Applied Cryptography: Protocols, Algorithms, and Source Code in C


Bruce Schneier - 1993
    … The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations

Lewis Carroll's Symbolic Logic


Lewis Carroll - 1896
    Lewis Carroll’s Symbolic logic : part I, Elementary, 1896, fifth edition, part II, Advanced, never previously published : together with letters from Lewis Carroll to eminent nineteenth-century logicians and to his "logical sister," and eight versions of the Barber-shop paradox / edited, with annotations and an introd., by William Warren Bartley, III.

Elementary Analysis: The Theory of Calculus


Kenneth A. Ross - 1980
    It is highly recommended for anyone planning to study advanced analysis, e.g., complex variables, differential equations, Fourier analysis, numerical analysis, several variable calculus, and statistics. It is also recommended for future secondary school teachers. A limited number of concepts involving the real line and functions on the real line are studied. Many abstract ideas, such as metric spaces and ordered systems, are avoided. The least upper bound property is taken as an axiom and the order properties of the real line are exploited throughout. A thorough treatment of sequences of numbers is used as a basis for studying standard calculus topics. Optional sections invite students to study such topics as metric spaces and Riemann-Stieltjes integrals.

The Quark and the Jaguar: Adventures in the Simple and the Complex


Murray Gell-Mann - 1994
    Nobel laureate Murray Gell-Mann offers a uniquely personal and unifying vision of the relationship between the fundamental laws of physics and the complexity and diversity of the natural world.

Professional PHP Programming


Sascha Schumann - 1999
    PHP is a server-side, HTML-embedded scripting language. It is an open source technology, rapidly gaining popularity as a scripting language for people running dynamic websites. One of its major attractions over Perl, JavaScript and other scripting languages is that PHP has a built-in database integration layer and seamless IP connectivity, with LDAP and TCP as well as the IMAP mail interface. Features; Real world, practical experience and techniques From installation and configuration of the PHP engine to advanced dynamic application design Definitive coverage of core PHP language and database addressing: MySQL is covered in depth. Practical e-commerce and business scripting including database application development, together with PHP and XML applications. LDAP connectivity addressed.

Paradigms of Artificial Intelligence Programming: Case Studies in Common LISP


Peter Norvig - 1991
    By reconstructing authentic, complex AI programs using state-of-the-art Common Lisp, the book teaches students and professionals how to build and debug robust practical programs, while demonstrating superior programming style and important AI concepts. The author strongly emphasizes the practical performance issues involved in writing real working programs of significant size. Chapters on troubleshooting and efficiency are included, along with a discussion of the fundamentals of object-oriented programming and a description of the main CLOS functions. This volume is an excellent text for a course on AI programming, a useful supplement for general AI courses and an indispensable reference for the professional programmer.

Codebreaker: The History of Codes and Ciphers, from the Ancient Pharaohs to Quantum Cryptography


Stephen Pincock - 2006
    The 4,000-year history of cryptography has been a kind of arms race: Each time a more complex encryption has been developed, it has been attacked and, more often than not, decoded; and each time, in response, codemakers have produced tougher and tougher codes. Codebreaker surveys the entire history of codes through an eloquent narrative and an evocative range of illustrations, paying special attention to famous codes that have never been broken, such as the Beale Ciphers, the Voynich manuscript, the Easter Island code, and many more. Many great names in history appear throughout, from Caesar and Mary Queen of Scots, to Samuel Morse and Alan Turing. The narrative is based in part on interviews with cryptology experts, Navaho windtalkers, decryption experts, and law enforcement experts, and ends with a vision of the coded future via quantum cryptography.

Programming the Universe: A Quantum Computer Scientist Takes on the Cosmos


Seth Lloyd - 2006
    This wonderfully accessible book illuminates the professional and personal paths that led him to this remarkable conclusion.All interactions between particles in the universe, Lloyd explains, convey not only energy but also information—in other words, particles not only collide, they compute. And what is the entire universe computing, ultimately? “Its own dynamical evolution,” he says. “As the computation proceeds, reality unfolds.”To elucidate his theory, Lloyd examines the history of the cosmos, posing questions that in other hands might seem unfathomably complex: How much information is there in the universe? What information existed at the moment of the Big Bang and what happened to it? How do quantum mechanics and chaos theory interact to create our world? Could we attempt to re-create it on a giant quantum computer? Programming the Universe presents an original and compelling vision of reality, revealing our world in an entirely new light.

How to Measure Anything in Cybersecurity Risk


Douglas W. Hubbard - 2016
    In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

Fuzzy Thinking: The New Science of Fuzzy Logic


Bart Kosko - 1993
    An authoritative introduction to "fuzzy logic" brings readers up to speed on the "smart" products and computers that will change all of our lives in the future.

Half-Life 2: Raising the Bar


David Hodgson - 2004
    -Unprecedented access behind "Half-Life" and "Half-Life 2" -A forward by Valve founder Gabe Newell -Hundreds of art, design, preproduction, and other art pieces crammed into the book -Over a dozen key members of Valve's staff interviewed -Officially approved by Valve -Behind City 17 and other locations -The development of the Source engine -A rogue's gallery of beasts, characters, and monstrosities -Key weapons development revelations -A tour of many of the game's locations, from inception to completion -Filled with art, screens, and anecdotes from the Valve team

Cryptography: A Very Short Introduction


Fred C. Piper - 2002
    It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas arehighlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticatedbanking methods.

Mathematical Thought from Ancient to Modern Times, Volume 1


Morris Kline - 1972
    Volume 1 looks at the discipline's origins in Babylon and Egypt, the creation of geometry and trigonometry by the Greeks, and the role of mathematics in the medieval and early modern periods. Volume 2 focuses on calculus, the rise of analysis in the 19th century, and the number theories of Dedekind and Dirichlet. The concluding volume covers the revival of projective geometry, the emergence of abstract algebra, the beginnings of topology, and the influence of Godel on recent mathematical study.

Practical Cryptography


Niels Ferguson - 2003
    The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).