hardcover. Zustand: Very Good.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,00
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 68,80
Anzahl: 1 verfügbar
In den WarenkorbZustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 76,88
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 248 pages. 9.37x6.06x0.55 inches. In Stock.
EUR 84,15
Anzahl: 1 verfügbar
In den WarenkorbZustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 96,28
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2011
ISBN 10: 3642177956 ISBN 13: 9783642177958
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2019
ISBN 10: 303019051X ISBN 13: 9783030190514
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributionsauthored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.
Taschenbuch. Zustand: Neu. Foundations of Security, Protocols, and Equational Reasoning | Essays Dedicated to Catherine A. Meadows | Joshua D. Guttman (u. a.) | Taschenbuch | Lecture Notes in Computer Science | xii | Englisch | 2019 | Springer | EAN 9783030190514 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - It is not always clear what computer programs mean in the various languages in which they can be written, yet a picture can be worth 1000 words, a diagram 1000 instructions.In this unique textbook/reference, programs are drawn as string diagrams in the language of categories, which display a universal syntax of mathematics (Computer scientists use them to analyze the program semantics; programmers to display the syntax of computations). Here, the string-diagrammatic depictions of computations are construed as programs in a single-instruction programming language. Such programs as diagrams show how functions are packed in boxes and tied by strings. Readers familiar with categories will learn about the foundations of computability; readers familiar with computability gain access to category theory. Additionally, readers familiar with both are offered many opportunities to improve the approach.Topics and features:Delivers a 'crash' diagram-based course in theory of computationUses single-instruction diagrammatic programming languageOffers a practical introduction into categories and string diagrams as computational toolsReveals how computability is programmability, rather than an 'ether' permeating computers Provides a categorical model of intensional computation is unique up to isomorphismServes as a stepping stone into research of computable categoriesIn addition to its early chapters introducing computability for beginners, this flexible textbook/resource also contains both middle chapters that expand for suitability to a graduate course as well as final chapters opening up new research. Dusko Pavlovic is a professor at the Department of Information and Computer Sciences at the University of Hawaii at Manoa, and by courtesy at the Department of Mathematics and the College of Engineering. He completed this book as an Excellence Professor at Radboud University in Nijmegen, The Netherlands.
Sprache: Englisch
Verlag: Springer, Springer International Publishing, 2026
ISBN 10: 3032009480 ISBN 13: 9783032009487
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security. What is the common denominator of these security concepts Security and science are the building blocks of the modern civilization. Science gave us the powers to change the world. Security should protect us from abuses of those powers. Yet humans have been hesitant to apply the methods of science to the problems of security. This core security-science (SecSci) textbook is a step in that direction.While many students pursue security out of genuine interest, most security curricula are plastered with industry buzzwords and policy slogans, driven by market incentives and government funding. The result is the attackers get richer, and their victims get poorer while security experts inhabit the realm of informal narratives in-between. Before joining the fray, some students want to understand it. This textbook arose from the authors' efforts to cater to such students by peeling off the veils of expertise and replacing them with explanations and simple mathematical models.Topics, goals and features:Understand the basic ideas behind the main security concepts and beyond the buzzwordsCybersecurity and computer security are not as different from physical security and national security as they make you think.Physical space is described by its geometry, but what is the geometry of cyberspace Different programming languages and different network and computer architectures require different security tools. Learn the security methods independent on the differences.Privacy is not a security requirement but the right to be left alone.The more I trust you, the less security and privacy I need from you. But why do I trust you This uniquely informative textbook provides supporting materials for undergraduate and graduate courses on security, privacy, and trust. The early chapters introduce the basic concepts at the beginner level. The later chapters require some technical confidence and intellectual maturity. The book can also be used as an entry point into SecSci research.The authors are professors at the Department of Information and Computer Sciences at the University of Hawai i at Manoa.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Programs as Diagrams | From Categorical Computability to Computable Categories | Dusko Pavlovic | Taschenbuch | Theory and Applications of Computability | xvii | Englisch | 2024 | Springer | EAN 9783031348297 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Sprache: Englisch
Verlag: Springer, Berlin, Springer, 2011
ISBN 10: 3642177956 ISBN 13: 9783642177958
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This book constitutes the refereed proceedings of the 13th International Conference on Algebraic Methodology and Software Technology, AMAST 2010, held in Lac-Beauport, QC, Canada, in June 2010.The 14 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers are organized in 1 invited paper, 10 contributed research papers, and 4 system demonstrations.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 138,35
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 269 pages. 9.25x6.10x0.83 inches. In Stock.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - It is not always clear what computer programs mean in the various languages in which they can be written, yet a picture can be worth 1000 words, a diagram 1000 instructions.In this unique textbook/reference, programs are drawn as string diagrams in the language of categories, which display a universal syntax of mathematics (Computer scientists use them to analyze the program semantics; programmers to display the syntax of computations). Here, the string-diagrammatic depictions of computations are construed as programs in a single-instruction programming language. Such programs as diagrams show how functions are packed in boxes and tied by strings. Readers familiar with categories will learn about the foundations of computability; readers familiar with computability gain access to category theory. Additionally, readers familiar with both are offered many opportunities to improve the approach.Topics and features:Delivers a 'crash' diagram-based course in theory of computationUses single-instruction diagrammatic programming languageOffers a practical introduction into categories and string diagrams as computational toolsReveals how computability is programmability, rather than an 'ether' permeating computers Provides a categorical model of intensional computation is unique up to isomorphismServes as a stepping stone into research of computable categoriesIn addition to its early chapters introducing computability for beginners, this flexible textbook/resource also contains both middle chapters that expand for suitability to a graduate course as well as final chapters opening up new research. Dusko Pavlovic is a professor at the Department of Information and Computer Sciences at the University of Hawaii at Manoa, and by courtesy at the Department of Mathematics and the College of Engineering. He completed this book as an Excellence Professor at Radboud University in Nijmegen, The Netherlands.