Fermilab Fermilab Core Computing Division

Library Home |  Ask a Librarian library@fnal.gov |  Book Catalog |  Library Journals |  Requests |  SPIRES |  Fermilab Documents |

Fermilab Library
SPIRES-BOOKS: FIND KEYWORD COMPUTER SECURITY *END*INIT* use /tmp/qspiwww.webspi1/6758.18 QRY 131.225.70.96 . find keyword computer security ( in books using www Cover
Image
Call number:9783319510347:ONLINE Show nearby items on shelf
Title:Network Games, Control, and Optimization Proceedings of NETGCOOP 2016, Avignon, France
Author(s):
Date:2017
Size:1 online resource (XIV, 234 p. 49 illus., 38 illus. in color p.)
Contents:Altman, E., Jain, A., Hayel, Y., Finite Improvement Property in a Stochastic Game Arising in Competition over Popularity in Social Networks -- Altman, E., Jain, A., Shimkin, N., Touati, C., Overview on Dynamic Games for Analyzing
Competition in the Internet and in Online Social Networks -- Altman, E., Touati, C., Load Balancing Congestion Games and their Asymptotic Behavior -- Bachmann, I., Morales, F., Silva, A., Bustos-Jimenez, J., Go-Index: Applying Supply
Networks Principles as Internet Robustness Metrics -- Belhadj Amor, S., Perlaza, S., Decentralized K-User Gaussian Multiple Access Channels -- Berri, S., Varma, V., Lasaulce, S., Radjef, M., Correlated Equilibria in Wireless Power
Control Games -- Chorppath, A., Zappone, A., Jorswieck, E., Alpcan, T., An Energy-Efficiency Game in Relay-Assisted D2D Networks with Malicious Devices -- Courcoubetis, C., Dimakis, A., Kanakakis, M., Minimally Intrusive Server
Policies for Background Data Transfers -- De Pellegrini, F., Massaro, A., Goratti, L., Rachid, E., Bounded Generalized Kelly Mechanism for Multi-Tenant Caching in Mobile Edge Clouds -- Douros, V., Toumpis, S., Polyzos, G., Power
Control and Bargaining for Cellular Operator Revenue Increase under Licensed Spectrum Sharing -- Grammatico, S., An Incentive Mechanism for Agents Playing Competitive Aggregative Games -- Hamidouche, K., Saad, W., Debbah, M.,
Multi-Games for LTE and WiFi Coexistence over Unlicensed Channels -- Hasan, C., Marina, M., Energy-Efficient User Association in Broadcast Transmission -- Ju, M., Zhou, F., Xiao, S., Torres-Moreno, J., Spectrum Shared p-Cycle Design in
Elastic Optical Networks with/without Spectrum Conversion Capabilities -- Chaitanya, A., Mukherji, U., Sharma, V., Learning Equilibria of a Stochastic Game on Gaussian Interference Channels with Incomplete Information -- Legenvre, F.,
Altman, E., Hayal, Y., Potential Game Approach to Virus Attack in Network General Topology -- Marcastel, A., Belmega, E., Mertikopoulos, P., Fijalkow, I., Interfernce Mitigation via Pricing in Time-Varying Cognitive Radio Systems --
Silva, A., Opinion Manipulation in Social Networks -- Taynitskiy, V., Gubar, E., Zhu, Q., Optimal Security Policy for Protection against Heterogeneous Malware -- Wu, H., Zhou, F., Zhu, Z., Chen, Y., An Experimental Comparison of
Routing and Spectrum Assignment Algorithms in Elastic Optical Networks -- Zhang, C., Varma, V., Lasaulce, S., Robust Power Modulation for Channel State Information Exchange
ISBN:9783319510347
Series:eBooks
Series:Springer eBooks
Series:Springer 2017 package
Keywords: Mathematics , Computer science , Game theory , System theory , Computer mathematics , Applied mathematics , Engineering mathematics , Mathematics , Game Theory, Economics, Social and Behav. Sciences , Systems Theory, Control , Mathematical Applications in Computer Science , Math Applications in Computer Science , Appl.Mathematics/Computational Methods of Engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:9780123738929:ONLINE Show nearby items on shelf
Title:On-chip communcation architectures
Author(s): Sudeep Pasricha
Nikil Dutt
Date:2008
Publisher:Elsevier
Size:522 p
Contents:Basic concepts of bus-based communication architectures -- On-chip communication architecture standards -- Models for performance exploration -- Models for power and thermal estimation -- Synthesis of on-chip communication architectures -- Encoding techniques for on-chip communication architectures -- Custom bus-based on-chip communication architecture design -- On-chip communication architecture refinement and interface synthesis -- Verification and security issues in on-chip communication architec ture design -- Physical design trends for interconnects -- Networks-on-chip -- Emerging on-chip interconnect technologies.
ISBN:9780123738929
Keywords: Computer architecture , Interconnects , Microcomputers , Systems on a chip
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:1119277655:ONLINE Show nearby items on shelf
Title:Linux Server Security: Hack and Defend
Author(s): Binnie
Date:2016
Publisher:Wiley
Size:1 online resource (145 p.)
ISBN:9781119277651
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:1119076285:ONLINE Show nearby items on shelf
Title:Artificial Immune System: Applications in Computer Security
Author(s): Tan
Date:2016
Publisher:Wiley-IEEE Computer Society Pr
Size:1 online resource (209 p.)
ISBN:9781119076285
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: General Computing
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:1118987055:ONLINE Show nearby items on shelf
Title:The Network Security Test Lab: A Step-by-Step Guide
Author(s): Gregg
Date:2015
Publisher:Wiley
Size:1 online resource (481 p.)
ISBN:9781118987056
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:1118939484:ONLINE Show nearby items on shelf
Title:Introduction to Network Security: Theory and Practice
Author(s): Wang
Date:2015
Publisher:Wiley
Size:1 online resource (441 p.)
ISBN:9781118939482
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:1118896696:ONLINE Show nearby items on shelf
Title:Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Author(s): Li
Date:2015
Publisher:Wiley
Size:1 online resource (361 p.)
ISBN:9781118896693
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:1118134117:ONLINE Show nearby items on shelf
Title:Computer Security Handbook, Sixth Edition, Volume2
Author(s): Bosworth
Date:2014
Publisher:Wiley
Size:1 online resource (1009 p.)
ISBN:9781118134115
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:1118134109:ONLINE Show nearby items on shelf
Title:Computer Security Handbook, Sixth Edition, Volume1
Author(s): Bosworth
Date:2014
Publisher:Wiley
Size:1 online resource (1217 p.)
ISBN:9781118134108
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:1118027809:ONLINE Show nearby items on shelf
Title:Cyber Security Policy Guidebook
Author(s): Bayuk
Date:2012
Publisher:Wiley
Size:1 online resource (289 p.)
ISBN:9781118027806
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:0471947830:ONLINE Show nearby items on shelf
Title:Computer Security and Cryptolography
Author(s): Konheim
Date:2007
Publisher:Wiley-Interscience
Size:1 online resource (545 p.)
ISBN:9780471947837
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: General Computing
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:0471703559:ONLINE Show nearby items on shelf
Title:Network Security: Current Status and Future Directions
Author(s): Douligeris
Date:2007
Publisher:Wiley-IEEE Press
Size:1 online resource (593 p.)
ISBN:9780471703556
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:0471253111:ONLINE Show nearby items on shelf
Title:Secrets and Lies: Digital Security in a Networked World
Author(s): Schneier
Date:2000
Publisher:Wiley
Size:1 online resource (433 p.)
ISBN:9780471253112
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:0470639555:ONLINE Show nearby items on shelf
Title:Security 2020: Reduce Security Risks This Decade
Author(s): Howard
Date:2010
Publisher:Wiley
Size:1 online resource (337 p.)
ISBN:9780470639559
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:0470193395:ONLINE Show nearby items on shelf
Title:Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Author(s): Dube
Date:2008
Publisher:Wiley
Size:1 online resource (257 p.)
ISBN:9780470193396
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Electrical & Electronics Engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:0470131187:ONLINE Show nearby items on shelf
Title:Information Security Governance: A Practical Development and Implementation Approach
Author(s): Brotby
Date:2009
Publisher:Wiley
Size:1 online resource (221 p.)
ISBN:9780470131183
Series:eBooks
Series:Wiley Online Library
Series:Wiley 2016 package purchase
Keywords: Computer Science
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover Image
Call number:TK5105.59.T86::1999 Show nearby items on shelf
Title:Kerberos : a network authentication system
Author(s): Brian Tung 1967-
Date:1999
Publisher:Addison-Wesley, Reading, Mass
Size:164
ISBN:0201379244
Series:The Addison-Wesley networking basics series 2
Keywords: Computer networks Security measures.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
Location: MAIN

Cover
Image
Call number:TK5105.5.T36::2011 Show nearby items on shelf
Title:Computer networks
Author(s): Andrew S. Tanenbaum
David Wetherall
Date:2011
Edition:9780132126953
Publisher:Boston : Pearson Prentice Hall
Size:933 p
Contents:Uses of computer networks -- network hardware -- Network software -- Reference models -- Example networks -- Network standardization -- Metric units -- The theoretical basis for data communication -- Guided transmission media -- wireless transmissio n -- Communication satellites -- Digital modulation and multiplexing -- The public switched telephone network - The mobile telephone system -- Cable television -- Data link layer design issues -- Error detection and correction -- Elementary data link prot ocols -- Sliding window protocols -- Example data link protocols -- The channel allocation problem -- Multiple access protocols -- Ethernet -- Wireless lans -- Broadband wireless -- Bluetooth -- RFID -- Data link layer switching -- Network layer design is sues -- Routing algorithms -- Congestion control algorithms -- Quality of service -- Internetworking -- The network layer in the internet -- The transport service -- Elements of transport protocols -- Congestion control -- The internet transport protocols : UDP -- The internet transport protocols: TCP -- Performance issues -- Delay-tolerant networking -- DNS-The domain name system -- Electronic mail -- The world wide web -- Streaming audio and video -- Content delivery -- Cryptography -- Symmetric-key algo rithms -- Public-key algorithms -- Digital signatures -- Management of public keys -- Communication security -- Authentication protocols -- Email security -- Web security -- Social issues.
ISBN:9780132126953
Keywords: Computer networks.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: MAIN

Cover
Image
Call number:SPRINGER-2016-9783319279145:ONLINE Show nearby items on shelf
Title:Exploring the Security Landscape: Non-Traditional Security Challenges
Author(s):
Date:2016
Edition:1st ed. 2016
Size:1 online resource (16 p.)
Note:10.1007/978-3-319-27914-5
Contents:Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross Country Comparison -- National Security in a Hyper-Connected World -- Is Maritime Security a Traditional Security Challenge
-- Pandemic Influenza Planning for the Mental Health Security of Survivors of Mass Deaths -- An evaluation of the Police Response to Gang-related Violence and Future Security Threat -- The Demographic horizon of the emerging security
environment -- Economic Security: An emerging security issue -- Critical Infrastructure vulnerabilities: embracing a network mindset.-Supply Chain Information Security: emerging challenges in the telecommunications industry.-Disrupting
terrorist and criminal networks: Crime script analysis through DODAF applications -- Beyond the Castle Model of Cyber-risk and cyber-security -- Food Security as Critical Infrastructure: the importance of safeguarding the food supply
for civil security -- The role of Social Network Sites in security risks and crises: The information warfare of terrorism -- Manufactured Risk, complexity and non-traditional security: from world risk society to a networked risk model
ISBN:9783319279145
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Physics , Energy policy , Energy and state , Natural disasters , Health promotion , Computer security , System safety , Physics , Security Science and Technology , Complex Networks , Health Promotion and Disease Prevention , Energy Policy, Economics and Management , Systems and Data Security , Natural Hazards
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2016-9783319211060:ONLINE Show nearby items on shelf
Title:Applications of Systems Thinking and Soft Operations Research in Managing Complexity From Problem Framing to Problem Solving
Author(s):
Date:2016
Edition:1st ed. 2016
Size:1 online resource (61 p.)
Note:10.1007/978-3-319-21106-0
Contents:Part 1: Organizational Theme -- Using systems modeling to examine law enforcement collaboration in the response to serious crime -- Managing Complexity in Organizations through a Systemic Network of Projects -- Family of Related
Systemic Elements (FoRSE™) Matrix: Big(ger) Picture Thinking and Application for Business and Organizations -- Part 2: Disaster Management Theme -- Disentangling wicked problems: a reflexive approach towards resilience governance --
Post-disaster reconstruction – what does it mean to rebuild with resilience -- Black swans, dragon kings and beyond: towards predictability and suppression of extreme all-hazards events through modeling and simulation -- Part 3:
Systems approaches Theme -- Supporting Intelligence Analysis through visual thinking -- The Benefits of systems-thinking approach to accident investigation -- Systems Theory as a foundation for discovery of pathologies from complex
system problem formulation -- Soft (?) social systems and shocks: an experiment with an agent based model -- System Failure? Why humanitarian assistance can’t met its objectives without systems thinking- and why it finds it so hard to
use it -- Using First Nations systems thinking to operationalize sustainable development
ISBN:9783319211060
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Physics , Operations research , Decision making , Computer simulation , System safety , Statistical physics , Dynamical systems , Social sciences , Physics , Statistical Physics, Dynamical Systems and Complexity , Operation Research/Decision Theory , Methodology of the Social Sciences , Security Science and Technology , Simulation and Modeling
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2014-9783319044866:ONLINE Show nearby items on shelf
Title:Risk - A Multidisciplinary Introduction [electronic resource]
Author(s): Claudia Klppelberg
Daniel Straub
Isabell M Welpe
Date:2014
Publisher:Cham : Springer International Publishing : Imprint: Springer
Size:1 online resource
Note:This is a unique book addressing the integration of risk methodology from various fields. It stimulates intellectual debate and communication across disciplines, promotes better risk management practices and contributes to thedevelopment of risk mana gement methodologies. Book chapters explain fundamental risk models and measurement, and address risk and security issues from diverse areas such as finance and insurance, health sciences, life sciences,engineering and information science. Integrated Risk Sciences is an emerging field, that considers risks in different fields aiming at a common language, and at sharing and improving methods developed in different fields. Readersshould have a Bachelor degree and at least one basic university course in stat istics and probability. The main goal of the book is to provide basic knowledge on risk and security in a common language the authors have taken particularcare to ensure that each chapter can be understood by doctoral students and researchers across disci plines. Each chapter provides simple case studies and examples, open research questions and discussion points, and a selectedbibliography inviting the reader to further studies
Contents:Introduction
Part One. Risk in History and Science: Zachmann, K.: Risk in historical perspective: concepts, contexts, and conjunctions
Ltge, C., Schnebel, E., Westphal, N.: Risk management and business ethics: integrating the human factor
Straub, D., Welpe, I.: Decision
making under risk: a normative and behavioral perspective
Mainzer, K.: The new role of mathematical modelling and its importance for society
Part Two. Quantitative Risk Methodology: Biagini, F. , Meyer
Brandis, T. and Svindland, G. :The mathematical concept of risk
Fasen, V., Klppelberg, C., Menzel, A.: Qu
ISBN:9783319044866
Series:eBooks
Series:SpringerLink
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Geology , Computer science , Distribution (Probability theory) , Statistics , System safety , Climatic changes
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2014-9781493904761:ONLINE Show nearby items on shelf
Title:Topical Directions of Informatics [electronic resource] : In Memory of V. M. Glushkov
Author(s): Ivan V Sergienko
Date:2014
Publisher:New York, NY : Springer New York : Imprint: Springer
Size:1 online resource
Note:This work is devoted to the late Ukrainian computer scientist V. M. Glushkov on the 90th anniversary of his birthday. Dr. Glushkov is known for his contribution to the world computer science and technology, and this volumeanalyzes the ideas and paths of development of informatics formulated by him, and demonstrates their important role in constructing computer technologies of basic research in the fields of applied mathematics, theories of computerprogramming, and computing systems. A significant po rtion of the monograph is devoted to the elucidation of new results obtained in the field of mathematical modeling of complicated processes, creation of new methods for solvingand investigating optimization problems in different statements, and developmen t of computer technologies for investigations in the field of economy, biology, medicine, and information security in systems. The monograph will be ofparticular interest to informatics specialists and experts using methods of informatics and computer te chnologies to investigate complicated processes of different natures and developing new information technologies. It may also beuseful for both graduate students and postgraduates specializing in Computer Science
Contents:Introduction
1. Theoretical and Applied Programming
2. Supercomputers and Intelligent Technologies of High
Performance Computing
3. Computer Technologies as Tools for Studying Complicated Processes
4. Mathematical Models and Computer Technologies in Investigating Economic Processes
5. Mathematical Modeling and Investigation of Complicated Processes
6. Optimization Methods for Solving Transcomputational Problems
7. Combinatorial Optimization Problems
8. Computer Technologies in Medical and Biological Research
ISBN:9781493904761
Series:eBooks
Series:SpringerLink
Series:Springer Optimization and Its Applications, 1931-6828 : v78
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2013-9783642309045:ONLINE Show nearby items on shelf
Title:Advances in Network Analysis and its Applications [electronic resource]
Author(s): Evangelos Kranakis
Date:2013
Publisher:Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:As well as highlighting potentially useful applications for network analysis, this volume identifies new targets for mathematical research that promise to provide insights into network systems theory as well as facilitating thecross-fertilization of ideas between sectors. Focusing on financial, security and social aspects of networking, the volume adds to the growing body of evidence showing that network analysis has applications to transportation,communication, health, finance, and social policy mor e broadly. It provides powerful models for understanding the behavior of complex systems that, in turn, will impact numerous cutting-edge sectors in science and engineering, such aswireless communication, network security, distributed computing and social networking, financial analysis, and cyber warfare. The volume offers an insider' s view of cutting-edge research in network systems, including methodologieswith immense potential for interdisciplinary application. The contributors have all presented mate rial at a series of workshops organized on behalf of Canadas MITACS initiative, which funds projects and study grants inmathematics for information technology and complex systems. These proceedings include papers from workshops on financial networks, netw ork security and cryptography, and social networks. MITACS has shown that the partlyghettoized nature of network systems research has led to duplicated work in discrete fields, and thus this initiative has the potential to save time and accelerate the pac e of research in a number of areas of network systemsresearch
Note:Springer eBooks
Contents:FINANCIAL NETWORKS: 1. Mathematical modeling of systemic risk: H. Amini, A. Minca
2. Systemic risk in banking networks without Monte Carlo simulation: J. P. Gleeson, T. R. Hurd, S. Melnik, A. Hackett
3. Systemic Valuation of Banks Interbank Equilibrium and Contagion: G. Haaj
4. An Open Problem: J. B. Walsh
II SECURITY NETWORKS: 5. Dynamic Trust Management: Network Profiling for High Assurance Resilience: M. Burmester , W. O. Redwood
6. Security Issues in Link State Routing Protocols for MANETs: G.Cervera, M.Barbeau, J. Garcia
Alfaro, E.Kranakis
7. TCHo: a Code
bas
ISBN:9783642309045
Series:e-books
Series:SpringerLink (Online service)
Series:Mathematics in Industry, 1612-3956 : v18
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Computer Communication Networks , Bioinformatics , Computer engineering , Industrial organization (Economic theory)
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2013-9781461473060:ONLINE Show nearby items on shelf
Title:Derivative Securities and Difference Methods [electronic resource]
Author(s): You-lan Zhu
Xiaonan Wu
I-Liang Chern
Zhi-zhong Sun
Date:2013
Edition:2nd ed. 2013
Publisher:New York, NY : Springer New York : Imprint: Springer
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:This book is mainly devoted to finite difference numerical methods for solving partial differential equation (PDE) models of pricing a wide variety of financial derivative securities. With this objective, the book is divided intotwo main parts. In th e first part, after an introduction concerning the basics on derivative securities, the authors explain how to establish the adequate PDE initial/initial-boundary value problems for different sets of derivativeproducts (vanilla and exotic options, and int erest rate derivatives). For many option problems, the analytic solutions are also derived with details.The second part is devoted to explaining and analyzing the application of finitedifferences techniques to the financial models stated in the first part of the book. For this, the authors recall some basics on finite difference methods, initial boundary value problems, and (having in view financial products withearly exercise feature) linear complementarity and free boundary problems. In each chapter, th e techniques related to these mathematical and numerical subjects are applied to a wide variety of financial products. This is a textbook forgraduate students following a mathematical finance program as well as a valuable reference for those researchers w orking in numerical methodsof financial derivatives. For this new edition, the book has been updated throughout withmany new problems added. More details about numerical methods for some options, for example, Asian options with discrete sampling, are prov ided and the proof of solution-uniqueness of derivative security problems and the completestability analysis of numerical methods for two-dimensional problems are added. Review of first edition: the book is highly well designed and structured as a textboo k for graduate students following a mathematical financeprogram, which includes Black-Scholes dynamic hedging methodology to price financial derivatives. Also, it is a very valuable refe
Note:Springer eBooks
Contents:Introduction
European Style Derivatives
American Style Derivatives
Exotic Options
Interest Rate Derivative Securities
Basic Numerical Methods
Finite Difference Methods
Initial
Boundary Value and LC Problems
Free
Boundary Problems
Interest Rate Modeling
ISBN:9781461473060
Series:e-books
Series:SpringerLink (Online service)
Series:Springer Finance, 1616-0533
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Differential equations, partial , Finance , Computer science Mathematics , Numerical analysis
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2013-9781447150794:ONLINE Show nearby items on shelf
Title:Stream Ciphers [electronic resource]
Author(s): Andreas Klein
Date:2013
Publisher:London : Springer London : Imprint: Springer
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobilephones. Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but theycan be more vulnerable to attack. Here, mathe matics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety. Since thetheory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustnessagainst attacks. Part I covers linear feedback shift registers, non-linear combinations of LF SRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones,RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers. Stream Ciphers r equires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming.Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphersconcludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science
Note:Springer eBooks
Contents:Introduction to Stream Ciphers
Linear Feedback Shift Registers
Non
linear Combinations of LFSRs
Correlation Attacks
BDD
Based Attacks
Algebraic Attacks
Irregular Clocked Shift Registers
The Security of Mobile Phones (GSM)
RC4 and Related Ciphers
The eStream Project
The Blum
Blum
Shub Generator and Related Ciphers
Mathematical Background
Part IV Exercises with Solutions
ISBN:9781447150794
Series:e-books
Series:SpringerLink (Online service)
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Computational complexity , Algorithms
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2012-9781461441090:ONLINE Show nearby items on shelf
Title:Applications of Mathematics and Informatics in Military Science [electronic resource]
Author(s): Nicholas J Daras
Date:2012
Publisher:New York, NY : Springer New York : Imprint: Springer
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Analysis, assessment, and data management are core tools required for operation research analysts. The April 2011 conference held at the Helenic Army Academy addressed these topics with efforts to collect valuable recommendationsfor improving analyst s capabilities to assess and communicate necessary qualitative data to military leaders. This unique volume is comprised of contributions from the fields of science, mathematics, and the military, andincludes a foreword written by the general manager of the NATO Consultation Command and Control Agency (NC3A). This work will be of interest to a diverse audience including military operations research analysts, the militarycommunity at large, and practitioners working with mathematical methods and applicati ons to informatics and military science. Applications of Mathematics and Informatics in Military Science covers a wide variety of mathematicalmethods used with application to defense and security. Each contribution considers directions and pursuits of sci entists that pertain to the military as well as the theoretical background required for methods, algorithms, andtechniques used in military applications. The direction of theoretical results in these applications is conveyed and open problems and future a reas of focus are highlighted. Topics covered include: applied OR and militaryapplications, signal processing, scattering, scientific computing and applications, combat simulation and statistical modeling, satellite remote sensing, and applied informatic s (cryptography and coding)
Note:Springer eBooks
Contents:Foreword
Preface
Table of Contents
1. The Significance of Research and Development for the National Defence and its Relation with the Military University Institutions (N. Uzunoglu)
2. Selected Topics in Critical Element Detection (J.L. Walteros, P.M. Pardalos)
3. Study of Engagement with Mobile Targets (S. Tassopoulos)
4. Solving an Electromagnetic Scattering Problem in Chiral Media (C. Athanasiadis, S. Dimitroula, K. Skourogiannis)
5. Orthonormality in Interpolation Schemes for Reconstructing Signals (N.J. Daras)
6. Computer Graphics Techniques in Military Applications
ISBN:9781461441090
Series:e-books
Series:SpringerLink (Online service)
Series:Springer Optimization and Its Applications, 1931-6828 : v71
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Computer vision , Computer science , Mathematical optimization
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2012-9781461401285:ONLINE Show nearby items on shelf
Title:Group Testing Theory in Network Security [electronic resource] : An Advanced Solution
Author(s): My T Thai
Date:2012
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network securityproblems and mathema tical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as sizeconstraint group testing and connected group te sting. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connectionbetween mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, andengineering
Note:Springer eBooks
ISBN:9781461401285
Series:e-books
Series:SpringerLink (Online service)
Series:SpringerBriefs in Optimization, 2190-8354
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Computer Communication Networks , Mathematical optimization , Engineering mathematics , Industrial engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2011-9781441905345:ONLINE Show nearby items on shelf
Title:Performance Models and Risk Management in Communications Systems [electronic resource]
Author(s): Naln Glpnar
Peter Harrison
Ber Rstem
Date:2011
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:This volume covers recent developments in the design, operation, and management of telecommunication and computer network systems in performance engineering and addresses issues of uncertainty, robustness, and risk. Uncertaintyregarding loading and s ystem parameters leads to challenging optimization and robustness issues. Stochastic modeling combined with optimization theory ensures the optimum end-to-end performance of telecommunication or computer networksystems. In view of the diverse design optio ns possible, supporting models have many adjustable parameters and choosing the best set for a particular performance objective is delicate and time-consuming. An optimization based approachdetermines the optimal possible allocation for these parameters. Researchers and graduate students working at the interface of telecommunications and operations research will benefit from this book. Due to the practical approach, thisbook will also serve as a reference tool for scientists and engineers in telecommunica tion and computer networks who depend upon optimization
Note:Springer eBooks
Contents:Preface
Foreword
Distributed and Robust Rate Control for Communication Networks Tansu Alpcan
Of Threats and Costs: A Game
Theoretic Approach to Security Risk Management Patrick MaillE, Peter Reichl, Bruno Tuffin
Computationally Supported Quantitative Risk Management for Information Systems Denis Trek
Cardinality Constrained Critical Node Detection Problem Ashwin Arulselvan, Clayton W. Commander, Oleg Shylo, Panos M. Pardalos
Reliability Based Routing Algorithms for Energy Aware Communication in Wireless Sensor Networks Janos Levendovszky, Andras Olah, Gergely Treplan, L
ISBN:9781441905345
Series:e-books
Series:SpringerLink (Online service)
Series:Springer Optimization and Its Applications, 1931-6828 : v46
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Computer system performance , Mathematical optimization , Operations research , Distribution (Probability theory) , Telecommunication
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2010-9781441917232:ONLINE Show nearby items on shelf
Title:Vision and Displays for Military and Security Applications [electronic resource] : The Advanced Deployable Day/Night Simulation Project
Author(s): Keith K Niall
Date:2010
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Vision and Displays for Military and Security Applications presents recent advances in projection technologies and associated simulation technologies for military and security applications. Specifically, this book covers nightvision simulation, semi- automated methods in photogrammetry, and the development and evaluation of high-resolution laser projection technologies for simulation. Topics covered include: advances in high-resolution projection, advancesin image generation, geographic modeling, and LIDAR imaging, as well as human factors research for daylight simulation and for night vision devices. This title is ideal for optical engineers, simulator users and manufacturers,geomatics specialists, human factors researchers, and for engineers working with high-resolution display systems. It describes leading-edge methods for human factors research, and it describes the manufacture and evaluation ofultra-high resolution displays to provide unprecedented pixel density in visual simulation
Note:Springer eBooks
Contents:Creating Day and Night: Past, Present, and Future
Development of a DVI
Compatible VGA Projector Engine Based on Flexible Reflective Analog Modulators
Brightness and Contrast of Images with Laser
Based Video Projectors
Physics Based Simulation of Light Sources
Integration of a Deployable CIGI
Based Image Generator in an Existing Simulation
Advances in Scalable Generic Image Generator Technology for the Advanced Deployable Day/Night Simulation Project
Detection Threshold of Visual Displacement in a Networked Flight Simulator
Evaluation of the Spatial and Temporal Resolution
ISBN:9781441917232
Series:e-books
Series:SpringerLink (Online service)
Series:Physics and Astronomy (Springer-11651)
Keywords: Computer vision , Geographical information systems , Computer engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2010-9781441916365:ONLINE Show nearby items on shelf
Title:Complex Intelligent Systems and Their Applications [electronic resource]
Author(s): Fatos Xhafa
Leonard Barolli
Petraq J Papajorgji
Date:2010
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Complex Intelligent Systems and Their Applications presents the most up-to-date advances in complex, software intensive and intelligent systems. Each self-contained chapter is the contribution of distinguished experts inareas of research relevant to the study of complex, intelligent and software intensive systems. These contributions focus on the resolution of complex problems from areas of networking, optimization and artificial intelligence. Thisbook is divided into three parts focusing on complex intelligent network systems, efficient resource management in complex systems, and artificial data mining systems. Through the presentation of these diverse areas of application, thevolume provides insights into the multidisciplinary nature of complex pro blems. Throughout the entire book, special emphasis is placed on optimization and efficiency in resource management, network interaction, and intelligent systemdesign. Key Features of Complex Intelligent Systems and Their Applications include: - Considers the multi-disciplinary nature of complex problems in intelligent systems and a range of state-of-the-art techniques used to resolvethese problems. - Graduate students as well as researchers will find this a useful guide to the most up-to-date techniques available to resolve complex problems in networking, optimization, and artificial intelligence. - Real lifeexamples presented throughout the book extend the texts suitability to practitioners. This book presents the most recent interdisciplinary results i n this area of research and can serve as a valuable tool for researchers interestedin defining and resolving the types of complex problems that arise in networking, optimization, and artificial intelligence
Note:Springer eBooks
Contents:Efficient Integration of Complex Information Systems in the ATM Domain with Explicit Expert Knowledge Models
An Ontology
Based Approach for Supporting Business
IT Alignment
EPCIS
Based Supply Chain Event Management
Cost
Benefit Analysis to Hedge with Third
Party Producers in Demand
Driven Production
A Security Assurance Model to Holistically Assess the Information Security Posture
Risk
Aware Business Process ManagementEstablishing the Link Between Business and Security
Self
Optimised Tree Overlays Using Proximity
Driven Self
Organised Agents
Filtering Order Adaptation B
ISBN:9781441916365
Series:e-books
Series:SpringerLink (Online service)
Series:Springer Optimization and Its Applications, 1931-6828 : v41
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Computer network architectures , Computer system performance , Computer science , Artificial intelligence , Operations research
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2008-9781848002739:ONLINE Show nearby items on shelf
Title:Codes: An Introduction to Information Communication and Cryptography [electronic resource]
Author(s): N.L Biggs
Date:2008
Publisher:London : Springer London
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle it, for example, mobile phones, digital cameras, and personal computers. This book is an integratedintroduction to the mathema tics of coding, that is, replacing information expressed in symbols, such as a natural language or a sequence of bits, by another message using (possibly) different symbols. There are three main reasons fordoing this: economy, reliability, and security, a nd each is covered in detail. Only a modest mathematical background is assumed, the mathematical theory being introduced at a level that enables the basic problems to be statedcarefully, but without unnecessary abstraction. Other features include: clear a nd careful exposition of fundamental concepts, including optimal coding, data compression, and public-key cryptography concise but complete proofs ofresults coverage of recent advances of practical interest, for example in encryption standards, authentica tion schemes, and elliptic curve cryptography numerous examples and exercises, and a full solutions manual available tolecturers from www.springer.com This modern introduction to all aspects of coding is suitable for advanced undergraduate or postgraduate courses in mathematics, computer science, electrical engineering, or informatics. It is alsouseful for researchers and practitioners in related areas of science, engineering and economics
Note:Springer eBooks
Contents:Coding and its uses
Prefix
free codes
Economical coding
Data compression
Noisy channels
The problem of reliable communication
The noisy coding theorems
Linear codes
Algebraic coding theory
Coding natural languages
The development of cryptography
Cryptography in theory and practice
The RSA cryptosystem
Cryptography and calculation
Elliptic curve cryptography
Answers to odd
numbered exercises
Index
ISBN:9781848002739
Series:e-books
Series:SpringerLink (Online service)
Series:Springer Undergraduate Mathematics Series, 1615-2085
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Data structures (Computer science) , Coding theory , Combinatorics , Number theory , Telecommunication
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2008-9780387779942:ONLINE Show nearby items on shelf
Title:An Introduction to Mathematical Cryptography [electronic resource]
Author(s): J.H Silverman
Jill Pipher
Jeffrey Hoffstein
Date:2008
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing themathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader techniques from algebra, number theory, and probability are introduced and developed asrequired. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: * classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-basedcryptosystems, the RSA cryptosystem, and digital signatures * fundamental mathemat ical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms *an in-depth treatment of important recent cryptographic innovations, such as elliptic curves, elliptic cu rve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. This book is an idealintroduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index supplementary materials are available online
Note:Springer eBooks
Contents:An Introduction to Cryptography
Discrete Logarithms and Diffie
Hellman
Integer Factorization and RSA
Probability Theory and Information Theory
Elliptic Curves and Cryptography
Lattices and Cryptography
Digital Signatures
Additional Topics in Cryptology
ISBN:9780387779942
Series:e-books
Series:SpringerLink (Online service)
Series:Undergraduate Texts in Mathematics, 0172-6056
Series:Mathematics and Statistics (Springer-11649)
Keywords: Mathematics , Data structures (Computer science) , Data encryption (Computer science) , Algebra , Number theory
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2006-9783540331339:ONLINE Show nearby items on shelf
Title:Quantum Computation and Information [electronic resource] : From Theory to Experiment
Author(s): Hiroshi Imai
Masahito Hayashi
Date:2006
Publisher:Berlin, Heidelberg : Springer Berlin Heidelberg
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Recently, the field of quantum computation and information has been developing through a fusion of results from various research fields in theoretical and practical areas. This book consists of the reviews of selected topicscharterized by great progr ess and cover the field from theoretical areas to experimental ones. It contains fundamental areas, quantum query complexity, quantum statistical inference, quantum cloning, quantum entanglement, additivity.It treats three types of quantum security system , quantum public key cryptography, quantum key distribution, and quantum steganography. A photonic system is highlighted for the realization of quantum information processing
Note:Springer eBooks
Contents:Part I: Quantum Computation
Quantum Identification of Boolean Oracles
Query Complexity of Quantum Biased Oracles
Part II: Quantum Information
Quantum Statistical Inference
Quantum Cloning Machines
Entanglement and Quantum Error Correction
On Additivity Questions
Part III: Quantum Security
Quantum Computational Cryptography
Quantum Key Distribution: Security, Feasibility and Robustness
Why Quantum Steganography Can Be Stronger Than Classical Steganography
Part IV: Realization of Quantum Information System
Photonic Realization of Quantum Information Systems
ISBN:9783540331339
Series:e-books
Series:SpringerLink (Online service)
Series:Topics in Applied Physics, 0303-4216 : v102
Series:Physics and Astronomy (Springer-11651)
Keywords: Computer science Mathematics , Quantum computing
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2006-9783540313144:ONLINE Show nearby items on shelf
Title:From Data and Information Analysis to Knowledge Engineering [electronic resource] : Proceedings of the 29th Annual Conference of the Gesellschaft fr Klassifikation e.V. University of Magdeburg, March 911, 2005/ edited by Myra Spiliopoulou, Rudolf Kr use, Christian Borgelt, Andreas Nrnberger, Wolfgang Gaul
Author(s): Myra Spiliopoulou
Rudolf Kruse
Christian Borgelt
Andreas Nrnberger
Wolfgang Gaul
Date:2006
Publisher:Berlin, Heidelberg : Springer Berlin Heidelberg
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:The volume contains revised versions of selected papers presented during the 29th Annual Conference of the Gesellschaft fr Klassifikation (GfKl), the German Classification Society, held at the Otto-von-Guericke-University ofMagdeburg, Germany, in Mar ch 2005. In addition to papers on the traditional subjects Classification, Clustering, and Data Analysis, there are many papers on a wide range of topics with a strong relation to Computer Science. Examplesare Text Mining, Web Mining, Fuzzy Data Analysis, IT Security, Adaptivity and Personalization, and Visualization. Application-oriented topics include Economics, Marketing, Banking and Finance, Medicine, Bioinformatics, Biostatistics,and Music Analysis
Note:Springer eBooks
Contents:Plenaries and Semi
plenaries
Clustering
Discriminant Analysis
Classification with Latent Variable Models
Multiway Classification and Data Analysis
Ranking, Multi
label Classification, Preferences
PLS Path Modeling, PLS Regression and Classification
Robust Methods in Multivariate Statistics
Data Mining and Explorative Multivariate Data Analysis
Text Mining
Fuzzy Data Analysis
Economics and Mining in Business Processes
Banking and Finance
Marketing
Adaptivity and Personalization
User and Data Authentication in IT Security
Bioinformatics and Biostat
ISBN:9783540313144
Series:e-books
Series:SpringerLink (Online service)
Series:Studies in Classification, Data Analysis, and Knowledge Organization, 1431-8814
Series:Mathematics and Statistics (Springer-11649)
Keywords: Statistics , Optical pattern recognition , Economics Statistics , Economics, Mathematical
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2006-9781402040580:ONLINE Show nearby items on shelf
Title:Biosensing [electronic resource]
Author(s): Jerome Schultz
Milan Mrksich
Sangeeta N Bhatia
David J Brady
Antonio J Ricco
David R Walt
Charles L Wilkins
Date:2006
Publisher:Dordrecht : Springer Netherlands
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:The goal of this book is to disseminate information on the worldwide status and trends in biosensing R&D to government decisionmakers and the research community. The contributors critically analyze and compare biosensing researchin the United States with that being pursued in Japan, Europe and other major industrialized countries. Biosensing includes systems that incorporate a variety of means, including electrical, electronic, and photonic devices biologicalmaterials (e.g., tissue, enzymes, nucleic acids, etc.) and chemical analysis to produce detectable signals for the monitoring or identification of biological phenomena. In a broader sense, the study of biosensing includes any approachto detection of biological elements and the associated software or computer identification technologies (e.g., imaging) that identify biological characteristics. Biosensing is finding a growing number of applications in a wide varietyof areas, including biomedicine, food production and processing, and detection of ba cteria, viruses, and biological toxins for biowarfare defense. Subtopics likely to be covered in this study include the following: Nucleic acid sensorsand DNA chips and arrays, organism- and cell-based biosensors, bioelectronics and biometrics, biointerfa ces and biomaterials biocompatibility and biofouling, integrated, multi-modality sensors and sensor networks, system issues,including signal transduction, data interpretation, and validation, novel sensing algorithms, e.g., non-enzyme-based sensors for gl ucose, mechanical sensors for prosthetics, related issues in bio-MEMS and NEMS (microelectromechanicaland nanoelectromechanical systems), possibly including actuators, applications in biomedicine, the environment, food industry, security and defense. Part icular emphasis will be on technologies that may lead to portable or fieldabledevices/instruments. Important consideration will be given to an integrated approach to detection, storage, analysis, val
Note:Springer eBooks
Contents:Executive summary
Infrastructure overview
Optical biosensing
Electro
based sensors and surface engineering
Cell and tissue
based sensors
Mass spectrometry and biosensing research
Microfabricated biosensing devices: MEMS, microfluidics, mass sensors
Information systems for biosensing
Appendices
ISBN:9781402040580
Series:e-books
Series:SpringerLink (Online service)
Series:Physics and Astronomy (Springer-11651)
Keywords: Animal Physiology , Neurobiology
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2005-9780387260150:ONLINE Show nearby items on shelf
Title:Molecular and Cellular Signaling [electronic resource]
Author(s): Martin Beckerman
Date:2005
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:A small number of signaling pathways, no more than a dozen or so, form a control layer that is responsible for all signaling in and between cells of the human body. The signaling proteins belonging to the control layer determinewhat kinds of cells ar e made during development and how they function during adult life. Malfunctions in the proteins belonging to the control layer are responsible for a host of human diseases ranging from neurological disorders tocancers. Most drugs target components in the control layer, and difficulties in drug design are intimately related to the architecture of the control layer. Molecular and Cellular Signaling provides an introduction to molecular andcellular signaling in biological systems with an emphasis on the unde rlying physical principles. The text is aimed at upper-level undergraduates, graduate students and individuals in medicine and pharmacology interested in broadeningtheir understanding of how cells regulate and coordinate their core activities and how dise ases arise when these regulatory systems malfunction, as well as those in chemistry, physics and computer science interested in pursuing careersin biological and medical physics, bioinformatics and systems biology. To that end, the book includes backgroun d information and review sections, and chapters on signaling in the immune, endocrine (hormonal) and nervous systems. It haschapters on cancer, apoptosis and gene regulation, and contains chapters on bacteria and viruses. In those chapters not specificall y devoted to pathogens, connections between diseases, drugs and signaling are made. Each chapter alsofeatures a problem set to facilitate further discussion and understanding. About the Author: Martin Beckerman, Ph.D. is Senior Scientist at the Center for Martin Beckerman, PhD, is a senior research scientist at the Department ofEnergy/National Nuclear Security Administrations Y-12 National Security Complex in Oak Ridge, TN. Prior to assuming his curre
Note:Springer eBooks
Contents:1. Introduction
2. The Control Layer
3. Exploring Protein Structure and Function
4. Macromolecular Forces
5. Protein Folding and Binding
6. Stress and Pheromone Responses in Yeast
7. Two
Component Signaling Systems
8. Organization of Signal Complexes by Lipids, Calcium and Cyclic Amp
9. Signaling by Cells of the Immune System
10. Cell Adhesion and Motility
11. Signaling in the Endocrine System
12. Signaling in the Endocrine and Nervous System through GPCRs
13. Cell Fate and Polarity
14.Cancer
15. Apoptosis
16. Gene Regulation in Eukaryotes
17. Ce
ISBN:9780387260150
Series:e-books
Series:SpringerLink (Online service)
Series:Biological and Medical Physics, Biomedical Engineering, 1618-7210
Series:Physics and Astronomy (Springer-11651)
Keywords: Medicine , Biochemistry , Cytology , Biomedical engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2005-9780387250960:ONLINE Show nearby items on shelf
Title:Optical and Digital Techniques for Information Security [electronic resource]
Author(s): Bahram Javidi
Date:2005
Publisher:New York, NY : Springer New York
Size:1 online resource
Note:Springer e-book platform
Note:Springer 2013 e-book collections
Note:Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation andtechnologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverseexpertise in optical sciences and engineering, di gital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can beapplied to information security issues. The Advanced Sciences and Technolo gies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics,authentication, verification, and smart surveillance systems) -Biological and chemical threat dete ction (including biosensors, aerosols, materials detection and forensics) -Secure information systems (including encryption, and opticaland photonic systems). The series is intended to give an overview at the hightest research level at the frontier of res earch in the physical sciences
Note:Springer eBooks
Contents:Quantum Cryptography
New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography
Distortion and Noise Robust Digital Watermarking Using Input and Fourier Plane Phase Encoding
Steganography and Encryption Systems Based on Spatial Correlators with Meaningful Output Images
Optoelectronic Information Encryption with Incoherent Light
Information Hiding: Steganography and Watermarking
Watermarking Streaming Video: The Temporal Synchronization Problem
Secure Display Using Encrypted Digital Holograms
Compression of Digital Holograms for Secure Three
D
ISBN:9780387250960
Series:e-books
Series:SpringerLink (Online service)
Series:Advanced Sciences and Technologies for Security Applications, 1613-5113 : v1
Series:Physics and Astronomy (Springer-11651)
Keywords: Electromagnetism , Laser physics , Physical optics , Microwaves
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2004-9783034878654:ONLINE Show nearby items on shelf
Title:Coding, Cryptography and Combinatorics
Author(s):
Date:2004
Size:1 online resource (405 p.)
Note:10.1007/978-3-0348-7865-4
Contents:On the Secondary Constructions of Resilient and Bent Functions -- Adaptive Recursive MLD Algorithm Based on Parallel Concatenation Decomposition for Binary Linear Codes -- Modularity of Asymptotically Optimal Towers of Function Fields
-- A New Correlation Attack on LFSR Sequences with High Error Tolerance -- LDPC Codes: An Introduction -- The New Implementation Schemes of the TTM Cryptosystem Are Not Secure -- The Capacity Region of Broadcast Networks with Two
Receivers -- Constructions of Nonbinary Codes Correcting t- Symmetric Errors and Detecting All Unidirectional Errors: Magnitude Error Criterion -- On the Propagation Criterion of Boolean Functions -- On Certain Equations over Finite
Fields and Cross-Correlations of m-Sequences -- A Polly Cracker System Based on Satisfiability -- Combinatorially Designed LDPC Codes Using Zech Logarithms and Congruential Sequences -- New Constructions of Constant-Weight Codes --
Good Self-Dual Quasi-Cyclic Codes over Fq, q Odd -- Linear Complexity and k-Error Linear Complexity for pn-Periodic Sequences -- HFE and BDDs: A Practical Attempt at Cryptanalysis -- Digital Nets and Coding Theory -- Constructive
Asymptotic Codes with an Improvement on the Tsfasman-Vlá,dut-Zink and Xing Bounds -- Malleability Attacks on Multi-Party Key Agreement Protocols -- Combinatorial Tableaux in Isoperimetry -- On the Error Exponents of
Reliability-Order-Based Decoding Algorithms for Linear Block Codes -- A Construction of Authentication Codes with Secrecy -- Selection Method of Test Patterns in Soft-Input and Output Iterative Bounded Distance Decoding Algorithm --
Deletion Correcting Using Generalised Reed-Solomon Codes -- A Note on the Linear Complexity Profile of the Discrete Logarithm in Finite Fields -- Speeding Up RSA and Elliptic Curve Systems by Choosing Suitable Moduli -- Security
Analysis of Three Oblivious Transfer Protocols -- An Improved Identification Scheme
ISBN:9783034878654
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:Progress in Computer Science and Applied Logic : 23
Keywords: Computer science , Data structures (Computer science) , Coding theory , Combinatorics , Computer Science , Coding and Information Theory , Data Structures, Cryptology and Information Theory , Combinatorics
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2003-9783034880374:ONLINE Show nearby items on shelf
Title:Cryptographic Applications of Analytic Number Theory Complexity Lower Bounds and Pseudorandomness
Author(s):
Date:2003
Size:1 online resource (414 p.)
Note:10.1007/978-3-0348-8037-4
Contents:I Preliminaries -- 1 Basic Notation and Definitions -- 2 Polynomials and Recurrence Sequences -- 3 Exponential Sums -- 4 Distribution and Discrepancy -- 5 Arithmetic Functions -- 6 Lattices and the Hidden Number Problem -- 7
Complexity Theory -- II Approximation and Complexity of the Discrete Logarithm -- 8 Approximation of the Discrete Logarithm Modulop -- 9 Approximation of the Discrete Logarithm Modulop -1 -- 10 Approximation of the Discrete Logarithm
by Boolean Functions -- 11 Approximation of the Discrete Logarithm by Real Polynomials -- III Approximation and Complexity of the Diffie-Hellman Secret Key -- 12 Polynomial Approximation and Arithmetic Complexity of the --
Diffie-Hellman Secret Key -- 13 Boolean Complexity of the Diffie-Hellman Secret Key -- 14 Bit Security of the Diffie-Hellman Secret Key -- IV Other Cryptographic Constructions -- 15 Security Against the Cycling Attack on the RSA and
Timed-release Crypto -- 16 The Insecurity of the Digital Signature Algorithm with Partially Known Nonces -- 17 Distribution of the ElGamal Signature -- 18 Bit Security of the RSA Encryption and the Shamir Message Passing Scheme -- 19
Bit Security of the XTR and LUC Secret Keys -- 20 Bit Security of NTRU -- 21 Distribution of the RSA and Exponential Pairs -- 22 Exponentiation and Inversion with Precomputation -- V Pseudorandom Number Generators -- 23 RSA and
Blum-Blum-Shub Generators -- 24 Naor-Reingold Function -- 25 1/M Generator -- 26 Inversive, Polynomial and Quadratic Exponential Generators -- 27 Subset Sum Generators -- VI Other Applications -- 28 Square-Freeness Testing and Other
Number-Theoretic Problems -- 29 Trade-off Between the Boolean and Arithmetic Depths of ModulopFunctions -- 30 Polynomial Approximation, Permanents and Noisy Exponentiation in Finite Fields -- 31 Special Polynomials and Boolean
Functions -- VII Concluding Remarks and Open Questions
ISBN:9783034880374
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:Progress in Computer Science and Applied Logic : 22
Keywords: Mathematics , Data encryption (Computer science) , Applied mathematics , Engineering mathematics , Number theory , Mathematics , Number Theory , Data Encryption , Applications of Mathematics
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2003-9780387217123:ONLINE Show nearby items on shelf
Title:Beyond Fear Thinking Sensibly About Security in an Uncertain World
Author(s): Bruce Schneier
Date:2003
Size:1 online resource (296 p.)
Note:10.1007/b97547
Contents:Sensible Security -- All Security Involves Trade-offs -- Security Trade-offs Are Subjective -- Security Trade-offs Depend on Power and Agenda -- How Security Works -- Systems and How They Fail -- Knowing the Attackers -- Attackers
Never Change Their Tunes, Just Their Instruments -- Technology Creates Security Imbalances -- Security Is a Weakest-Link Problem -- Brittleness Makes for Bad Security -- Security Revolves Around People -- Detection Works Where
Prevention Fails -- Detection Is Useless Without Response -- Identification, Authentication, and Authorization -- All Countermeasures Have Some Value, But No Countermeasure Is Perfect -- Fighting Terrorism -- The Game of Security --
Negotiating for Security -- Security Demystified
ISBN:9780387217123
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Physics , Data encryption (Computer science) , Coding theory , System safety , Popular works , Medicine , Health , Social work , Physics , Security Science and Technology , Social Work , Popular Science in Medicine and Health , Popular Science, general , Data Encryption , Coding and Information Theory
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2002-9780306471148:ONLINE Show nearby items on shelf
Title:Quantum Communication, Computing, and Measurement 3
Author(s):
Date:2002
Size:1 online resource (476 p.)
Note:10.1007/b114701
Contents:Quantum Information and Quantum Communication -- Additivity/Multiplicativity Communication Channels -- Universal Copying of Coherent States: A Gaussian Cloning Machine -- at]Quantum Random Coding Exponent of a Symmetric State Alphabet
-- Information and Distance in Hilbert Space -- Superadditivity With Mixed Letter States -- Quantum State Recognition -- Superadditivity in Capacity of Quantum Channel by Classical Pseudo-Cyclic Codes -- Property of Mutual Information
for M-ary Quantum-State Signals -- Performances of Binary Block Codes Used on Binary Classical-Quantum Channels -- Quantum Measurement, Decoherence, and Tomography -- Entropy and Information Gain in Quantum Continual Measurements --
Experimental Quantum State Discrimination -- Spontaneous Intrinsic Decoherence in Rabi Oscillations Experiments -- Quantum Tomography, Teleportation, and Cloning -- Decoherence Versus the Idealization of Microsystems as Correlation
Carriers Between Macrosystems -- Quantum Measurement, Information, and Completely Positive Maps -- ON the Number of Elements Needed in a POVM Attaining the Accessible Information -- Einselection and Decoherence from an Information
Theory Perspective -- Reconstructing the Discrete Wigner Function through Complementary Measurements -- Statistical Noise in Measuring Correlated Photon Beams -- Reconstruction Technique for a Trapped Electron -- Quantum Mechanics
without Statistical Postulates -- Quantum Retrodiction -- Quantum-Tomography Method in Information Processing -- Quantum Measurement Problem and State Dual Representations -- Homodyne Characterizations of Active Optical Media --
Quantum Cloning Optimal for Joint Measurements -- How Many Projections are Needed in Quantum Tomography of Spin States? -- Quantum Computing -- The Representation of Numbers by States in Quantum Mechanics -- Towards Quantum Computation
with Trapped Calcium Ions -- Physical Limits to Computation -- Realising Quantum Computing: Physical Systems and Robustness -- Information Analysis of Quantum Gates for Simulation of Quantum Algorithms on Classical Computers -- Quantum
Probabilistic Subroutines and Problems in Number Theory -- Theory of the Quantum Speed Up -- Quantum Gates Using Motional States in an Optical Lattice -- Quantum Error-Correcting Code for Burst Error -- Non-Dissipative Decoherence in
Ion-Trap Quantum Computers -- Optical Qubit Using Linear Elements -- Atom Chips -- Decoherence and Fidelity of Single Qubit Operations in a Solid State Quantum Computer -- Cryptography -- Long Distance Entangled State Quantum Key
Distribution -- Bunching and Antibunching from Single NV Color Centers in Diamond -- Violation of Locality and Self-Checking Source: A Brief Account -- The Unconditional Security of Quantum Key Distribution -- Anonymous-Key Quantum
Cryptography and Unconditionally Secure Quantum Bit Commitment -- Quantum Key Distribution Using Multilevel Encoding -- Authority-Based User Authentication And Quantum Key Distribution -- Improvement of Key Rate for Yuen-Kim
Cryptoscheme -- Stable Solid-State Source of Single Photons -- Entanglement and Teleportation -- Non-Locality and Quantum Theory: New Experimental Evidence -- On Entangled Quantum Capacity -- Control of Squeezed Light Pulse Spectrum in
the Kerr Medium with an Intertial Nonlinearity -- Macroscopic Quantum Superposition by Amplification of Entangled States -- Quantum Teleportation with Atomic Ensembles and Coherent Light -- Entangled State Based on Nonorthogonal State
-- Long-Distance High-Fidelity Teleportation Using Singlet States -- Quantum Teleportation with Complete Bell State Measurement -- Complete Quantum Teleportation with a Crossed-Kerr Nonlinearity -- Quantum Lithography -- Experimental
Test of Local Realism Using Non-Maximally Entangled States -- New Schemes for Manipulating Quantum States with a Kerr Cell -- Local and Nonlocal Properties of Werner States -- Maximally Entangled Mixed States in two Qubits --
Engineering Bell-Like States of Two High-Q Cavity Fields -- Nondissipative Decoherence and Entanglement in the Dynamics of a Trapped Ion -- Entanglement Manipulation and Concentration in Mixed States -- Ramsey Interferometry with a
Single Photon Field in Cavity QED -- Entanglement Transformation At Dielectric Four-Port Devices -- Quantum Noise in Polarization Measurement and Polarization Entanglement -- Bright EPR-Entangled Beams for Quantum Communication --
Polarization in Quantum Optics: A new Formalism and Two Experiments -- Spin Squeezing and Decoherence Limit in Ramsey Spectroscopy -- Teleportation of Entanglement for Continuous Variables -- Generation and Detection of Fock States of
the Radiation Field
ISBN:9780306471148
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Physics , Management information systems , Computer science , Applied mathematics , Engineering mathematics , Quantum physics , Atomic structure , Molecular structure , Spectra , Electrical engineering , Physics , Quantum Physics , Atomic/Molecular Structure and Spectra , Applications of Mathematics , Management of Computing and Information Systems , Electrical Engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2001-9783034882958:ONLINE Show nearby items on shelf
Title:Cryptography and Computational Number Theory
Author(s):
Date:2001
Size:1 online resource (378 p.)
Note:10.1007/978-3-0348-8295-8
Contents:Computational Number Theory -- On the Dimension and the Number of Parameters of a Unirational Variety -- On Elements of High Order in Finite Fields -- Counting the Number of Points on Affine Diagonal Curves -- Small Values of the
Carmichael Function and Cryptographic Applications -- Density Estimates Related to Gauss Periods -- Distribution of the Coefficients of Primitive Polynomials over Finite Fields -- The Distribution of the Quadratic Symbol in Function
Fields and a Faster Mathematical Stream Cipher -- Rational Groups of Elliptic Curves Suitable for Cryptography -- Effective Determination of the Proportion of Split Primes in Number Fields -- Algorithms for Generating, Testing and
Proving Primes: A Survey -- Elliptic Curve Factorization Using a “Partially Oblivious” Function -- The Hermite-Serret Algorithm and 122 + 332 -- Applications of Algebraic Curves to Constructions of Sequences -- Cryptography --
Designated 2-Verifier Proofs and their Application to Electronic Commerce -- Divide and Conquer Attacks on Certain Irregularly Clocked Stream Ciphers -- New Results on the Randomness of Visual Cryptography Schemes -- Authentication —
Myths and Misconceptions -- A Survey of Bit-security and Hard Core Functions -- On the Security of Diffie—Hellman Bits -- Polynomial Rings and Efficient Public Key Authentication II -- Security of Biased Sources for Cryptographic Keys
-- Achieving Optimal Fairness from Biased Coinflips -- The Dark Side of the Hidden Number Problem: Lattice Attacks on DSA -- Distribution of Modular Sums and the Security of the Server Aided Exponentiation -- A General Construction for
Fail-Stop Signatures using Authentication Codes -- Robust Additive Secret Sharing Schemes over Zm -- RSA Public Key Validation
ISBN:9783034882958
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:Progress in Computer Science and Applied Logic : 20
Keywords: Computer science , Data encryption (Computer science) , Number theory , Computer Science , Data Encryption , Number Theory
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2001-9781468404968:ONLINE Show nearby items on shelf
Title:Introduction to Cryptography
Author(s): Johannes A Buchmann
Date:2001
Size:1 online resource (7 p.)
Note:10.1007/978-1-4684-0496-8
Contents:1 Integers -- 1.1 Basics -- 1.2 Divisibility -- 1.3 Representation of Integers -- 1.4 O- and ?-Notation -- 1.5 Cost of Addition, Multiplication, and Division with Remainder -- 1.6 Polynomial Time -- 1.7 Greatest Common Divisor -- 1.8
Euclidean Algorithm -- 1.9 Extended Euclidean Algorithm -- 1.10 Analysis of the Extended Euclidean Algorithm -- 1.11 Factoring into Primes -- 1.12 Exercises -- 2 Congruences and Residue Class Rings -- 2.1 Congruences -- 2.2 Semigroups
-- 2.3 Groups -- 2.4 Residue Class Rings -- 2.5 Fields -- 2.6 Division in the Residue Class Ring -- 2.7 Analysis of Operations in the Residue Class Ring -- 2.8 Multiplicative Group of Residues -- 2.9 Order of Group Elements -- 2.10
Subgroups -- 2.11 Fermat’s Little Theorem -- 2.12 Fast Exponentiation -- 2.13 Fast Evaluation of Power Products -- 2.14 Computation of Element Orders -- 2.15 The Chinese Remainder Theorem -- 2.16 Decomposition of the Residue Class Ring
-- 2.17 A Formula for the Euler ?-Function -- 2.18 Polynomials -- 2.19 Polynomials over Fields -- 2.20 Structure of the Unit Group of Finite Fields -- 2.21 Structure of the Multiplicative Group of Residues mod a Prime Number -- 2.22
Exercises -- 3 Encryption -- 3.1 Encryption Schemes -- 3.2 Symmetric and Asymmetric Cryptosystems -- 3.3 Cryptanalysis -- 3.4 Alphabets and Words -- 3.5 Permutations -- 3.6 Block Ciphers -- 3.7 Multiple Encryption -- 3.8 Use of Block
Ciphers -- 3.9 Stream Ciphers -- 3.10 Affine Cipher -- 3.11 Matrices and Linear Maps -- 3.12 Affine Linear Block Ciphers -- 3.13 Vigenère, Hill, and Permutation Ciphers -- 3.14 Cryptanalysis of Affine Linear Block Ciphers -- 3.15
Exercises -- 4 Probability and Perfect Secrecy -- 4.1 Probability -- 4.2 Conditional Probability -- 4.3 Birthday Paradox -- 4.4 Perfect Secrecy -- 4.5 Vernam One-Time Pad -- 4.6 Random Numbers -- 4.7 Pseudorandom Numbers -- 4.8
Exercises -- 5 DES -- 5.1 Feistel Ciphers -- 5.2 DES Algorithm -- 5.3 An Example -- 5.4 Security of DES -- 5.5 Exercises -- 6 Prime Number Generation -- 6.1 Trial Division -- 6.2 Fermat Test -- 6.3 Carmichael Numbers -- 6.4
Miller-Rabin Test -- 6.5 Random Primes -- 6.6 Exercises -- 7 Public-Key Encryption -- 7.1 Idea -- 7.2 RSA Cryptosystem -- 7.3 Rabin Encryption -- 7.4 Diffie-Hellman Key Exchange -- 7.5 ElGamal Encryption -- 7.6 Exercises -- 8 Factoring
-- 8.1 Trial Division -- 8.2 p — 1 Method -- 8.3 Quadratic Sieve -- 8.4 Analysis of the Quadratic Sieve -- 8.5 Efficiency of Other Factoring Algorithms -- 8.6 Exercises -- 9 Discrete Logarithms -- 9.1 DL Problem -- 9.2 Enumeration --
9.3 Shanks Baby-Step Giant-Step Algorithm -- 9.4 Pollard ?-Algorithm -- 9.5 Pohlig-Hellman Algorithm -- 9.6 Index Calculus -- 9.7 Other Algorithms -- 9.8 Generalization of the Index Calculus Algorithm -- 9.9 Exercises -- 10
Cryptographic Hash Functions -- 10.1 Hash Functions and Compression Functions -- 10.2 Birthday Attack -- 10.3 Compression Functions from Encryption Functions -- 10.4 Hash Functions from Compression Functions -- 10.5 Efficient Hash
Functions -- 10.6 An Arithmetic Compression Function -- 10.7 Message Authentication Codes -- 10.8 Exercises -- 11 Digital Signatures -- 11.1 Idea -- 11.2 RSA Signatures -- 11.3 Signatures from Public-Key Systems -- 11.4 ElGamal
Signature -- 11.5 Digital Signature Algorithm (DSA) -- 11.6 Exercises -- 12 Other Groups -- 12.1 Finite Fields -- 12.2 Elliptic Curves -- 12.3 Quadratic Forms -- 12.4 Exercises -- 13 Identification -- 13.1 Passwords -- 13.2 One-Time
Passwords -- 13.3 Challenge-Response Identification -- 13.4 Exercises -- 14 Public-Key Infrastructures -- 14.1 Personal Security Environments -- 14.2 Certification Authorities -- 14.3 Certificate Chains -- References -- Solutions to
the Exercises
ISBN:9781468404968
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Mathematics , Data structures (Computer science) , Number theory , Mathematics , Number Theory , Data Structures, Cryptology and Information Theory
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-2000-9781461207771:ONLINE Show nearby items on shelf
Title:Essays on the Future In Honor of Nick Metropolis
Author(s):
Date:2000
Size:1 online resource (276 p.)
Note:10.1007/978-1-4612-0777-1
Contents:I. The Future of Nuclear Power -- II. The Nature of Informational Modeling -- III. Long Time, No See Categorization in Information Science -- IV. The Once and Future Role for Approximate Calculations -- V. Possible Future Trends in
Relativity -- VI. The Future of Libraries -- VII. The Future of Physics Information Hiding -- VIII. The Monte Carlo Method in Mathematical Finance -- IX. A Future Basis for National Security and International Policy Fresh Water -- X.
On the Future of Combinatorics -- XI. Apocalypticism, One-Time Events, and Scientific Rationality -- XII. The Future of Russian Science and Technology Some Personal Impressions -- XIII. The Future of Differential Equations -- XIV. The
Future of Quantum Theory of Angular Momentum Discrete Mathematics and Combinatorics -- XV. Cancer and the Future -- XVI. Cancer Treatment with Nuclear Particles -- XVII. On Pure and Applied Mathematics -- XVIII. The ‘Legion of Science’
Another Way of Exploiting Computer Technology for Scientific Discovery -- XIX. Future Issues in Philosophy -- XX. The Enjoyment of Surprises -- XXI. The Future of Western Civilization -- XXII. Mathematical Sciences and The New Biology
ISBN:9781461207771
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Physics , Mathematics , History , Nuclear physics , Heavy ions , Hadrons , Physics , History and Philosophical Foundations of Physics , History of Mathematical Sciences , Nuclear Physics, Heavy Ions, Hadrons , Physics, general
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1996-9781461313199:ONLINE Show nearby items on shelf
Title:Fuzzy Databases Principles and Applications
Author(s): Frederick E Petry
Date:1996
Size:1 online resource (226 p.)
Note:10.1007/978-1-4613-1319-9
Contents:1 Database Fundamentals -- Database Principles -- Database Design -- Database Models -- Imprecision in Conventional Databases -- References -- 2 Relational Databases and Fuzzy Sets Background -- Relational Database Concepts -- Fuzzy
Set Theory -- References -- 3 Similarity-Based Models -- Basic Fuzzy Databases Approaches -- Similarity-Based Models -- Proximity-Based Models -- Distinguishability Data Model -- Querying Fuzzy Relational Databases -- Fuzzy Functional
Dependencies -- Information-Theoretic Measures -- Fuzzy Database Security -- References -- 4 Possibility-Based Models -- Weighted Tuples -- Possibility-Based Fuzzy Relational Databases -- Query Languages -- Related Database Issues --
Implementation Issues -- References -- 5 Alternative Database Models and Approaches -- Entity-Relationship Models -- Network Data Models -- Object-Oriented Models -- Rough Sets Approach -- Geographical Information Systems -- References
-- 6 Commerical and Industrial Applications -- Fuzzy Querying Front End Interfaces -- Special Purpose Systems -- Commerically Available Products -- Summary -- References
ISBN:9781461313199
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:International Series in Intelligent Technologies: 5
Keywords: Mathematics , Data structures (Computer science) , Artificial intelligence , Mathematical logic , Mathematics , Mathematical Logic and Foundations , Data Structures, Cryptology and Information Theory , Artificial Intelligence (incl. Robotics)
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1994-9783642792939:ONLINE Show nearby items on shelf
Title:Computer Simulation Studies in Condensed-Matter Physics VII Proceedings of the Seventh Workshop Athens, GA, USA, 28 February – 4 March 1994
Author(s):
Date:1994
Size:1 online resource (233 p.)
Note:10.1007/978-3-642-79293-9
Contents:Computer Simulation Studies in Condensed-Matter Physics: An Introduction -- I Classical Systems -- Complexity in Rayleigh-Bénard Convection -- Numerical Zero-Temperature Results for the 3d Edwards-Anderson Ising Spin Glass -- Recent
Developments in Monte-Carlo Simulations of First-Order Phase Transitions -- Statistical Dependence and Related Topics -- Dynamical Scaling of the Island-Size Distribution and Percolation in Submonolayer Molecular Beam Epitaxy --
Computer Simulation of the Structure Factor -- II Quantum Systems -- The DensityrMatrix Renormalization Group for Fermion Systems -- Simulation of the Electron-Phonon Interaction in Infinite Dimensions -- Excitation Spectra in the 1-D
Hubbard Model from Quantum-Monte-Carlo Simulations -- Simulating 2d Fermions in Strong Magnetic Fields -- III Computer Security -- Computer Security in Scientific and Administrative Environments -- IV Contributed Papers -- Monte Carlo
with Absorbing Markov Chains: A Faster Monte-Carlo Algorithm for Dynamical Studies -- Non-Arrhenius Conductivity in a Driven System of Interacting Lattice Gas -- Non-Equilibrium Steady States of Ising Systems -- Fourier-Accelerated
Polymer Dynamics -- A Multicanonical Study of Non-Polar Amino Acids -- Classical and Quantum Two-Dimensional Fluids in the Gibbs Ensemble -- Optimization by Multicanonical Annealing and the Traveling-Salesman Problem -- Numerical
Studies of Metastability in Ising Systems: Short-Range versus Long-Range Interactions -- Study of Frustrated Systems via Dissipative Maps -- Representation of Relaxation Phenomena by Lattice-Gas Models -- Some Monte-Carlo Studies of
the Ising Model -- Decoupled-Cell Quantum Monte Carlo: How Should We Calculate the Energy? -- Computer Study of a d = 2 Mixed Ising Ferrimagnet -- Computational Studies of Organolithium Compounds -- Index of Contributors
ISBN:9783642792939
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:Springer Proceedings in Physics: 78
Keywords: Physics , Physical chemistry , Quantum physics , Condensed matter , Quantum computers , Spintronics , Physics , Condensed Matter Physics , Mathematical Methods in Physics , Numerical and Computational Physics , Quantum Information Technology, Spintronics , Quantum Physics , Physical Chemistry
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1986-9783642468902:ONLINE Show nearby items on shelf
Title:COMPSTAT Proceedings in Computational Statistics, 7th Symposium held in Rome 1986
Author(s):
Date:1986
Size:1 online resource (513 p.)
Note:10.1007/978-3-642-46890-2
Contents:1. Information Science and Statistics -- Information Science and Statistics -- Catastrophe Theory as a Tool for Statistical Analysis of Systems -- New Procedures for Generating Optimal Experimental Designs -- 2. Probabilistic Models
in Exploratory Data Analysis -- Some Guidelines for Principal Component Analysis -- Comparison of Least Squares with Least Absolute Deviation Forecasting Using Simulation Techniques -- Modeling the Reliability of Fault-Tolerant
Software Systems -- Computerized Exploratory Screening of Large-Dimensional Contingency Tables -- A Fast Algorithm for Some Exploratory Methods in Categorical Data Problems -- Easy to Generate Metrics for Use with Sampled Functions --
3. Computational Approach of Inference -- Sequential Inference Processes in Computational Aspects -- Variance Components as a Method for Routine Regression Analysis of Survey Data -- On the Assessment of Case Influence in Generalized
Linear Models -- 4. Numerical Aspects of Statistical Computations -- Algoritmic Development in Variable Selection Procedures -- Linear Models of Categorical Variables -- A Fast Algorithm for Curve Fitting -- Generalized Multiplicative
Models -- A Convenient Way of Computing ML-Estimates: Use of Automatic Differentiation -- On the Numerical Solutions of Bounded Influence Regression Problems -- Testing of Statistical Algorithms and Programs with the Help of the
Multivariate Sample, Having Described Values of Empirical Parameters -- 5. Three-Mode Data Matrices -- Analysis of Three-Way Data Matrices Based on Pairwise Relation Measures -- Factor Analysis of Evolution and Cluster Methods on
Trajectories -- 6. Cluster Analysis Methods and Algorithms -- Links Between Clustering and Assignment Procedures -- Identification of Linear Regression Models by a Clustering Algorithm -- Validity Tests in Cluster Analysis Using a
Probabilistic Teacher Algorithm -- New Kinds of Graphical Representation in Clustering -- Projection of an Acute Symmetrical Simplicial Closed Convex Cone and its Application to Star Graphs -- Design of a Command Language for
Interactive or Batch Use in a Statistical Package -- Cross Association Measures and Optimal Clustering -- 7. Robustness in Multivariate Analysis -- Multivariate Data Analysis, Contributions and Shortcomings of Robustness in Practice --
On the Use of Bootstrap and Jackknife in Covariance Structure Analysis -- On a Class of Robust Methods for Multivariate Data Analysis -- Robust Recursive Estimation and Detection of Shifts in Regression -- How Robust is One Way Anova
with Respect to within Group Correlation -- Algorithms for the Beta Distribution Function -- 8. Computer Graphics and Data Presentation -- An Interactive Graphic System for Designing and Accessing Statistical Data Bases -- Non-Standard
Graphical Presentation -- Computer Graphics and Data Presentation, a First Step Toward a Cognitive and Ergonomic Analysis -- 9. Expert Systems -- Expert Systems and Data Analysis Package Management -- Developing Intelligent Software
for Non-Linear Model Fitting as an Expert System -- Express — An Expert System Utilizing Standard Statistical Packages -- Muse: An Expert System in Statistics -- Building Expert Systems with the Help of Existing Statistical Software:
An Example -- Statistical Data Validation and Expert Systems -- Knowledge Base Supported Analysis of Longitudinal Data -- How to Assist an Inexperienced User in the Preliminary Analysis of Time Series: First Version of the Estes Expert
System -- Object-Oriented Data Representations for Statistical Data Analysis -- 10. Statistical Software -- Algorithms for the Beta Distribution Function -- Interactive User-Friendly Package for Design and Analysis of Experiments --
NL: A Statistical Package for General Nonlinear Regression Problems -- Statistical Software for Personal Computers -- Recursive Techniques in Statistical Programming -- Design Criteria for a Flexible Statistical Language -- Statistical
Software SAM — Sensitivity Analysis in Multivariate Methods -- 11. Data Handling and Computational Methods of Clinical Trials -- Data Handling and Computational Methods in Clinical Trials -- Database Assisted Conduct of Clinical Trials
-- An APL-System for Analysing Multivariate Data -- AMS — A Computer Program for Survival Analysis, General Linear Models and a Stochastic Survival Model -- 12. Econometric Computing -- A Multilingual Specification System for
Statistical Software -- An Efficient Algorithm for Time Series Decomposition -- 13. Statistical Data Base Management Systems -- Database Management and Statistical Data Analysis: The Need for Integration and for Becoming More
Intelligent -- Privacy, Informatics and Statistics -- Italian Statistical Data Dictionary System Prototype Developed with a 4th Generation Language -- A Methodology for Conceptual Design of Statistical Databases -- Towards Natural
Integration of Database Management System and Statistical Software -- Easy-Link: An Expert Natural Language Interface to a Statistical Data Bank -- Farandole: A RDBMS for Statistical Data Analysis -- Model- and Method Banks (MMB) as a
Supplement to Statistical Data Banks -- A Security Mechanism Based on Uniform Rounding to prevent Tracker Techniques -- 14. Teaching of Computational Statistics -- A Data Analysis Course in a Computer Science Faculty -- Teaching
Computational Statistics on Workstations -- Teaching Regression Analysis Using MIMOSA — an Interactive Computer System for Matrix Calculus -- Late Arrivals -- Practical Use of Color Imagin in Automatic Classification -- Algorithm and
Software of Multivariate Statistical Analysis of Heterogeneous Data -- Adress-List of Authors
ISBN:9783642468902
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Statistics , Business , Management science , Operations research , Decision making , Business mathematics , Statistics , Statistics for Business/Economics/Mathematical Finance/Insurance , Business Mathematics , Operation Research/Decision Theory , Business and Management, general
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1983-9781461337546:ONLINE Show nearby items on shelf
Title:Advances in Fuzzy Sets, Possibility Theory, and Applications
Author(s):
Date:1983
Size:1 online resource (422 p.)
Note:10.1007/978-1-4613-3754-6
Contents:Fuzzy Set Theory: Past, Present and Future -- Advances in Fuzzy Sets — An Overview -- A Survey of Some Aspects on the Research Work of Fuzzy Topology in China -- Some Properties of Fuzzy Convex Sets -- “Non-standard” Concepts in Fuzzy
Topology -- The Spaces of Fuzzy Probability and Possibility -- An Algebraic System Generalizing the Fuzzy Subsets of a Set -- From the Fuzzy Statistics to the Falling Random Subsets -- On Fuzzy Relations and Partitions -- Fuzzy Set
Structure with Strong Implication -- Inference Regions for Fuzzy Propositions -- Fuzzy Tree Grammar and Fuzzy Forest Grammar -- Fuzzy Production Rules: A Learning Methodology -- Decision Support with Fuzzy Production Systems --
Imprecision in Computer Vision -- Fuzzy Programming: Why and How? — Some Hints and Examples -- A Fuzzy, Heuristic, Interactive Approach to the Optimal Network Problem -- Application of Fuzzy Set Theory to Economics -- Use of Fuzzy
Logic for Implementing Rule-Based Control of Industrial Processes -- A New Approach to Design of Fuzzy Controller -- Advanced Results on Applications of Fuzzy Switching Functions to Hazard Detection -- The Application of Fuzzy Set
Theory to a Risk Analysis Model of Computer Security -- Fuzzy Models of Human Problem Solving -- A Concept of A Fuzzy Ideal for Multicriteria Conflict Resolution -- Appendix I: Fuzzy Set Research in People’s Republic of China -- Author
Index
ISBN:9781461337546
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Keywords: Mathematics , Mathematical logic , Mathematics , Mathematical Logic and Foundations
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1982-9789400977723:ONLINE Show nearby items on shelf
Title:Pattern Recognition Theory and Applications Proceedings of the NATO Advanced Study Institute held at St. Anne’s College, Oxford, March 29–April 10, 1981
Author(s):
Date:1982
Size:1 online resource (576 p.)
Note:10.1007/978-94-009-7772-3
Contents:Section 1 Pattern Recognition Methodology -- Advances in Nonparametric Techniques of Statistical Pattern Classification -- Statistical Pattern Recognition of Binary Variables -- On the Haar Condition in Algorithms for the Optimal
Solution of Linear Inequalities -- Pattern Class Representation Related to the Karhunen-Loeve Expansion -- Sample Size Sensitive Entropy -- An Optimal Clustering Method Based on the Rasson’s Criterion and Resulting from a New Approach
-- Computational Geometric Problems in Pattern Recognition -- A Coding Approach to Pattern Recognition -- Fuzzy Set Theoretic Approach: A Tool for Speech and Image Recognition -- Syntactic Methods in Pattern Recognition -- Hybrid
Approaches to Pattern Recognition -- Pattern Recognition of Relational Structures -- Hybrid Pattern Recognition: A Synthesis of the Numerical and Qualitative Approaches -- Fusion of Multisensor Data in Pattern Recognition -- Section 2
Image Understanding and Interpretation -- Artificial Intelligence Approaches to Image Understanding -- Summary of the DARPA Image Understanding Research Program -- Three-Dimensional Object Representation -- Automatic Interpretation of
Lines and Text in Circuit Diagrams -- A Modular System for Interpreting Binary Pixel Representations of Line-Structured Data -- Recognition of Time Varying Patterns in Image Sequences -- Section 3 Medical Applications -- Application of
Statistical and Syntactical Methods of Analysis and Classification to Chromosome Data -- Attributes for Pattern Recognition Selected by Stepwise Data Compression Supervised by Visual Classification -- Application of Pattern Recognition
to Knowledge System Design and Diagnostic Inference -- Applications of Interactive Pattern Recognition -- An Electrocardiographic Signal Understanding System -- Segmentation-Based Boundary Extraction for Endocardial Definition in
Cross-Sectional Echocardiography -- Computerised Anatomy Atlas of the Human Brain -- Section 4 Speech Processing and Other Applications -- Decision Theoretic and Structural Pattern Recognition Methods in Speech Processing -- Pattern
Recognition and Machine Intelligence Techniques for Electric Power System Security Assessment -- A Multi-Microcomputer Based Reading Machine for the Blind -- Decision-Set Concept with Application to the Recognition of Hand-Printed
Numeric Characters -- On the Development of a Model for Determining the Frequency of Occurrence of English Language Words -- Section 5 Panel Discussion -- Summary of Panel Discussion on Decision Theoretic Methods -- Author Index
ISBN:9789400977723
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:NATO Advanced Study Institutes Series, Series C — Mathematical and Physical Sciences: 81
Keywords: Computer science , Coding theory , Artificial intelligence , Computer graphics , Computer Science , Artificial Intelligence (incl. Robotics) , Computer Imaging, Vision, Pattern Recognition and Graphics , Coding and Information Theory
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1982-9789400977600:ONLINE Show nearby items on shelf
Title:New Advances in Distributed Computer Systems Proceedings of the NATO Advanced Study Institute held at Bonas,France, June 15–26, 1981
Author(s):
Date:1982
Size:1 online resource (415 p.)
Note:10.1007/978-94-009-7760-0
Contents:1. Network Development -- Introductory Survey -- Data Communication in Israel — Present and Future -- Datanet 1 of the Netherlands’ PTT -- of Radio-based Air/Ground Data Links into the SITA Network -- Presentation of the NADIR
Pilot-Project -- AUTOFLOOD — A Flexible Test System for Packet Switched Networks -- Integrated Non-voice Services in the Electronic Office -- 2. Network Design -- Open System Interconnection and the Integrated Services Digital Network
-- Design Issues for High Speed Local Network Protocols -- Directory Systems for Computer Mail in Internetworking Environments -- Modeling and Verification of End-to-End Protocols -- Why Usual Transmission Protocols are not appropriate
for High Speed Satellite Transmission -- 3. Local Area Networks -- RESER, A Local Area Network Using a Fiber-Optic Ring -- SESNET — Local Area Networks for Software Engineering Development -- The Interconnection of Local Area Networks
via a Satellite Network -- Report on the Local Area Networks FFM-MCS and MICON -- The Cambridge Ring -- Distributed System Activities at the Institute of Cybernetics of the University of Milan -- 4. Mathematical Development -- An
Introduction to a Calculus of Communicating Systems -- Modelling of Distributed Computing Systems -- 5. Security and Encryption -- Data Security in Distributed Computing Systems -- The Data Encryption Standard and its Modes of Use --
Standardisation and Implementation of Data Encryption -- Public Key Cryptosystems, Authentication and Signatures -- 6. Parallel Computing Architecture -- Synchronization of Concurrent Processes without Globality Assumptions -- Parallel
Processing Architecture and Parallel Algorithms -- Parallel Non-Linear Algorithms -- Microcomputer Networks for Process Control -- List of Participants
ISBN:9789400977600
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:Nato Advanced Study Institutes Series, Series C - Mathematical and Physical Sciences: 80
Keywords: Engineering , Automotive engineering , Engineering , Automotive Engineering
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1979-9789400994317:ONLINE Show nearby items on shelf
Title:Interlinking of Computer Networks Proceedings of the NATO Advanced Study Institute held at Bonas, France, August 28 – September 8, 1978
Author(s):
Date:1979
Size:1 online resource (475 p.)
Note:10.1007/978-94-009-9431-7
Contents:1 International Networking -- Some international Developments in Data Services -- Trends in European Network Developments -- Organization and Technical Problems of the European Informatics Network -- Satellite Communications Systems
and the European Project STELLA -- 2 Network Planning -- U.K. Post Office Current and Future Plans -- Current CCITT Standards -- Protocols Standardization versus Protocols Conversion in Computer Networks Interconnection -- EPSS
Developments -- Users’ View of a National Network -- Transfer of Cyclades Applications towards TRANSPAC Network -- 3 Network Design -- On Interconnection of Computer Networks -- A Model for Inter-process Communication -- Cryptography
and Crypto-Systems -- Protocol Design Considerations for Network Security -- Protocols and Network Interconnection -- Experience from Two Forms of Inter-network Connection -- 4 Network Application -- DARPA Activities in Packet Network
Interconnection -- Defense Packet Switching Networks in the United States -- Canadian Public-switched Data Networks — Infoswitch and Datapac -- The U.K. S.R.C. Computer Network -- The British Steel Corporation Network -- Networking
among U.K. Universities -- The North-West Universities Network -- 5 Network Management -- Message Services in Computer Networks -- Congestion Control in Hierarchical Networks -- Operation of the CYCLADES Network -- Some Service Aspects
of the X25 Interface -- Flow Control in the GMD Network -- List of Participants -- Index of Names
ISBN:9789400994317
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:NATO Advanced Study Institutes Series, Series C - Mathematical and Physical Sciences: 42
Keywords: Computer science , Microprocessors , Computer Science , Processor Architectures
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:SPRINGER-1977-9789401012263:ONLINE Show nearby items on shelf
Title:Computer Architecture Proceedings of the NATO Advanced Study Institute held in St. Raphael, France, 12–24 September, 1976
Author(s):
Date:1977
Size:1 online resource (293 p.)
Note:10.1007/978-94-010-1226-3
Contents:What Have we Learned from the PDP-11? -- Structured Design -- Security in Networks -- Modelling as a Tool of Network Design -- to Packet Switching -- Influence of High-Level Languages on Computer Architecture -- Specification and
Evaluation of Computer Structures -- Associative Processing of Non-Numerical Information -- to Associative Processors -- An Assessment of the MU5 Computer System -- Problem-/Language-Orientated Architecture
ISBN:9789401012263
Series:eBooks
Series:SpringerLink (Online service)
Series:Springer eBooks
Series:NATO Advanced Study Institutes Series, Series C - Mathematical and Physical Sciences: 32
Keywords: Computer science , Microprocessors , Computer Science , Processor Architectures
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Full Text:Click here
Location: ONLINE

Cover
Image
Call number:QA76.9.MW6P65::2015 Show nearby items on shelf
Title:Windows 10: the missing manual
Author(s): David Pogue
Date:2015
Publisher:O'Reilly
Size:673 p
Contents:The Windows desktop. Desktop & start menu File explorer, taskbar & action center Organizing & finding your files Redesigning the desktop Cortana, your voice assistant -- The programs of Windows 10. Programs & documents Settings & control panel The windows starter apps -- Windows online. Getting online The Edge browser Mail Security & privacy -- Hardware and peripherals. Tablets, laptops & hybrids Printing, fonts & PDFs Hardware & drivers Maintenance, speed & troubleshooting Backups & fi le history The disk chapter -- The Windows network. Accounts (and logging on) Setting up a small network Sharing files on the network -- Appendixes. Appendix A. Installing & upgrading to Windows 10 Appendix B. Where'd it go? Appendix C. Master list o f keyboard shortcuts & gestures.
ISBN:9781491947173
Keywords: Microsoft Windows (Computer file) , Operating systems (Computers)
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: MAIN

Cover
Image
Call number:QA76.9.D314C64::2011 Show nearby items on shelf
Title:Expert Oracle and Java security : programming secure Oracle database applications with Java
Author(s): David. Coffin
Date:2011
Publisher:New York : Apress
Size:442 p
Contents:Oracle Database Security, Secure Java Development Concepts, Java Stored Procedures, Adding Public Key Encryption, Adding Secret Password Encryption, A Working Model for Data Encryption in Transit, Implementing Single Sign On, Implementing Two-Factor Authentication, Application Identification and Authorization, Enhancing Our Security, Administration of This Security System
ISBN:9781430238317
Keywords: Database security. , Java (Computer program language) , Data encryption (Computer science) , Data protection
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: MAIN

Cover Image
Call number:QA76.9.A25S368::2006 Show nearby items on shelf
Title:Secure Coding in C and C++
Author(s): Robert C. Seacord
Date:2006
Publisher:Addison-Wesley
Note:A CERT Book
ISBN:0321335724
Series:SEI Series in Software Engineering
Keywords: Computer Security , C (Computer Program Language) , C++ (Compputer Program Language)
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
Location: MAIN

Cover Image This book is only available through interlibrary loan. (email library@fnal.gov if you would like this title added to the Library collection.)
Call number:QA76.9.A25S35::1994 Show nearby items on shelf
Title:Applied cryptography : protocols, algorithms, and source code in C
Author(s): Bruce Schneier 1963-
Date:1994
Publisher:Wiley, New York
Size:618
ISBN:0471597562
Keywords: Computer security.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
Location: ILL

Cover Image
Call number:QA76.9.A25R8::1991 Show nearby items on shelf
Title:Computer security basics
Author(s): Deborah Russel
G.T. Gongemi
Date:1991
Publisher:O'Reilly & Associates, Sebastopol, Ca
Size:441
ISBN:0937175714
Keywords: Computer security.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
Location: MAIN

Cover Image
Call number:QA76.9.A25K65::1994 Show nearby items on shelf
Title:Secrets of a super hacker
Author(s): Knightmare
Date:1994
Publisher:Loompanics Unlimited, Port Townsend, Wash
Size:205
ISBN:1559501065
Keywords: Computer security.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
Location: MAIN

Cover Image This book is only available through interlibrary loan. (email library@fnal.gov if you would like this title added to the Library collection.)
Call number:QA76.9.A25I5415::1994 Show nearby items on shelf
Title:Information security : an integrated collection of essays
Author(s): Marshall D. Abrams
Date:1994
Publisher:IEEE Computer Society Press, Los Aamitos, Calif
ISBN:0818636629
Keywords: Computer security.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
Location: ILL

Cover
Image
Call number:QA76.76.O63P63::2011 Show nearby items on shelf
Title:MAC OS X Lion : the missing manual
Author(s): David Pogue
Date:2011
Publisher:Sebastopol, CA : Pogue Press/O'Reilly
Size:909p.
Contents:Chapter 0. The New Lion Landscape, Chapter 1. Folders and Windows, Chapter 2. Organizing Your Stuff, Chapter 3. Spotlight, Chapter 4. Dock, Desktop and Toolbars, Chapter 5. Documents, Programs, and Mission Control, Chapter 6. Entering Data, Moving Data and Time Machine, Chapter 7. Services, Automator and AppleScript, Chapter 8. Windows on Macintosh, Chapter 9. System Prefrences, Chapter 10. The Free Programs, Chapter 11. CDs, DVDs and iTunes
Chapter 12. Accounts, Parental Controls and Security, Chapter 13. Networking, File Sharing and AirDrop, Chapter 14. Printing, Scanning, Fonts and Graphics, Chapter 15. Sound, Movies and Speech, Chapter 16. The Unix Crash Course, Chapter 17. Internet Setup and iCloud, Chapter 18. Mail and Contacts, Chapter 19. Safari, Chapter 20. iChat, Chapter 21. SSH, FTP, VPN and Web Sharing
ISBN:9781449397494
Series:Missing manual
Keywords: Operating systems (Computers) , Macintosh (Computer) Programming
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: MAIN

Cover
Image
Call number:QA76.73.S67F49::2009 Show nearby items on shelf
Title:Oracle PL/SQL programming
Author(s): Steven Feuerstein
Bill Pribyl
Date:2009
Edition:5th ed.
Publisher:Sebastopol, CA : O'Reilly
Size:1186 p
Contents:Introduction to PL/SQL -- Creating and running PL/SQL code -- Language fundamentals -- Conditional and sequential control -- Iterative processing with loops -- Exception handlers -- Working with program data -- Strings -- Numbers -- Dates and timest amps -- Records -- Collections -- Miscellaneous datatypes -- DML and transaction management -- Data retrieval -- Dynamic SQL and dynamic PL/SQL -- Procedures, functions, and parameters -- Packages -- Triggers -- Managing PL/SQL code -- Optimizing PL/SQL p erformance -- I/O and PL/SQL -- Application security and PL/SQL -- PL/SQL architecture -- Globalization and localization in PL/SQL -- Object-oriented aspects of PL/SQL.
ISBN:9780596514464
Keywords: PL/SQL (Computer program language) , Oracle (Computer file) , Relational databases.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: MAIN

Cover
Image
Call number:QA76.73.P22.T38::2013 Show nearby items on shelf
Title:Programming PHP
Author(s): Kevin. Tatroe
Rasmus Lerdorf
Peter MacIntyre
Date:2013
Edition:3rd ed
Publisher:Sebastopol, CA : O'Reilly Media
Size:514 p
Contents:Introduction to PHP, Language Basics, Functions, Strings, Arrays, Objects, Web Techniques, Databases, Graphics, PDF, XML, Security, Application Techniques, Extending PHP, PHP on Windows
ISBN:9781449392772
Keywords: PHP (Computer program language)
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: MAIN

Cover Image
Call number:QA76.73.C154P82::2006 Show nearby items on shelf
Title:Professional C# 2005
Author(s): Christian Nagel
Date:2006
Publisher:Wiley
Contents:PART I: THE C# LANGUAGE. 1. .NET Architecture. 2. C# Basics. 3. Objects and Types. 4. Inheritance. 5. Operators and Casts. 6. Delegates and Events. 7. Memory Management and Pointers. 8. Strings and Regular Expressions. 9. Collections. 10. Generics. 11. Reflection. 12. Errors and Exceptions. 13. Threading. PART II: THE .NET ENVIRONMENT. 14. Visual Studio 2005. 15. Assemblies. 16. .NET Security. 17. Localization. 18. Deployment. PART III: DATA. 19. Data Access with .NET. 20. .NET Programming with SQL Server 2005. 21. Manipulating XML. 22. Working with Active Directory. PART IV: WINDOWS APPLICATIONS. 23. Windows Forms. 24. Viewing .NET Data. 25. Graphics with GDI+. PART V: WEB APPPLICATIONS. 26. ASP.NET Pages. 27. ASP.NET Development. PART VI: COMMUNICATIONJ. 28. Web Services. 29. .NET Remoting. 30. Enterprise Services. 31. Message Queueing. 32. Future of Distributed Programming. PART VII: INTEROP. 33. COM Interoperability. PART VIII: WINDOWS BASE SERVICES. 34. Manipulating Files and the Registry. 35. Accessing the Internet. 36. Windows Services
ISBN:0764575341
Series:Wrox professional guides
Keywords: C sharp (Computer program language)
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
Location: MAIN

Cover Image
Call number:QA76.5915.P47::2003 Show nearby items on shelf
Title:Pervasive computing The mobile world
Author(s): Uwe Hansmann
Date:2003
Edition:2nd
Publisher:Berlin : Springer
Size:448 p.
Contents:Part I: What Pervasive Computing is all about - Introduction - Part II: Pervasive Components - Pervasive Devices - Pervasive Operating Systems - Pervasive Java - Pervasive Middleware - Pervasive Security - Part III: Connecting the Pervasive World - Internet Protocols and Formats - Wireless Application Protocol - Pervasive Connectivity - Pervasive Service Discovery - Part IV: Back-end Server Infrastructure - Application Servers - Gateways and Proxies - Application and Device Management - Content Adap tation and Synchronization - Part V: New Services in the Pervasive Space - Pervasive Portals - Networked Home - e-Finance - e-Travel - Security Services - Part VI: Pervasive Computing at Work - Part VII: Appendixes - Useful Web Sites - Bibliography - Glos sary - Index
ISBN:3540002189
Series:Springer professional computing
Keywords: Ubiquitous computing. , Mobile computing. , Embedded computer systems.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
Location: MAIN

Cover
Image
Call number:HM846.S362::2015 Show nearby items on shelf
Title:Data and Goliath The hidden battles to collect your data and control your world
Author(s): Bruce Schneier
ISBN:9780393244816
Keywords: Electronic surveillance Social aspects. , Information technology Social aspects. , Computer security. , Privacy, Right of. , Social control.
Availability:Click here to see Library holdings or inquire at Circ Desk (x3401)
Click to reserve this book Be sure to include your ID please.
More info:Amazon.com
More info: Barnes and Noble
Location: SUGGESTIONS (email library@fnal.gov if you would like this title added to the Library collection.)

Return to the Fermilab Library catalog