Mathematical Logic Products

  • Electromagnetic Compatibility

    Methods, Analysis, Circuits, and Measurement, Third Edition

    By David A. Weston

    This book provides basic theory of Electromagnetic Compatibility using simple equations expressed as magnitudes with worked examples. Applications and examples are described simply with numerous sketches and are useful for non specialist electronic engineers and technicians. EMC/EMI analysis,…

    Hardback – 2016-08-17 
    CRC Press

  • Introduction to Information Theory and Data Compression, Third Edition

    By Peter D. Johnson, Jr.

    This unique text imparts the fundamentals of both information theory and data compression. Although the two topics are related, this text allows either topic to be presented independently and the data compression section requires no previous knowledge of information theory. The treatment of…

    Hardback – 2016-08-15 
    Chapman and Hall/CRC

  • DDoS Attacks

    Evolution, Detection, Prevention, Reaction, and Tolerance

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with…

    Hardback – 2016-05-04
    Chapman and Hall/CRC

  • Mathematical Foundations of Public Key Cryptography

    By Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng

    In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and…

    Hardback – 2015-10-21
    CRC Press

  • Multilevel Modeling of Secure Systems in QoP-ML

    By Bogdan Księżopolski

    In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and…

    Hardback – 2015-06-10
    Auerbach Publications

  • Group Theoretic Cryptography

    By Maria Isabel González Vasco, Rainer Steinwandt

    Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential…

    Hardback – 2015-04-01
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Application of Fuzzy Logic to Social Choice Theory

    By John N. Mordeson, Davender S. Malik, Terry D. Clark

    Fuzzy social choice theory is useful for modeling the uncertainty and imprecision prevalent in social life yet it has been scarcely applied and studied in the social sciences. Filling this gap, Application of Fuzzy Logic to Social Choice Theory provides a comprehensive study of fuzzy social choice…

    Hardback – 2015-03-03
    Chapman and Hall/CRC
    Monographs and Research Notes in Mathematics

  • Practical Cryptography

    Algorithms and Implementations Using C++

    Edited by Saiful Azad, Al-Sakib Khan Pathan

    Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an…

    Hardback – 2014-11-17
    Auerbach Publications

  • Introduction to Modern Cryptography, Second Edition

    By Jonathan Katz, Yehuda Lindell

    Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of…

    Hardback – 2014-11-06
    Chapman and Hall/CRC
    Chapman & Hall/CRC Cryptography and Network Security Series

  • Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with…

    Hardback – 2014-10-29
    Chapman and Hall/CRC

  • How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking…

    Hardback – 2014-01-17
    Auerbach Publications

  • Managing Trust in Cyberspace

    Edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

    In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between…

    Hardback – 2013-12-14
    Chapman and Hall/CRC

Product Search