Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...
Concurrent data structures simplify the development of concurrent programs by encapsulating commonly used mechanisms for synchronization and commu nication into data structures. This thesis develops a notation for describing concurrent data structures, presents examples of concurrent data structures, and describes an architecture to support...
This comprehensive textbook on combinatorial optimization places special emphasis on theoretical results and algorithms with provably good performance, in contrast to heuristics. It is based on numerous courses on combinatorial optimization and specialized topics, mostly at graduate level. This book reviews the...
Explaining how to apply to mathematical programming to network design and control, Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management fills the gap between mathematical programming theory and its implementation in communication networks. From the...
This book examines recent forms of secularisation to demonstrate that we are now witnessing a “fourth secularisation”: the autonomy of lifestyles. After introducing two initial secularising movements, from mythos to Logos and from Logos to Christianity, the book sets out how from Max Weber...
More than any other sport, boxing has a history of being easy to rig. There are only two athletes and one or both may be induced to accept a bribe; if not the fighters, then the judges or referee might be swayed. In such inviting circumstances, the mob moved into boxing in the 1930s and profited by corrupting a sport ripe for...