





Architecting Secure Software SystemsThrough the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...   Discrete Mathematics DeMYSTiFiedIn today’s world, analytical thinking is a critical part of any solid education. An important segment of this kind of reasoning—one that cuts across many disciplines—is discrete mathematics. Discrete math concerns counting, probability, (sophisticated forms of) addition, and limit processes over discrete sets. Combinatorics, graph...   

Post Quantum CryptographyQuantum computers will break today's most popular publickey cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantumcomputer attacks: in particular, postquantum publickey encryption systems and postquantum publickey signature...   A Brief History of ComputingThe history of computing has its origins at the outset of civilization. As towns and communities evolved there was a need for increasingly sophisticated calculations. This book traces the evolution of computation, from early civilisations 3000 B.C. to the latest key developments in modern times.
This useful and lively text provides a...   Modal Logic: An Introduction to its Syntax and SemanticsIn this text, a variety of modal logics at the sentential, firstorder, and secondorder levels are developed with clarity, precision and philosophical insight. All of the S1S5 modal logics of Lewis and Langford, among others, are constructed. A matrix, or manyvalued semantics, for sentential modal logic is formalized, and an important result... 


Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 