 7.4 Continuum between security and insecurity 199 7.5 Conclusion 204 7.6 References 205 List of Authors 211 Index 213

    1 in stock

    £125.06

  • The Economics of Blockchain and Cryptocurrency: A

    Edward Elgar Publishing Ltd The Economics of Blockchain and Cryptocurrency: A

    Out of stock

    Book SynopsisThis timely book is an innovative look at how blockchain technology will transform the structure of social and economic life. The security of blockchain supports the provision and maintenance of reliable databases and the creation of rule-based governance protocols. Leading contributors expertly review the impact of blockchain on existing structures of law, monetary systems, supply chains and business organizations. Using economic and institutional theory, the book presents a vision for understanding the future development of blockchain technology and outlines the likely path of transformation that blockchain will drive in industry, supply chains and firms. Furthermore, it answers key questions such as: will Bitcoin or another cryptocurrency become the money of the future? How has blockchain already begun transforming economic activity? How can we evaluate the likely trajectory of technological development and application? This informative book is an excellent resource for academics or professionals interested in a theoretically sound perspective on blockchain. Written in an accessible prose, it provides an introduction for non-experts looking to learn more about the wide-ranging implications of blockchain and cryptocurrency.Trade Review‘How are blockchain programs, on which cryptocurrencies and other applications are built, shaping the future of firms, markets, and finance? James Caton has assembled a first-rate group of contributors to provide cutting-edge insights into the new technologies and their sometimes surprising implications. Readers of this volume will be a step ahead in understanding what is happening in the evolution of payment systems and in the governance of market institutions.’ -- Lawrence H. White, George Mason University, US‘The Economics of Blockchain and Cryptocurrency reveals the profound impact of blockchain, and its growing suite of applications, in reconfiguring the costs of economic exchange. This engaging collection, written by leading experts in the field, represents an essential guide to understanding the operational and institutional implications of blockchain.’ -- Mikayla Novak, Australian National University, AustraliaTable of ContentsContents: Introduction to The Economics of Blockchain and Cryptocurrency x James Lee Caton 1 Institutional cryptoeconomics 1 Sinclair Davidson and Jason Potts 2 Can cryptocurrencies become a commonly accepted means of exchange? 13 Nicolás Cachanosky 3 Fiat money, cryptocurrencies and monetary theory 29 David Glasner 4 The value of bitcoin in the year 2141 (and beyond!) 51 Joshua R. Hendrickson and William J. Luther 5 The Silicon Savannah: exploring the promise of cryptocurrency in Africa 69 Scott Burns 6 How blockchain technology can impact agriculture 95 Prithviraj Lakkakula and William W. Wilson 7 Blockchain and the law – legality, law-like characteristics, and legal applications 117 Eric Alston 8 Signals and incentives in blockchain applications 145 Cameron Harwick 9 Trustless architecture and the V-form organization 165 Chris Berg, Sinclair Davidson and Jason Potts 10 On V-form firms: governance, cryptocurrency, and internalization on the blockchain 181 James Lee Caton Index

    Out of stock

    £89.30

  • Cryptopolitics: Exposure, Concealment, and

    Berghahn Books Cryptopolitics: Exposure, Concealment, and

    Out of stock

    Book Synopsis Hidden information, double meanings, double-crossing, and the constant processes of encoding and decoding messages have always been important techniques in negotiating social and political power dynamics. Yet these tools, “cryptopolitics,” are transformed when used within digital media. Focusing on African societies, Cryptopolitics brings together empirically grounded studies of digital media toconsider public culture, sociality, and power in all its forms, illustrating the analytical potential of cryptopolitics to elucidate intimate relationships, political protest, and economic strategies in the digital age.Trade Review “The strength of the book lies in its demonstration of how political and social practices are always anchored in local sociality, as well as understanding that the roles of social media in contemporary Africa are important to understand what is going on.” • Jo Helle-Valle, Oslo Metropolitan UniversityTable of Contents List of Figures Introduction: Cryptopolitics and Digital Media in Africa Katrien Pype, Victoria Bernal, and Daivi Rodima-Taylor Chapter 1. Four Ways of Not Saying Something in Digital Kinshasa: Or, On the Substance of Shadow Conversations Katrien Pype Chapter 2. The Power to Conceal in an Age of Social Media Simon Turner Chapter 3. KOT, Digital Practices and the Performance of Politics in Kenya George Ogola Chapter 4. The “Muslim Mali” Game: Revisiting the religious-security-post-colonial nexus in Malian popular culture Marie Deridder and Olivier Servais Chapter 5. Algorithmic Power in a Contested Digital Public: Crypto-politics and Identity in the Somali Conflict Peter Chonka Chapter 6. The Cryptopolitics of Digital Mutuality Daivi Rodima-Taylor Chapter 7. “This Dictatorship is a Joke: Eritrean Politics as Tragicomedy” Victoria Bernal Chapter 8. Digital Security in an African “Sanctuary City” Lisa Poggiali Conclusion: Studying Cryptopolitics Daivi Rodima-Taylor, Katrien Pype, and Victoria Bernal Index

    Out of stock

    £89.10

  • Improving your C# Skills: Solve modern challenges

    Packt Publishing Limited Improving your C# Skills: Solve modern challenges

    2 in stock

    Book SynopsisConquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.Table of ContentsTable of Contents What's New in .NET Core 2 and C# 7? Understanding .NET Core Internals and Measuring Performance Multithreading and Asynchronous Programming in .NET Core Securing and Implementing Resilience in .NET Core Applications Why TDD is Important Setting Up the .NET Test Environment Setting Up a JavaScript Environment What to Know Before Getting Started Tabula Rasa Testing JavaScript Applications Exploring Integrations Changes in Requirements The Legacy Problem Unraveling a Mess Geometry Randomization Files and Directories Advanced C# and .NET Features Cryptography

    2 in stock

    £37.99

  • Channel Coding in Communication Networks: From

    ISTE Ltd and John Wiley & Sons Inc Channel Coding in Communication Networks: From

    10 in stock

    Book SynopsisThis book provides a comprehensive overview of the subject of channel coding. It starts with a description of information theory, focusing on the quantitative measurement of information and introducing two fundamental theorems on source and channel coding. The basics of channel coding in two chapters, block codes and convolutional codes, are then discussed, and for these the authors introduce weighted input and output decoding algorithms and recursive systematic convolutional codes, which are used in the rest of the book. Trellis coded modulations, which have their primary applications in high spectral efficiency transmissions, are then covered, before the discussion moves on to an advanced coding technique called turbocoding. These codes, invented in the 1990s by C. Berrou and A. Glavieux, show exceptional performance. The differences between convolutional turbocodes and block turbocodes are outlined, and for each family, the authors present the coding and decoding techniques, together with their performances. The book concludes with a chapter on the implementation of turbocodes in circuits. As such, anyone involved in the areas of channel coding and error correcting coding will find this book to be of invaluable assistance.Trade Review"The book offers a very good overview of channel coding topics, selected and proposed by a group of experienced researchers including inventors of turbocodes from ENST Bretagne . . . The presented material is well illustrated with examples, referring to both encoding and decoding schemes . . . The most valuable part of the book consists of chapters from 3 to 7 and is connected with convolutional codes, trellis coded modulations and especially turbocodes." (Einzelbeleg, 2010) "This book provides a comprehensive overview of the subject of channel coding . . . as such, anyone involved in the area of channel coding and error correcting coding will find this book to be of invaluable assistance." (Mathematical Reviews, 2010) Table of ContentsHomage to Alain Glavieux xv Chapter 1. Information Theory 1 Gérard BATTAIL 1.1. Introduction: the Shannon paradigm 1 1.2. Principal coding functions 5 1.2.1. Source coding 5 1.2.2. Channel coding 6 1.2.3. Cryptography 7 1.2.4. Standardization of the Shannon diagram blocks 8 1.2.5. Fundamental theorems 9 1.3. Quantitative measurement of information 9 1.3.1. Principle 9 1.3.2. Measurement of self-information 10 1.3.3. Entropy of a source 11 1.3.4. Mutual information measure 12 1.3.5. Channel capacity 14 1.3.6. Comments on the measurement of information 15 1.4. Source coding 15 1.4.1. Introduction 15 1.4.2. Decodability, Kraft-McMillan inequality 16 1.4.3. Demonstration of the fundamental theorem 17 1.4.4. Outline of optimal algorithms of source coding 18 1.5. Channel coding 19 1.5.1. Introduction and statement of the fundamental theorem 19 1.5.2. General comments 20 1.5.3. Need for redundancy 20 1.5.4. Example of the binary symmetric channel 21 1.5.5. A geometrical interpretation 25 1.5.6. Fundamental theorem: Gallager’s proof 26 1.6. Channels with continuous noise 32 1.6.1. Introduction 32 1.6.2. A reference model in physical reality: the channel with Gaussian additive noise 32 1.6.3. Communication via a channel with additive white Gaussian noise 35 1.6.4. Channel with fadings 37 1.7. Information theory and channel coding 38 1.8. Bibliography 40 Chapter 2. Block Codes 41 Alain POLI 2.1. Unstructured codes 41 2.1.1. The fundamental question of message redundancy 41 2.1.2. Unstructured codes 42 2.2. Linear codes 44 2.2.1. Introduction 44 2.2.2. Properties of linear codes 44 2.2.3. Dual code 46 2.2.4. Some linear codes 50 2.2.5. Decoding of linear codes 51 2.3. Finite fields 53 2.3.1. Basic concepts 53 2.3.2. Polynomial modulo calculations: quotient ring 53 2.3.3. Irreducible polynomial modulo calculations: finite field 54 2.3.4. Order and the opposite of an element of F2[X]/(p(X)) 54 2.3.5. Minimum polynomials 59 2.3.6. The field of nth roots of unity 60 2.3.7. Projective geometry in a finite field 61 2.4. Cyclic codes 62 2.4.1. Introduction 62 2.4.2. Base, coding, dual code and code annihilator 63 2.4.3. Certain cyclic codes 68 2.4.4. Existence and construction of cyclic codes 74 2.4.5. Applications of cyclic codes 82 2.5. Electronic circuits 82 2.5.1. Basic gates for error correcting codes 82 2.5.2. Shift registers 83 2.5.3. Circuits for the correct codes 83 2.5.4. Polynomial representation and representation to the power of a primitive representation for a field 87 2.6. Decoding of cyclic codes 88 2.6.1. Meggitt decoding (trapping of bursts) 88 2.6.2. Decoding by the DFT 89 2.6.3. FG-decoding 94 2.6.4. Berlekamp-Massey decoding 99 2.6.5. Majority decoding 105 2.6.6. Hard decoding, soft decoding and chase decoding 110 2.7. 2D codes 111 2.7.1. Introduction 111 2.7.2. Product codes 112 2.7.3. Minimum distance of 2D codes 112 2.7.4. Practical examples of the use of 2D codes 112 2.7.5. Coding 112 2.7.6. Decoding 113 2.8. Exercises on block codes 113 2.8.1. Unstructured codes 113 2.8.2. Linear codes 114 2.8.3. Finite bodies 117 2.8.4. Cyclic codes 119 2.8.5. Exercises on circuits 123 Chapter 3. Convolutional Codes 129 Alain GLAVIEUX and Sandrine VATON 3.1. Introduction 129 3.2. State transition diagram, trellis, tree 135 3.3. Transfer function and distance spectrum 137 3.4. Perforated convolutional codes 140 3.5. Catastrophic codes 142 3.6. The decoding of convolutional codes 142 3.6.1. Viterbi algorithm 143 3.6.2. MAP criterion or BCJR algorithm 156 3.6.3. SubMAP algorithm 169 3.7. Performance of convolutional codes 172 3.7.1. Channel with binary input and continuous output 173 3.7.2. Channel with binary input and output 180 3.8. Distance spectrum of convolutional codes 182 3.9. Recursive convolution codes 184 Chapter 4. Coded Modulations 197 Ezio BIGLIERI 4.1. Hamming distance and Euclidean distance 197 4.2. Trellis code 200 4.3. Decoding 201 4.4. Some examples of TCM 201 4.5. Choice of a TCM diagram 205 4.6. TCM representations 207 4.7. TCM transparent to rotations 209 4.7.1. Partitions transparent to rotations 211 4.7.2. Transparent trellis with rotations 212 4.7.3. Transparent encoder 213 4.7.4. General considerations 215 4.8. TCM error probability 215 4.8.1. Upper limit of the probability of an error event 215 4.8.2. Examples 226 4.8.3. Calculation of áfree 228 4.9. Power spectral density 232 4.10. Multi-level coding 234 4.10.1. Block coded modulation 235 4.10.2. Decoding of multilevel codes by stages 237 4.11. Probability of error for the BCM 238 4.11.1. Additive Gaussian channel 239 4.11.2. Calculation of the transfer function 240 4.12. Coded modulations for channels with fading 241 4.12.1. Modeling of channels with fading 241 4.12.2. Rayleigh fading channel: Euclidean distance and Hamming distance 247 4.13. Bit interleaved coded modulation (BICM) 251 4.14. Bibliography 253 Chapter 5. Turbocodes 255 Claude BERROU, Catherine DOUILLARD, Michel JÉZÉQUEL and Annie PICART 5.1. History of turbocodes 255 5.1.1. Concatenation 256 5.1.2. Negative feedback in the decoder 256 5.1.3. Recursive systematic codes 258 5.1.4. Extrinsic information 258 5.1.5. Parallel concatenation 259 5.1.6. Irregular interleaving 260 5.2. A simple and convincing illustration of the turbo effect 260 5.3. Turbocodes 265 5.3.1. Coding 265 5.3.2. The termination of constituent codes 272 5.3.3. Decoding 275 5.3.4. SISO decoding and extrinsic information 280 5.4. The permutation function 287 5.4.1. The regular permutation 288 5.4.2. Statistical approach 290 5.4.3. Real permutations 291 5.5. m-binary turbocodes 297 5.5.1. m-binary RSC encoders 298 5.5.2. m-binary turbocodes 300 5.5.3. Double-binary turbocodes with 8 states 302 5.5.4. Double-binary turbocodes with 16 states 303 5.6. Bibliography 304 Chapter 6. Block Turbocodes 307 Ramesh PYNDIAH and Patrick ADDE 6.1. Introduction 307 6.2. Concatenation of block codes 308 6.2.1. Parallel concatenation of block codes 309 6.2.2. Serial concatenation of block codes 313 6.2.3. Properties of product codes and theoretical performances 318 6.3. Soft decoding of block codes 323 6.3.1. Soft decoding of block codes 324 6.3.2. Soft decoding of block codes (Chase algorithm) 326 6.3.3. Decoding of block codes by the Viterbi algorithm 334 6.3.4. Decoding of block codes by the Hartmann and Rudolph algorithm 338 6.4. Iterative decoding of product codes 340 6.4.1. SISO decoding of a block code 341 6.4.2. Implementation of the weighting algorithm 345 6.4.3. Iterative decoding of product codes 347 6.4.4. Comparison of the performances of BTC 349 6.5. Conclusion 367 6.6. Bibliography 367 Chapter 7. Block Turbocodes in a Practical Setting 373 Patrick ADDE and Ramesh PYNDIAH 7.1. Introduction 373 7.2. Implementation of BTC: structure and complexity 373 7.2.1. Influence of integration constraints 373 7.2.2. General architecture and organization of the circuit 376 7.2.3. Memorizing of data and results 380 7.2.4. Elementary decoder 384 7.2.5. High flow structure 392 7.3. Flexibility of turbo block codes 397 7.4. Hybrid turbocodes 404 7.4.1. Construction of the code 404 7.4.2. Binary error rates (BER) function of the signal-to-noise ratio in a Gaussian channel 406 7.4.3. Variation of the size of the blocks 408 7.4.4. Variation of the total rate 409 7.5. Multidimensional turbocodes 409 7.6. Bibliography 412 List of Authors 415 Index 417

    10 in stock

    £201.35

  • Codes and Ciphers

    Wooden Books Codes and Ciphers

    10 in stock

    Book Synopsis

    10 in stock

    £8.18

  • The Genesis of Digital Gold: A Comprehensive Look

    1 in stock

    £10.44

  • An Introduction to Kolmogorov Complexity and Its

    Springer Nature Switzerland AG An Introduction to Kolmogorov Complexity and Its

    15 in stock

    Book SynopsisThis must-read textbook presents an essential introduction to Kolmogorov complexity (KC), a central theory and powerful tool in information science that deals with the quantity of information in individual objects. The text covers both the fundamental concepts and the most important practical applications, supported by a wealth of didactic features.This thoroughly revised and enhanced fourth edition includes new and updated material on, amongst other topics, the Miller-Yu theorem, the Gács-Kučera theorem, the Day-Gács theorem, increasing randomness, short lists computable from an input string containing the incomputable Kolmogorov complexity of the input, the Lovász local lemma, sorting, the algorithmic full Slepian-Wolf theorem for individual strings, multiset normalized information distance and normalized web distance, and conditional universal distribution.Topics and features: describes the mathematical theory of KC, including the theories of algorithmic complexity and algorithmic probability; presents a general theory of inductive reasoning and its applications, and reviews the utility of the incompressibility method; covers the practical application of KC in great detail, including the normalized information distance (the similarity metric) and information diameter of multisets in phylogeny, language trees, music, heterogeneous files, and clustering; discusses the many applications of resource-bounded KC, and examines different physical theories from a KC point of view; includes numerous examples that elaborate the theory, and a range of exercises of varying difficulty (with solutions); offers explanatory asides on technical issues, and extensive historical sections; suggests structures for several one-semester courses in the preface.As the definitive textbook on Kolmogorov complexity, this comprehensive and self-contained work is an invaluable resource for advanced undergraduate students, graduate students, and researchers in all fields of science.Table of ContentsPreliminaries Algorithmic Complexity Algorithmic Prefix Complexity Algorithmic Probability Inductive Reasoning The Incompressibility Method Resource-Bounded Complexity Physics, Information, and Computation

    15 in stock

    £71.99

  • Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I

    Springer Nature Switzerland AG Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I

    1 in stock

    Book SynopsisThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​Table of ContentsCryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Fundamental Primitives.- Public Key Encryptions.- Functional Encryption.-Obfuscation Based Cryptography.- Re- Encryption Schemes.- Post Quantum Cryptography.

    1 in stock

    £62.99

  • Reflections on Artificial Intelligence for Humanity

    Springer Nature Switzerland AG Reflections on Artificial Intelligence for Humanity

    15 in stock

    Book SynopsisWe already observe the positive effects of AI in almost every field, and foresee its potential to help address our sustainable development goals and the urgent challenges for the preservation of the environment. We also perceive that the risks related to the safety, security, confidentiality, and fairness of AI systems, the threats to free will of possibly manipulative systems, as well as the impact of AI on the economy, employment, human rights, equality, diversity, inclusion, and social cohesion need to be better assessed. The development and use of AI must be guided by principles of social cohesion, environmental sustainability, resource sharing, and inclusion. It has to integrate human rights, and social, cultural, and ethical values of democracy. It requires continued education and training as well as continual assessment of its effects through social deliberation. The “Reflections on AI for Humanity” proposed in this book develop the following issues and sketch approaches for addressing them: How can we ensure the security requirements of critical applications and the safety and confidentiality of data communication and processing? What techniques and regulations for the validation, certification, and audit of AI tools are needed to develop confidence in AI? How can we identify and overcome biases in algorithms? How do we design systems that respect essential human values, ensuring moral equality and inclusion? What kinds of governance mechanisms are needed for personal data, metadata, and aggregated data at various levels? What are the effects of AI and automation on the transformation and social division of labor? What are the impacts on economic structures? What proactive and accommodation measures will be required? How will people benefit from decision support systems and personal digital assistants without the risk of manipulation? How do we design transparent and intelligible procedures and ensure that their functions reflect our values and criteria? How can we anticipate failure and restore human control over an AI system when it operates outside its intended scope? How can we devote a substantial part of our research and development resources to the major challenges of our time such as climate, environment, health, and education? Table of ContentsReflections on AI for Humanity: Introduction.- Trustworthy AI.- Democratising the digital revolution: the role of data governance.- Artificial Intelligence and the Future of Work.- Reflections on Decision-Making and Artificial Intelligence.- AI and Human values: inequalities, biases, fairness, nudge and feedback loops.- Next big challenges in core AI technology.- AI for Humanity: The Global Challenges.- AI and Constitutionalism: the challenges ahead.- Analyzing the Contributions of ethical charters to building the Future of Artificial Intelligence governance.- What does “Ethical by Design” Mean?.- AI for Digital Humanities and Computational Social Sciences.- Augmented Human and Human-Machine Co-Evolution: efficiency and ethics.- Democratizing AI for Humanity: A Common Goal.- A Framework for Global Cooperation on Artificial Intelligence and its Governance.

    15 in stock

    £56.99

  • Culture and Computing. Design Thinking and Cultural Computing: 9th International Conference, C&C 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part II

    Springer Nature Switzerland AG Culture and Computing. Design Thinking and Cultural Computing: 9th International Conference, C&C 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part II

    15 in stock

    Book SynopsisThe two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-C&C volume set were organized in topical sections as follows: Part I: ICT for cultural heritage; technology and art; visitors’ experiences in digital culture; Part II: Design thinking in cultural contexts; digital humanities, new media and culture; perspectives on cultural computing.Table of ContentsDesign Thinking in Cultural Contexts.- Digital Literacy-based User Experience Design for Medication-allergy Patients Care.- Advancing Inclusive Service Design: Defining, Evaluating & Creating Universally Designed Services.- Civic Community Archiving with the Platform for Experimental Collaborative Ethnography: Double Binds and Design Challenges.- What Could Safety Research Contribute to Technology Design.- User Interface Design of Virtual Conferencing Tools – Towards a Method for Considering Cultural Impact – Exemplified by Zoom.- Infrastructuring for Collective Heritage Knowledge Production.- Core concepts Linking Exhibit Design and the Visitor Experience in Science Centers: an Early Framework.- Socio-Emotional Experience in Human Technology Interaction Design – a Fashion Framework Proposal.- Human Research in Technology Design.- Research on the Public Design Innovation Method based on the Sharing Concept of Cultural Computing.- Digital Humanities, New Media and Culture.- The Ontology of Mixed Reality Agents Memorializing the Dead and Dying.- The Human Mind and Engineering Models.- Social Media Data for the Conservation of Historic Urban Landscapes: Prospects and Challenges.- Questions in Cognitive Mimetics.- Memory Modalities - Opening-up Digital Heritage Infrastructures.- Youth and Algorithmic Memory: Co-Producing Personal Memory on Instagram.- Culture in the Post Pandemic Era.- How to Access and Transform the Unconscious for Cultural Development.- Ethical Stance and Evolving Technosexual Culture – A Case for Human-Computer Interaction.- AI Ethics - Critical Reflections on Embedding Ethical Frameworks in AI Technology.- Using Information Divergence to Differentiate Deep from Superficial Resemblances among Discourses.- On Complexity of GLAMs’ Digital Ecosystem: APIs as Change Makers for Opening Up Knowledge.- Perspectives on Cultural Computing.- Appropriation for Interdisciplinary Practice: The Case of Participatory Design in Brazilian Computer Science.- Towards a Generic Framework for Intercultural User Interface Design to Evoke Positive Cross-Cultural UX.- Transformation of Landscape into Artistic and Cultural Video Using AI for Future Car.- The Collection Method of Heterogeneous Smart Farm Data based on Model Transformation Technique for Human Computer Friendly Learning.- Quick Buttons on Map-based Human Machine Interface in Vehicles is Better or Not: A Cross-Cultural Comparative Study between Chinese and Germans.- Culturally Aware Intelligent Learning Environments for Resource-poor Countries.- A Stranger in the Classroom: Pre-Service Teachers’ Anxiety and Negative Attitudes toward Humanoid Social Robots.- Bie-Modernism and Cultural Computing.

    15 in stock

    £66.49

  • Blockchain, Artificial Intelligence, and the

    Springer Nature Switzerland AG Blockchain, Artificial Intelligence, and the

    1 in stock

    Book SynopsisThis book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries. Table of Contents1) A comprehensive Survey on Blockchain and Cryptocurrency Technologies: Approaches, Challenges and Opportunities2) Intelligent Traffic Management with Prioritized Scheduling System3) Data Mining based Metrics for the Systematic Evaluation of Software Project Management Methodologies4) Blockchain Technology Applications for Next Generation5) An Automated System to Ensure High-Availability Deployment of IoT Devices6) Blockchain based IoT Architecture for Software Defined Networking7) Blockchain Technology use cases in Health Care Management: State of Art Framework and Performance Evaluation8) Secure Vehicular Communication using Blockchain Technology9) BLOCK CHAINS TECHNOLOGY IN HEALTH CARE10) Blockchain utilization in Crowdsensing, Cyber Physical Systems, Cloud Computing, Edge Computing & Social Network11) Blockchain for the Industrial IoT Applications12) Blockchain-Based IOT Architecture

    1 in stock

    £37.49

  • Beginner's Guide to Kotlin Programming

    Springer Nature Switzerland AG Beginner's Guide to Kotlin Programming

    15 in stock

    Book SynopsisThis textbook assumes very little knowledge of programming so whether you have dabbled with a little JavaScript, played with a bit of Python, written Java or have virtually no programming experience at all you will find that it is for you.The first part of the book introduces Kotlin program structures as well as conditional flow of control features such as if and when expressions as well as iteration loops such as for, while and do-while. Subsequent chapters explain how functions are implemented in Kotlin and introduce concepts from functional programming such as higher order functions and curried functions.The second part focusses on object oriented programming techniques, these include classes, inheritance, abstraction and interfaces. The third part presents container data types such as Arrays, and collections including Lists, Sets and Maps and the fourth part considers concurrency and parallelism using Kotlin coroutines. The book concludes with an introduction to Android mobile application development using Kotlin.Clear steps are provided explaining how to set up your environment and get started writing your own Kotlin programs.An important aspect of the book is teaching by example and there are many examples presented throughout the chapters. These examples are supported by a public GitHub repository that provides complete working code as well as sample solutions to the chapter exercises. This helps illustrate how to write well structured, clear, idiomatic Kotlin to build real applications.Table of ContentsIntroduction.- Part 1: Kotlin Programming.- A First Kotlin Program.- Flow of Control.- Number Guessing Game.- Functions in Kotlin.- Higher Order Functions.- Curried Functions.- Part 2: Object Oriented Kotlin.- Kotlin Classes.- Objects and Companion Objects,- Further Kotlin Properties.- Scope and Conditional Functions.- Class Inheritance.- Abstract Classes.- Interfaces, Delegation and Enumerated Types.- Packages.- Nested and Inner Types.- Data Classes.- Sealed and Inline Classes and Typealias.- Operator Overloading.- Error and Exception Handling.- Extension Functions and Properties.- Part 3: Data Containers.- Arrays.- Collections.- Lists.- Sets.- Maps.- Pairs and Triples.- Generic Types.- Functional Programming and Containers.- Part 4: Concurrent Kotlin.- Coroutines.- Coroutine Channel Communications.- Part 5: Android Development.- Android Overview.- Applications and Activities.- Android Layouts and Events.- Android Tic Tac Toe.

    15 in stock

    £47.49

  • New Foundations for Information Theory: Logical Entropy and Shannon Entropy

    Springer Nature Switzerland AG New Foundations for Information Theory: Logical Entropy and Shannon Entropy

    1 in stock

    Book SynopsisThis monograph offers a new foundation for information theory that is based on the notion of information-as-distinctions, being directly measured by logical entropy, and on the re-quantification as Shannon entropy, which is the fundamental concept for the theory of coding and communications.Information is based on distinctions, differences, distinguishability, and diversity. Information sets are defined that express the distinctions made by a partition, e.g., the inverse-image of a random variable so they represent the pre-probability notion of information. Then logical entropy is a probability measure on the information sets, the probability that on two independent trials, a distinction or “dit” of the partition will be obtained. The formula for logical entropy is a new derivation of an old formula that goes back to the early twentieth century and has been re-derived many times in different contexts. As a probability measure, all the compound notions of joint, conditional, and mutual logical entropy are immediate. The Shannon entropy (which is not defined as a measure in the sense of measure theory) and its compound notions are then derived from a non-linear dit-to-bit transform that re-quantifies the distinctions of a random variable in terms of bits—so the Shannon entropy is the average number of binary distinctions or bits necessary to make all the distinctions of the random variable. And, using a linearization method, all the set concepts in this logical information theory naturally extend to vector spaces in general—and to Hilbert spaces in particular—for quantum logical information theory which provides the natural measure of the distinctions made in quantum measurement.Relatively short but dense in content, this work can be a reference to researchers and graduate students doing investigations in information theory, maximum entropy methods in physics, engineering, and statistics, and to all those with a special interest in a new approach to quantum information theory.Table of Contents- Logical entropy.- The relationship between logical entropy and Shannon entropy.- The compound notions for logical and Shannon entropies.- Further developments of logical entropy.- Logical Quantum Information Theory.- Conclusion.- Appendix: Introduction to the logic of partitions.

    1 in stock

    £49.49

  • Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings

    Springer Nature Switzerland AG Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings

    15 in stock

    Book SynopsisThis book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.Table of ContentsQuantum Cryptography.- Tight Bounds for Simon's Algorithm.- Constructions for Quantum Indistinguishability Obfuscation.- On Forging SPHINCS+-Haraka Signatures on a Fault-tolerant Quantum Computer.- Post-Quantum Cryptography.- Post-Quantum Key-Blinding for Authentication in Anonymity Networks.- Implementing and measuring KEMTLS.- A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates.- Attribute-Based Access Control for Inner Product Functional Encryption from LWE.- Asymmetric Cryptanalysis.- Classical Attacks on a Variant of the RSA Cryptosystem.- Improved attacks against key reuse in learning with errors key exchange.- Cryptanalysis and Side-Channel Analysis.- Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis.- Train or Adapt a Deeply Learned Profile.- Autocorrelations of vectorial Boolean functions.- Automatic Search for Bit-based Division Property.- TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption.- Distributed Cryptographic Protocols.- Weight-Based Nakamoto-Style Blockchains.- LOVE a Pairing.- Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo.- Stronger Notions and a More E cient Construction of Threshold Ring Signatures.- Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms.- Multiparty Computation.- Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling.- The Cost of IEEE Arithmetic in Secure Computation.- Honest Majority MPC with Abort with Minimal Online Communication.

    15 in stock

    £66.49

  • Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    Springer Nature Switzerland AG Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lübeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic.The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations. Table of ContentsSide-Channel Attacks.- Fault Attacks.- Public Key.- Secure Implementations.

    1 in stock

    £49.49

  • Ad Hoc Networks and Tools for IT: 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings

    Springer Nature Switzerland AG Ad Hoc Networks and Tools for IT: 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings

    15 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021. Both conferences were held virtually due to COVID 19 pandemic. The 15 full papers of ADHOCNETS 2021 were selected from 29 submissions and cover a variety of network paradigms including ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (Vanets), airborne networks, underwater networks, underground networks, personal area networks, and home networks, etc. It promises a wide range of applications in civilian, commercial, and military areas. The 18 full papers were selected from 47 submissions and deal the emerging technologies such as Industry 4.0, blockchain, deep learning, cloud/edge/fog computing, cyber physical systems, cybersecurity and computer communications.Table of ContentsNetwork Routing.- Analysis of Routing Attacks in FANET.- Context-Aware Routing and Forwarding Model for NDN-based VANET.- A Novel Adaptive Hello Mechanism based Geographic Routing Protocol for FANETs.- Network Security 4 Evaluation of Denial of Service Attacks in Software Defined-Cognitive Radio Networks.- The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack.- Investigating the effectiveness of Spectrum Sensing Data Falsification Attacks Defense Mechanisms in Cognitive Radio Ad hoc Networks.- Active attack that exploits biometric similarity difference and basic countermeasures.- Network Protocols.- LEACH-S enhancement to ensure WSN stability.- M-ODD: A Standard Protocol for Reporting MANET Related Models, Simulations, and Findings.- Frame Design for Adaptability in Long-range Underwater Communication.- Adaptive Data Rate Based Congestion Control in Vehicular Ad Hoc Networks (VANET).- Network Applications.- Analyzing Aggregate User Behavior on a Large Multi-platform Content Distribution Service.- An AI-based Transmission Power-control Certificate Omission in Vehicular Ad-Hoc Networks.- Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids.- A Blockchain-Based Data-Sharing Scheme for Inter[1]Vehicular Safety Applications.- A Trust-based and Secure Real-Time Traffic Information Sharing Scheme.- TuneIn: Framework Design and Implementation for Education Using Dynamic Difficulty Adjustment Based on Deep Reinforcement Learning and Mathematical Approach.- P-sharding: Streamline emergency medical transactions via priority sharding.- BiDKT: Deep Knowledge Tracing with BERT.- Vision - An innovative management system based on private DLT.- Value-aware Collaborative Data Pricing for Federated Learning in Vehicular Networks.- Dual Scheme Privacy-Preserving Approach for Location[1]Aware Application in Edge Computing.- Survey on Bridge Discovery in Tor.

    15 in stock

    £66.49

  • The Mobile Agent Rendezvous Problem in the Ring

    Springer International Publishing AG The Mobile Agent Rendezvous Problem in the Ring

    Out of stock

    Book SynopsisMobile agent computing is being used in fields as diverse as artificial intelligence, computational economics and robotics. Agents' ability to adapt dynamically and execute asynchronously and autonomously brings potential advantages in terms of fault-tolerance, flexibility and simplicity. This monograph focuses on studying mobile agents as modelled in distributed systems research and in particular within the framework of research performed in the distributed algorithms community. It studies the fundamental question of how to achieve rendezvous, the gathering of two or more agents at the same node of a network. Like leader election, such an operation is a useful subroutine in more general computations that may require the agents to synchronize, share information, divide up chores, etc. The work provides an introduction to the algorithmic issues raised by the rendezvous problem in the distributed computing setting. For the most part our investigation concentrates on the simplest case of two agents attempting to rendezvous on a ring network. Other situations including multiple agents, faulty nodes and other topologies are also examined. An extensive bibliography provides many pointers to related work not covered in the text. The presentation has a distinctly algorithmic, rigorous, distributed computing flavor and most results should be easily accessible to advanced undergraduate and graduate students in computer science and mathematics departments. Table of Contents: Models for Mobile Agent Computing / Deterministic Rendezvous in a Ring / Multiple Agent Rendezvous in a Ring / Randomized Rendezvous in a Ring / Other Models / Other TopologiesTable of ContentsModels for Mobile Agent Computing.- Deterministic Rendezvous in a Ring.- Multiple Agent Rendezvous in a Ring.- Randomized Rendezvous in a Ring.- Other Models.- Other Topologies.

    Out of stock

    £25.19

  • Communication and Agreement Abstractions for Fault-Tolerant Asynchronous Distributed Systems

    Springer International Publishing AG Communication and Agreement Abstractions for Fault-Tolerant Asynchronous Distributed Systems

    Out of stock

    Book SynopsisUnderstanding distributed computing is not an easy task. This is due to the many facets of uncertainty one has to cope with and master in order to produce correct distributed software. Considering the uncertainty created by asynchrony and process crash failures in the context of message-passing systems, the book focuses on the main abstractions that one has to understand and master in order to be able to produce software with guaranteed properties. These fundamental abstractions are communication abstractions that allow the processes to communicate consistently (namely the register abstraction and the reliable broadcast abstraction), and the consensus agreement abstractions that allows them to cooperate despite failures. As they give a precise meaning to the words "communicate" and "agree" despite asynchrony and failures, these abstractions allow distributed programs to be designed with properties that can be stated and proved. Impossibility results are associated with these abstractions. Hence, in order to circumvent these impossibilities, the book relies on the failure detector approach, and, consequently, that approach to fault-tolerance is central to the book. Table of Contents: List of Figures / The Atomic Register Abstraction / Implementing an Atomic Register in a Crash-Prone Asynchronous System / The Uniform Reliable Broadcast Abstraction / Uniform Reliable Broadcast Abstraction Despite Unreliable Channels / The Consensus Abstraction / Consensus Algorithms for Asynchronous Systems Enriched with Various Failure Detectors / Constructing Failure DetectorsTable of ContentsList of Figures.- The Atomic Register Abstraction.- Implementing an Atomic Register in a Crash-Prone Asynchronous System.- The Uniform Reliable Broadcast Abstraction.- Uniform Reliable Broadcast Abstraction Despite Unreliable Channels.- The Consensus Abstraction.- Consensus Algorithms for Asynchronous Systems Enriched with Various Failure Detectors.- Constructing Failure Detectors.

    Out of stock

    £37.99

  • Fault-tolerant Agreement in Synchronous Message-passing Systems

    Springer International Publishing AG Fault-tolerant Agreement in Synchronous Message-passing Systems

    Out of stock

    Book SynopsisUnderstanding distributed computing is not an easy task. This is due to the many facets of uncertainty one has to cope with and master in order to produce correct distributed software. A previous book Communication and Agreement Abstraction for Fault-tolerant Asynchronous Distributed Systems (published by Morgan & Claypool, 2010) was devoted to the problems created by crash failures in asynchronous message-passing systems. The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement and non-blocking atomic commit. Being able to solve these basic problems efficiently with provable guarantees allows applications designers to give a precise meaning to the words ""cooperate"" and ""agree"" despite failures, and write distributed synchronous programs with properties that can be stated and proved. Hence, the aim of the book is to present a comprehensive view of agreement problems, algorithms that solve them and associated computability bounds in synchronous message-passing distributed systems. Table of Contents: List of Figures / Synchronous Model, Failure Models, and Agreement Problems / Consensus and Interactive Consistency in the Crash Failure Model / Expedite Decision in the Crash Failure Model / Simultaneous Consensus Despite Crash Failures / From Consensus to k-Set Agreement / Non-Blocking Atomic Commit in Presence of Crash Failures / k-Set Agreement Despite Omission Failures / Consensus Despite Byzantine Failures / Byzantine Consensus in Enriched ModelsTable of ContentsList of Figures.- Synchronous Model, Failure Models, and Agreement Problems.- Consensus and Interactive Consistency in the Crash Failure Model.- Expedite Decision in the Crash Failure Model.- Simultaneous Consensus Despite Crash Failures.- From Consensus to k-Set Agreement.- Non-Blocking Atomic Commit in Presence of Crash Failures.- k-Set Agreement Despite Omission Failures.- Consensus Despite Byzantine Failures.- Byzantine Consensus in Enriched Models.

    Out of stock

    £26.99

  • The Theory of Timed I/O Automata, Second Edition

    Springer International Publishing AG The Theory of Timed I/O Automata, Second Edition

    Out of stock

    Book SynopsisThis monograph presents the Timed Input/Output Automaton (TIOA) modeling framework, a basic mathematical framework to support description and analysis of timed (computing) systems. Timed systems are systems in which desirable correctness or performance properties of the system depend on the timing of events, not just on the order of their occurrence. Timed systems are employed in a wide range of domains including communications, embedded systems, real-time operating systems, and automated control. Many applications involving timed systems have strong safety, reliability, and predictability requirements, which make it important to have methods for systematic design of systems and rigorous analysis of timing-dependent behavior. The TIOA framework also supports description and analysis of timed distributed algorithms -- distributed algorithms whose correctness and performance depend on the relative speeds of processors, accuracy of local clocks, or communication delay bounds. Such algorithms arise, for example, in traditional and wireless communications, networks of mobile devices, and shared-memory multiprocessors. The need to prove rigorous theoretical results about timed distributed algorithms makes it important to have a suitable mathematical foundation. An important feature of the TIOA framework is its support for decomposing timed system descriptions. In particular, the framework includes a notion of external behavior for a timed I/O automaton, which captures its discrete interactions with its environment. The framework also defines what it means for one TIOA to implement another, based on an inclusion relationship between their external behavior sets, and defines notions of simulations, which provide sufficient conditions for demonstrating implementation relationships. The framework includes a composition operation for TIOAs, which respects external behavior, and a notion of receptiveness, which implies that a TIOA does not block the passage of time. The TIOA framework also defines the notion of a property and what it means for a property to be a safety or a liveness property. It includes results that capture common proof methods for showing that automata satisfy properties. Table of Contents: Introduction / Mathematical Preliminaries / Describing Timed System Behavior / Timed Automata / Operations on Timed Automata / Properties for Timed Automata / Timed I/O Automata / Operations on Timed I/O Automata / Conclusions and Future WorkTable of ContentsIntroduction.- Mathematical Preliminaries.- Describing Timed System Behavior.- Timed Automata.- Operations on Timed Automata.- Properties for Timed Automata.- Timed I/O Automata.- Operations on Timed I/O Automata.- Conclusions and Future Work.

    Out of stock

    £25.19

  • New Models for Population Protocols

    Springer International Publishing AG New Models for Population Protocols

    Out of stock

    Book SynopsisWireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was an intellectual invention aiming to describe such systems in a minimalistic and analysis-friendly way. Having as a starting-point the inherent limitations but also the fundamental establishments of the population protocol model, we try in this monograph to present some realistic and practical enhancements that give birth to some new and surprisingly powerful (for these kind of systems) computational models. Table of Contents: Population Protocols / The Computational Power of Population Protocols / Enhancing the model / Mediated Population Protocols and Symmetry / Passively Mobile Machines that Use Restricted Space / Conclusions and Open Research Directions / Acronyms / Authors' BiographiesTable of ContentsPopulation Protocols.- The Computational Power of Population Protocols.- Enhancing the model.- Mediated Population Protocols and Symmetry.- Passively Mobile Machines that Use Restricted Space.- Conclusions and Open Research Directions.- Acronyms.- Authors' Biographies.

    Out of stock

    £26.99

  • Cooperative Task-Oriented Computing: Algorithms and Complexity

    Springer International Publishing AG Cooperative Task-Oriented Computing: Algorithms and Complexity

    Out of stock

    Book SynopsisCooperative network supercomputing is becoming increasingly popular for harnessing the power of the global Internet computing platform. A typical Internet supercomputer consists of a master computer or server and a large number of computers called workers, performing computation on behalf of the master. Despite the simplicity and benefits of a single master approach, as the scale of such computing environments grows, it becomes unrealistic to assume the existence of the infallible master that is able to coordinate the activities of multitudes of workers. Large-scale distributed systems are inherently dynamic and are subject to perturbations, such as failures of computers and network links, thus it is also necessary to consider fully distributed peer-to-peer solutions. We present a study of cooperative computing with the focus on modeling distributed computing settings, algorithmic techniques enabling one to combine efficiency and fault-tolerance in distributed systems, and the exposition of trade-offs between efficiency and fault-tolerance for robust cooperative computing. The focus of the exposition is on the abstract problem, called Do-All, and formulated in terms of a system of cooperating processors that together need to perform a collection of tasks in the presence of adversity. Our presentation deals with models, algorithmic techniques, and analysis. Our goal is to present the most interesting approaches to algorithm design and analysis leading to many fundamental results in cooperative distributed computing. The algorithms selected for inclusion are among the most efficient that additionally serve as good pedagogical examples. Each chapter concludes with exercises and bibliographic notes that include a wealth of references to related work and relevant advanced results. Table of Contents: Introduction / Distributed Cooperation and Adversity / Paradigms and Techniques / Shared-Memory Algorithms / Message-Passing Algorithms / The Do-All Problem in Other Settings / Bibliography / Authors' BiographiesTable of ContentsIntroduction.- Distributed Cooperation and Adversity.- Paradigms and Techniques.- Shared-Memory Algorithms.- Message-Passing Algorithms.- The Do-All Problem in Other Settings.- Bibliography.- Authors' Biographies.

    Out of stock

    £26.99

  • Link Reversal Algorithms

    Springer International Publishing AG Link Reversal Algorithms

    Out of stock

    Book SynopsisLink reversal is a versatile algorithm design technique that has been used in numerous distributed algorithms for a variety of problems. The common thread in these algorithms is that the distributed system is viewed as a graph, with vertices representing the computing nodes and edges representing some other feature of the system (for instance, point-to-point communication channels or a conflict relationship). Each algorithm assigns a virtual direction to the edges of the graph, producing a directed version of the original graph. As the algorithm proceeds, the virtual directions of some of the links in the graph change in order to accomplish some algorithm-specific goal. The criterion for changing link directions is based on information that is local to a node (such as the node having no outgoing links) and thus this approach scales well, a feature that is desirable for distributed algorithms. This monograph presents, in a tutorial way, a representative sampling of the work on link-reversal-based distributed algorithms. The algorithms considered solve routing, leader election, mutual exclusion, distributed queueing, scheduling, and resource allocation. The algorithms can be roughly divided into two types, those that assume a more abstract graph model of the networks, and those that take into account more realistic details of the system. In particular, these more realistic details include the communication between nodes, which may be through asynchronous message passing, and possible changes in the graph, for instance, due to movement of the nodes. We have not attempted to provide a comprehensive survey of all the literature on these topics. Instead, we have focused in depth on a smaller number of fundamental papers, whose common thread is that link reversal provides a way for nodes in the system to observe their local neighborhoods, take only local actions, and yet cause global problems to be solved. We conjecture that future interesting uses of link reversal are yet to be discovered. Table of Contents: Introduction / Routing in a Graph: Correctness / Routing in a Graph: Complexity / Routing and Leader Election in a Distributed System / Mutual Exclusion in a Distributed System / Distributed Queueing / Scheduling in a Graph / Resource Allocation in a Distributed System / ConclusionTable of ContentsIntroduction.- Routing in a Graph: Correctness.- Routing in a Graph: Complexity.- Routing and Leader Election in a Distributed System.- Mutual Exclusion in a Distributed System.- Distributed Queueing.- Scheduling in a Graph.- Resource Allocation in a Distributed System.- Conclusion.

    Out of stock

    £25.19

  • Quorum Systems: With Applications to Storage and Consensus

    Springer International Publishing AG Quorum Systems: With Applications to Storage and Consensus

    1 in stock

    Book SynopsisA quorum system is a collection of subsets of nodes, called quorums, with the property that each pair of quorums have a non-empty intersection. Quorum systems are the key mathematical abstraction for ensuring consistency in fault-tolerant and highly available distributed computing. Critical for many applications since the early days of distributed computing, quorum systems have evolved from simple majorities of a set of processes to complex hierarchical collections of sets, tailored for general adversarial structures. The initial non-empty intersection property has been refined many times to account for, e.g., stronger (Byzantine) adversarial model, latency considerations or better availability. This monograph is an overview of the evolution and refinement of quorum systems, with emphasis on their role in two fundamental applications: distributed read/write storage and consensus. Table of Contents: Introduction / Preliminaries / Classical Quorum Systems / Classical Quorum-Based Emulations / Byzantine Quorum Systems / Latency-efficient Quorum Systems / Probabilistic Quorum SystemsTable of ContentsIntroduction.- Preliminaries.- Classical Quorum Systems.- Classical Quorum-Based Emulations.- Byzantine Quorum Systems.- Latency-efficient Quorum Systems.- Probabilistic Quorum Systems.

    1 in stock

    £26.99

  • Distributed Computing by Oblivious Mobile Robots

    Springer International Publishing AG Distributed Computing by Oblivious Mobile Robots

    Out of stock

    Book SynopsisThe study of what can be computed by a team of autonomous mobile robots, originally started in robotics and AI, has become increasingly popular in theoretical computer science (especially in distributed computing), where it is now an integral part of the investigations on computability by mobile entities. The robots are identical computational entities located and able to move in a spatial universe; they operate without explicit communication and are usually unable to remember the past; they are extremely simple, with limited resources, and individually quite weak. However, collectively the robots are capable of performing complex tasks, and form a system with desirable fault-tolerant and self-stabilizing properties. The research has been concerned with the computational aspects of such systems. In particular, the focus has been on the minimal capabilities that the robots should have in order to solve a problem. This book focuses on the recent algorithmic results in the field of distributed computing by oblivious mobile robots (unable to remember the past). After introducing the computational model with its nuances, we focus on basic coordination problems: pattern formation, gathering, scattering, leader election, as well as on dynamic tasks such as flocking. For each of these problems, we provide a snapshot of the state of the art, reviewing the existing algorithmic results. In doing so, we outline solution techniques, and we analyze the impact of the different assumptions on the robots' computability power. Table of Contents: Introduction / Computational Models / Gathering and Convergence / Pattern Formation / Scatterings and Coverings / Flocking / Other DirectionsTable of ContentsIntroduction.- Computational Models.- Gathering and Convergence.- Pattern Formation.- Scatterings and Coverings.- Flocking.- Other Directions.

    Out of stock

    £31.49

  • Distributed Graph Coloring: Fundamentals and Recent Developments

    Springer International Publishing AG Distributed Graph Coloring: Fundamentals and Recent Developments

    Out of stock

    Book SynopsisThe focus of this monograph is on symmetry breaking problems in the message-passing model of distributed computing. In this model a communication network is represented by a n-vertex graph G = (V,E), whose vertices host autonomous processors. The processors communicate over the edges of G in discrete rounds. The goal is to devise algorithms that use as few rounds as possible. A typical symmetry-breaking problem is the problem of graph coloring. Denote by ? the maximum degree of G. While coloring G with ? + 1 colors is trivial in the centralized setting, the problem becomes much more challenging in the distributed one. One can also compromise on the number of colors, if this allows for more efficient algorithms. Other typical symmetry-breaking problems are the problems of computing a maximal independent set (MIS) and a maximal matching (MM). The study of these problems dates back to the very early days of distributed computing. The founding fathers of distributed computing laid firm foundations for the area of distributed symmetry breaking already in the eighties. In particular, they showed that all these problems can be solved in randomized logarithmic time. Also, Linial showed that an O(?2)-coloring can be solved very efficiently deterministically. However, fundamental questions were left open for decades. In particular, it is not known if the MIS or the (? + 1)-coloring can be solved in deterministic polylogarithmic time. Moreover, until recently it was not known if in deterministic polylogarithmic time one can color a graph with significantly fewer than ?2 colors. Additionally, it was open (and still open to some extent) if one can have sublogarithmic randomized algorithms for the symmetry breaking problems. Recently, significant progress was achieved in the study of these questions. More efficient deterministic and randomized (? + 1)-coloring algorithms were achieved. Deterministic ?1 + o(1)-coloring algorithms with polylogarithmic running time were devised. Improved (and often sublogarithmic-time) randomized algorithms were devised. Drastically improved lower bounds were given. Wide families of graphs in which these problems are solvable much faster than on general graphs were identified. The objective of our monograph is to cover most of these developments, and as a result to provide a treatise on theoretical foundations of distributed symmetry breaking in the message-passing model. We hope that our monograph will stimulate further progress in this exciting area.Table of ContentsAcknowledgments.- Introduction.- Basics of Graph Theory.- Basic Distributed Graph Coloring Algorithns.- Lower Bounds.- Forest-Decomposition Algorithms and Applications.- Defective Coloring.- Arbdefective Coloring.- Edge-Coloring and Maximal Matching.- Network Decompositions.- Introduction to Distributed Randomized Algorithms.- Conclusion and Open Questions.- Bibliography.- Authors' Biographies.

    Out of stock

    £28.49

  • Introduction to Distributed Self-Stabilizing

    Springer International Publishing AG Introduction to Distributed Self-Stabilizing

    Out of stock

    Book SynopsisThis book aims at being a comprehensive and pedagogical introduction to the concept of self-stabilization, introduced by Edsger Wybe Dijkstra in 1973. Self-stabilization characterizes the ability of a distributed algorithm to converge within finite time to a configuration from which its behavior is correct (i.e., satisfies a given specification), regardless the arbitrary initial configuration of the system. This arbitrary initial configuration may be the result of the occurrence of a finite number of transient faults. Hence, self-stabilization is actually considered as a versatile non-masking fault tolerance approach, since it recovers from the effect of any finite number of such faults in an unified manner. Another major interest of such an automatic recovery method comes from the difficulty of resetting malfunctioning devices in a large-scale (and so, geographically spread) distributed system (the Internet, Pair-to-Pair networks, and Delay Tolerant Networks are examples of such distributed systems). Furthermore, self-stabilization is usually recognized as a lightweight property to achieve fault tolerance as compared to other classical fault tolerance approaches. Indeed, the overhead, both in terms of time and space, of state-of-the-art self-stabilizing algorithms is commonly small. This makes self-stabilization very attractive for distributed systems equipped of processes with low computational and memory capabilities, such as wireless sensor networks. After more than 40 years of existence, self-stabilization is now sufficiently established as an important field of research in theoretical distributed computing to justify its teaching in advanced research-oriented graduate courses. This book is an initiation course, which consists of the formal definition of self-stabilization and its related concepts, followed by a deep review and study of classical (simple) algorithms, commonly used proof schemes and design patterns, as well as premium results issued from the self-stabilizing community. As often happens in the self-stabilizing area, in this book we focus on the proof of correctness and the analytical complexity of the studied distributed self-stabilizing algorithms. Finally, we underline that most of the algorithms studied in this book are actually dedicated to the high-level atomic-state model, which is the most commonly used computational model in the self-stabilizing area. However, in the last chapter, we present general techniques to achieve self-stabilization in the low-level message passing model, as well as example algorithms.Table of ContentsPreface.- Acknowledgments.- Introduction.- Preliminaries.- Coloring under a Locally Central Unfair Daemon.- Synchronous Unison.- BFS Spanning Tree Under a Distributed Unfair Daemon.- Dijkstra's Token Ring.- Hierarchical Collateral Composition.- Self-Stabilization in Message Passing Systems.- Bibliography.- Authors' Biographies.- Index.

    Out of stock

    £42.49

  • HCI for Cybersecurity, Privacy and Trust: 4th

    Springer International Publishing AG HCI for Cybersecurity, Privacy and Trust: 4th

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The HCI-CPT 2022 proceedings focuses on to user privacy and data protection, trustworthiness and User Experience in cybersecurity, multi-faceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments, as well as the impact of the Covid-19 pandemic on cybersecurityTable of ContentsUser Privacy and Data Protection.- Trustworthiness and User Experience in Cybersecurity.- Multi-faceted Authentication Methods and Tools.- HCI in Cyber Defense and Protection.- Studies on Usable Security in Intelligent Environments.- The Impact of the Covid-19 Pandemic on Cybersecurity.

    1 in stock

    £71.99

  • Next Generation Arithmetic: Third International

    Springer International Publishing AG Next Generation Arithmetic: Third International

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the Third International Conference on Next Generation Arithmetic, CoNGA 2022, which was held in Singapore, during March 1–3, 2022. The 8 full papers included in this book were carefully reviewed and selected from 12 submissions. They deal with emerging technologies for computer arithmetic focusing on the demands of both AI and high-performance computing. Table of ContentsOn the Implementation of Edge Detection Algorithms with SORN Arithmetic.- A Posit8 Decompression Operator for Deep Neural Network Inference.- Qtorch+: Next Generation Arithmetic for Pytorch Machine Learning.- ACTION: Automated Hardware-Software Codesign Framework for Low-precision Numerical Format SelecTION in TinyML.- MultiPosits: Universal Coding of Rn.- Comparing Different Decodings for Posit Arithmetic.- Universal⋆: Reliable, Reproducible, and Energy-Efficient Numerics.- Small reals representations for Deep Learning at the edge: a comparison.

    1 in stock

    £47.49

  • Database Systems for Advanced Applications.

    Springer International Publishing AG Database Systems for Advanced Applications.

    5 in stock

    Book SynopsisThis volume constitutes the papers of several workshops which were held in conjunction with the 27th International Conference on Database Systems for Advanced Applications, DASFAA 2022, held as virtual event in April 2022. The 30 revised full papers presented in this book were carefully reviewed and selected from 65 submissions. DASFAA 2022 presents the following five workshops: · First workshop on Pattern mining and Machine learning in Big complex Databases (PMBD 2021) · 6th International Workshop on Graph Data Management and Analysis (GDMA 2022) · First International Workshop on Blockchain Technologies (IWBT2022) · 8th International Workshop on Big Data Management and Service (BDMS 2022) · First workshop on Managing Air Quality Through Data Science · 7th International Workshop on Big Data Quality Management (BDQM 2022). Table of ContentsAn Algorithm for Mining Fixed-Length High Utility Itemsets.- A Novel Method to Create Synthetic Samples with Autoencoder Multi-layer Extreme Learning Machine.- Pattern Mining: Current Challenges and Opportunities.- Why not to Trust Big Data: Identifying Existence of Simpson’s Paradox Localized Metric Learning for Large Multi-Class Extremely Imbalanced Face Database.- Top-k dominating queries on incremental datasets.- Collaborative Blockchain based Distributed Denial of Service Attack Mitigation approach with IP Reputation System.- Model-Driven Development of Distributed Ledger Applications Towards a Blockchain Solution for Customs Duty-Related Fraud.- Securing Cookies/Sessions through Non-Fungible Tokens.- Chinese Spelling Error Detection and Correction Based on Knowledge Graph Construction and Application of Event Logic Graph: A Survey.- Enhancing Low-resource Languages Question Answering with Syntactic Graph.- Profile Consistency Discrimination.- H-V:An Improved Coding Layout based on Erasure Coded Storage System.- Astral: An Autoencoder-based Model for Pedestrian Trajectory Prediction of Variable-Length.- A Survey on Spatiotemporal Data Processing Techniques in Smart Urban Rail.- Fast Vehicle Track Counting in Traffic Video.- Summary A Traffic Summarization System using Semantic Words.- Attention_Cooperated_Reinforcement_Learning_for_Multi_agent_Path_Planning.- Big Data-driven Stable Task Allocation in Ride-hailing Services.- Weighted_Mean_Field_Multi_Agent_Reinforcement_Learning_via_Reward_Attribution_Decomposition.- Evaluating Presto and SparkSQL with TPC-DS.- Optimizing the Age of Sensed Information in Cyber-Physical Systems.- Aggregate Query Result Correctness using pattern Tables.- Time Series Data Quality Enhancing based on pattern Alignment.- Research on Feature extraction method of data quality intelligent detection.- Big Data Resources to Support Research Opportunities on Air Pollution Analysis in India.- Air Quality Data Collection in Hyderabad Using Low-cost Sensors: Initial Experiences.- Visualizing Spatio-Temporal Variation of Ambient Air Pollution in Four Small Towns in India.

    5 in stock

    £66.49

  • Innovations in Digital Economy: Third International Scientific Conference, SPBPU IDE 2021, Saint Petersburg, Russia, October 14–15, 2021, Revised Selected Papers

    Springer International Publishing AG Innovations in Digital Economy: Third International Scientific Conference, SPBPU IDE 2021, Saint Petersburg, Russia, October 14–15, 2021, Revised Selected Papers

    Out of stock

    Book SynopsisThis book constitutes the revised selected papers of the Third International Conference on Innovations in Digital Economy, SPBU IDE 2021, held in St. Petersburg, Russia, in October 2021.The 23 papers presented were thoroughly reviewed and selected for publication from 153 submissions. The papers are organized according the following topical sections: economic efficiency and social consequences of digital innovations implementation; regional innovation systems and clusters as drivers of the economic growth during the Fourth Industrial Revolution; industrial, service and agricultural digitalization; response of an educational system and labor market to the digital-driven changes in the economic system; digital transformation trends in the government and financial sector.Table of Contents​Economic efficiency and social consequences of digital innovations implementation.- Web innovation cycles and timing projections – applying economic waves theory to Internet development stages.- Digitalization of transport communications as a tool for improving the quality of life.- Factors Influencing Shoppers’ Behavioral Intention to Purchase Smart Phones: Digital Transformation Through YouTube User Generated Content.- Regional innovation systems and clusters as drivers of the economic growth during the Fourth Industrial Revolution.- Revisiting the question of digitalization and bioenergy development in the Russian Federation regions.- Digital Ecosystem: nature, types and opportunities for value creation.- Identification and Visualization of Regional Industrial Clusters: Case of Metallurgical Cluster In Russia.- Industrial, service and agricultural digitalization.- Evaluation of e-commerce impact on sustainable economic growth: the case of Vietnam.- Machine Learning Predictive Model for Performance Criteria of Energy-Efficient Healthy Building.- Innovative Project Model Development for the Use of Digital Wearable Devices to Improve the Quality of Life.- Digitalization of business processes in the automotive industry.- Transformation of software project management in Industry 4.0.- Development of a Method for Assessing the Industrial Enterprise Digitalization Level.- The use of neural networks for optimization of the quality of business activity in the digital environment.- Approach to evaluating a digital company activities based on intellectual platform of data analysis.- Reference model of digital business-architecture of geographically distributed medical organizations.- Information trends and digital management tools of the "New Industrialization".- Response of an educational system and labor market to the digital-driven changes in the economic system.- Features of the Russian national qualifications system under the influence of digitalization.- Employee Development and Digitalization in BANI world.- Study of Labour Digital Potential Usage by Organizations of Ural Federal District.- Enhancing Teachers’ Digital Competence for Professional Development in Distance Mode.- Digital transformation trends in the government and financial sector.- Artificial intelligence system for financial risk prediction in the banking sector.- Assessing the relationship between public spending on higher education and a country's readiness for digitalization.- The Introduction of Digital Technologies to Participatory Design in the Public Spaces Formation.

    Out of stock

    £62.99

  • Artificial Intelligence and Cybersecurity: Theory and Applications

    Springer International Publishing AG Artificial Intelligence and Cybersecurity: Theory and Applications

    1 in stock

    Book SynopsisThis book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence.The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity.During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies.Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference. Table of ContentsPart I Cybersecurity ConcernsUse of Artificial Intelligence in a Cybersecurity EnvironmentPetri Vähäkainu and Martti LehtoA Review of Cyber Threat (Artificial) Intelligence in SecurityManagementMartin Lundgren and Ali PadyabModel Based Resilience Engineering for Design and Assessment ofMission Critical Systems Containing AI ComponentsAutomation of CybersecurityWorkArtificial Intelligence for Cybersecurity Education and TrainingOffensive Machine Learning Methods and the Cyber Kill ChainDefensive Machine Learning Methods and the Cyber Defence Chain . Part II Privacy and EthicsDifferential Privacy: An Umbrella ReviewAI in Cyber Operations: Ethical and Legal Considerations for End-UsersPart III ApplicationsAndroid Malware Detection Using Deep LearningArtificial Intelligence Enabled Radio Signal IntelligenceDeep Learning Quantile Regression for Robustness, Confidence andPlanningModel Fooling Threats Against Medical Imaging

    1 in stock

    £125.99

  • Advances in Cryptology – CRYPTO 2022: 42nd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2022: 42nd Annual

    1 in stock

    Book SynopsisThe 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. Table of ContentsCryptanalysis I.- Randomness.- Quantum Cryptography I.- Secure Multiparty Computation I.- Proof Systems.- Advanced Encryption Systems.- Secure Multiparty Computation II.- Secure Messaging.

    1 in stock

    £42.74

  • Electronic Voting: 7th International Joint

    Springer International Publishing AG Electronic Voting: 7th International Joint

    1 in stock

    Book SynopsisThis open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others.Table of ContentsAn analysis of the security and privacy issues of the Neovote online voting system.- Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol.- Review Your Choices: When Confirmation Pages Break Ballot Secrecy in Online Elections.- Running the Race: a Swiss Voting Story.- The Effect of Exogenous Shocks on the Administration of Online Voting: Evidence from Ontario, Canada.- The Council of Europe's CM/Rec(2017)5 on e-voting and secret suffrage: time for yet another update?.- Sweeter than SUITE: Supermartingale Stratified Union-Intersection Tests of Elections.- They may look and look, yet not see: BMDs cannot be tested adequately.- Individual Verifiability with Return Codes: Manipulation Detection Efficacy.- and Accuracy Testing: A Fifty-State Review.

    1 in stock

    £31.49

  • Advances in Cryptology – CRYPTO 2022: 42nd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2022: 42nd Annual

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the 4-volume proceedings LNCS 13507, 13508, 13509, 13510, was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures. Table of ContentsSecure Messaging.- Lattice-Based Zero Knowledge.- Quantum Cryptography II.- Lattice-Based Signatures.- Blockchain.- Best Paper Awards.- Coding Theory.- Public Key Cryptography.- Signatures.

    1 in stock

    £40.49

  • Trust, Privacy and Security in Digital Business:

    Springer International Publishing AG Trust, Privacy and Security in Digital Business:

    Out of stock

    Book SynopsisThis volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust; Privacy; Security; Digital business; GDPR; Authenticity-enhancing technologies; Internet of Things; Intrusion detection; Honeypots; Homomorphic encryption;, and Serious games.Table of ContentsPriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy Policies.- Closing the Gap between Privacy Policies and Privacy Preferences with Privacy Interfaces.- A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games.- Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply Privacy- and Authenticity-Enhancing Technologies.- Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT.- Homomorphic encryption in manufacturing compliance checks.

    Out of stock

    £42.74

  • Multi-Agent Systems: 19th European Conference, EUMAS 2022, Düsseldorf, Germany, September 14–16, 2022, Proceedings

    Springer International Publishing AG Multi-Agent Systems: 19th European Conference, EUMAS 2022, Düsseldorf, Germany, September 14–16, 2022, Proceedings

    1 in stock

    Book SynopsisThis book constitutes thoroughly refereed and revised selected papers from the proceedings of 19th European Conference on Multi-Agent Systems, EUMAS 2022, held in Düsseldorf, Germany, during September 14–16, 2022.The 23 full papers included in this book were carefully reviewed and selected from 36 submissions. The book also contains 6 short summaries of talks from PhD students at the PhD day. The papers deal with current topics in the research and development of multi-agent systems.Table of ContentsEUMAS 2022 Papers.- Iterative Goal-Based Approval Voting.- Mind the Gap! Runtime Verification of Partially Observable MASs with Probabilistic Trace Expressions.- Advising Agent for Service-Providing Live-Chat Operators.- Initial Conditions Sensitivity Analysis of a Two-Species Butterfly-Effect Agent-Based Model.- Proxy Manipulation for Better Outcomes.- The Spread of Opinions via Boolean Networks.- Robustness of Greedy Approval Rules.- Using Multiwinner Voting to Search for Movies.- Allocating Teams to Tasks: An Anytime Heuristic Competence-Based Approach.- Collaborative Decision Making for Lane-Free Autonomous Driving in the Presence of Uncertainty.- Maximin Shares under Cardinality Constraints.- Welfare Effects of Strategic Voting under Scoring Rules.- Preserving Consistency for Liquid Knapsack Voting.- Strategic Nominee Selection in Tournament Solutions.- Sybil-Resilient Social Choice with Low Voter Turnout.- A Survey of Ad Hoc Teamwork Research.- Combining Theory of Mind and Abduction for Cooperation under Imperfect Information.- A Modular Architecture for Integrating Normative Advisors in MAS.- Participatory Budgeting with Multiple Resources.- A Methodology for Formalizing Different Types of Norms.- Explainability in Mechanism Design: Recent Advances and the Road Ahead.- Integrating Quantitative and Qualitative Reasoning for Value Alignment.- Resource Allocation to Agents with Restrictions: Maximizing Likelihood with Minimum Compromise.- PhD Day Short Papers.- Proactivity in Intelligent Personal Assistants: A Simulation-based Approach.- Stability, Fairness, and Altruism in Coalition Formation.- Pro-Social Autonomous Agents.- Axiomatic and Algorithmic Study on Different Areas of Collective Decision Making.- Participatory Budgeting: Fairness and Welfare Maximization.- Human Consideration in Analysis and Algorithms for Mechanism Design.

    1 in stock

    £58.49

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account