Narrow your search
Listing 1 - 3 of 3
Sort by

Book
Poker et Entreprise : De la décision à la Stratégie.
Author:
ISBN: 2804709884 Year: 2021 Publisher: Namur : Pierre Mardaga Editeur,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book uses poker as a metaphor for business strategy, emphasizing how the skills and qualities developed in poker can be applied to corporate management and leadership. It provides an introduction to poker rules and techniques while exploring strategic concepts common to both poker and business, such as risk management, decision-making, and understanding competitors. The author aims to teach readers how to master chance, maintain concentration, manage stress, and develop long-term strategies. The book is designed for managers, business leaders, and anyone interested in improving their strategic thinking. Three appendices offer further insights into optimal strategy, foresight methods, and cooperative strategies within games.

Keywords

Poker. --- Business planning.


Book
Gangsters to governors
Author:
ISBN: 0813584558 9780813584553 0813584566 9780813584560 9780813584546 081358454X Year: 2017 Publisher: New Brunswick

Loading...
Export citation

Choose an application

Bookmark

Abstract

Generations ago, gambling in America was an illicit activity, dominated by gangsters like Benny Binion and Bugsy Siegel. Today, forty-eight out of fifty states permit some form of legal gambling, and America's governors sit at the head of the gaming table. But have states become addicted to the revenue gambling can bring? And does the potential of increased revenue lead them to place risky bets on new casinos, lotteries, and online games? In Gangsters to Governors, journalist David Clary investigates the pros and cons of the shift toward state-run gambling. Unearthing the sordid history of America's gaming underground, he demonstrates the problems with prohibiting gambling while revealing how today's governors, all competing for a piece of the action, promise their citizens payouts that are rarely delivered. Clary introduces us to a rogue's gallery of colorful characters, from John "Old Smoke" Morrissey, the Irish-born gangster who built Saratoga into a gambling haven in the nineteenth century, to Sheldon Adelson, the billionaire casino magnate who has furiously lobbied against online betting. By exploring the controversial histories of legal and illegal gambling in America, he offers a fresh perspective on current controversies, including bans on sports and online betting. Entertaining and thought-provoking, Gangsters to Governors considers the past, present, and future of our gambling nation. Author's website (http://www.davidclaryauthor.com)


Book
The Mathematics of Secrets : Cryptography from Caesar Ciphers to Digital Encryption
Author:
ISBN: 0691184550 Year: 2018 Publisher: Princeton, NJ : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.

Keywords

Cryptography --- Ciphers. --- Computer security. --- Mathematics. --- Adaptive chosen-ciphertext attack. --- Advanced Encryption Standard. --- Affine cipher. --- Alice and Bob. --- Autokey cipher. --- Block cipher mode of operation. --- Block cipher. --- Block size (cryptography). --- Brute-force attack. --- Brute-force search. --- Caesar cipher. --- Calculation. --- Chosen-ciphertext attack. --- Chosen-plaintext attack. --- Cipher. --- Ciphertext-only attack. --- Ciphertext. --- Codebook. --- Communication Theory of Secrecy Systems. --- Computational problem. --- Confusion and diffusion. --- Correlation attack. --- Craig Gentry (computer scientist). --- Cryptanalysis. --- Cryptogram. --- Cryptographic engineering. --- Cryptographic hash function. --- Cryptography Research. --- Cryptography. --- Cryptosystem. --- Data Encryption Standard. --- Differential cryptanalysis. --- Diffie–Hellman key exchange. --- Discrete logarithm. --- Disquisitiones Arithmeticae. --- Dual EC DRBG. --- ElGamal encryption. --- Elliptic curve cryptography. --- Encryption. --- Enigma machine. --- Euler's theorem. --- Fast Software Encryption. --- Feistel cipher. --- Fermat's little theorem. --- Forward secrecy. --- Grover's algorithm. --- Hill cipher. --- Homomorphic encryption. --- Hyperelliptic curve cryptography. --- Information theory. --- Initialization vector. --- International Association for Cryptologic Research. --- Kerckhoffs's principle. --- Key (cryptography). --- Key schedule. --- Key size. --- Keystream. --- Known-plaintext attack. --- Lattice problem. --- Linear cryptanalysis. --- Logjam (computer security). --- Mathematical problem. --- Mathematician. --- Mental poker. --- Merkle's Puzzles. --- Monte Carlo algorithm. --- Multiple encryption. --- NSA Suite B Cryptography. --- Nonlinear feedback shift register. --- Number theory. --- Padding (cryptography). --- Permutation box. --- Permutation. --- Plaintext. --- Polyalphabetic cipher. --- Post-quantum cryptography. --- Precomputation. --- Probabilistic encryption. --- Product cipher. --- Public-key cryptography. --- Quantum algorithm. --- Quantum cryptography. --- Quantum key distribution. --- RSA (cryptosystem). --- RSA problem. --- Related-key attack. --- S-box. --- Security level. --- Shor's algorithm. --- Sign (mathematics). --- Spyware. --- Stream cipher. --- Substitution cipher. --- Symmetric-key algorithm. --- Transposition cipher. --- VIC cipher. --- Variable (computer science). --- Vigenère cipher. --- Vulnerability (computing).

Listing 1 - 3 of 3
Sort by