Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
Application Security in .NET Succinctly
Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, mach...
Handbook of Contact Mechanics
This book contains a structured collection of complete solutions of all significant axially symmetric contact problems. It provides solutions for classical profiles such as the sphere, cone or flat cylindrical punch as well as a multitude of other technically relevant shapes, e.g. the truncated cone, the worn sphere, rough profiles, hollow cylinder...
Boundary Value Problems, Weyl Functions, and Differential Operators
This book presents a comprehensive survey of modern operator techniques for boundary value problems and spectral theory, employing abstract boundary mappings and Weyl functions. It includes self-contained treatments of the extension theory of symmetric operators and relations, spectral characterizations of selfadjoint operators in terms of the anal...
Algebra
This open book is an introduction to algebra for undergraduates who are interested in careers which require a strong background in mathematics. It will benefit students studying computer science and physical sciences, who plan to teach mathematics in schools, or to work in industry or finance. The book assumes that the reader has a solid background...
Variant Construction from Theoretical Foundation to Applications
This book presents theoretical framework and sample applications of variant construction. The first part includes the components variant logic, variant measurements, and variant maps, while the second part covers sample applications such as variation with functions, variant stream ciphers, quantum interference, classical/quantum random sequences, w...
Foundations of Software Science and Computation Structures
This book constitutes the proceedings of the 21st International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 31 papers presented in this volume were ca...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Linear Algebra with Applications
Linear Algebra with Applications by W. Keith Nicholson, traditionally published for many years is now being released as an open educational resource. Overall, the aim of the book is to achieve a balance among computational skills, theory, and applications of linear algebra. It is a relatively advanced introduction to the ideas and techniques of ...
Applied Linear Algebra
This book develops the essential tools of linear algebra, with the goal of imparting technique alongside contextual understanding. Applications go hand-in-hand with theory, each reinforcing and explaining the other. This approach encourages students to develop not only the technical proficiency needed to go on to further study, but an appreciation ...
The Kademlia Protocol Succinctly
With its novel XOR-based metric topology, Kademlia is the first peer-to-peer system to combine provable consistency and performance, latency-minimizing routing, and a symmetric, unidirectional topology. In The Kademlia Protocol Succinctly, author Marc Clifton leads readers through the positive aspects of Kademlia's decentralized specifications...
Protecting SQL Server Data
In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, vie...
Anisotropy Across Fields and Scales
This open book focuses on processing, modeling, and visualization of anisotropy information, which are often addressed by employing sophisticated mathematical constructs such as tensors and other higher-order descriptors. It also discusses adaptations of such constructs to problems encountered in seemingly dissimilar areas of medical imaging, physi...
Geometry with an Introduction to Cosmic Topology
Geometry with an Introduction to Cosmic Topology approaches geometry through the lens of questions that have ignited the imagination of stargazers since antiquity. What is the shape of the universe? Does the universe have an edge? Is it infinitely big? This text develops non-Euclidean geometry and geometry on surfaces at a level appropriate for ...