Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
Choose an application
More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.
Choose an application
Choose an application
Computer science --- Mathematical logic --- Computer logic. --- Logique informatique
Choose an application
The second edition of this successful textbook continues to provide a clear introduction to formal reasoning relevant to the needs of modern computer science and sufficiently exacting for practical applications. Improvements have been made throughout with many new and expanded text sections. The coverage of model-checking has been substantially updated and additional exercises are included. Internet support includes worked solutions for teacher exercises and model solutions to some student exercises. First Edition Hb (2000): 0-521-65200-6 First Edition Pb (2000): 0-521-65602-8
Computer logic --- Logic programming (Computer science) --- Computer logic. --- Logic programming. --- Logic programming (Computer science). --- Logique informatique --- 681.3*F11 <043> --- Models of computation: automata bounded action devices computability theory relations among models self-modifying machines unbounded-action devices--See also {681.3*F41}--Dissertaties --- 681.3*F11 <043> Models of computation: automata bounded action devices computability theory relations among models self-modifying machines unbounded-action devices--See also {681.3*F41}--Dissertaties --- 681.3*F41 Mathematical logic: computability theory computational logic lambda calculus logic programming mechanical theorem proving model theory proof theoryrecursive function theory--See also {681.3*F11} {681.3*I22} {681.3*I23} --- Mathematical logic: computability theory computational logic lambda calculus logic programming mechanical theorem proving model theory proof theoryrecursive function theory--See also {681.3*F11} {681.3*I22} {681.3*I23} --- 681.3*F11 Models of computation: automata bounded action devices computability theory relations among models self-modifying machines unbounded-action devices--See also {681.3*F41} --- Models of computation: automata bounded action devices computability theory relations among models self-modifying machines unbounded-action devices--See also {681.3*F41} --- computermodel --- 681.3*F41 Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- 681.3*F11 Models of computation: automata; bounded action devices; computability theory; relations among models; self-modifying machines; unbounded-action devices--See also {681.3*F41} --- Models of computation: automata; bounded action devices; computability theory; relations among models; self-modifying machines; unbounded-action devices--See also {681.3*F41} --- Logic programming --- 681.3*F11 <043> Models of computation: automata; bounded action devices; computability theory; relations among models; self-modifying machines; unbounded-action devices--See also {681.3*F41}--Dissertaties --- Models of computation: automata; bounded action devices; computability theory; relations among models; self-modifying machines; unbounded-action devices--See also {681.3*F41}--Dissertaties --- Computer programming --- Computer science logic --- Logic, Symbolic and mathematical --- 681.3*F11 --- 681.3*F41 --- computerarchitectuur --- kunstmatige intelligentie (artificiële intelligentie) --- Computer science --- Mathematical logic --- Computer programs --- Logiciels --- Verification --- Vérification --- Informatique --- Logique mathématique
Choose an application
Choose an application
Logistische Prozessketten und Logistiknetze werden immer komplexer – auch hinsichtlich Kosten, Zeit und Qualität. Mit diesem Buch soll die Lücke zwischen Anforderungen und Umsetzung im Logistik-Risikomanagement geschlossen werden. Es ist eine konkrete Arbeitshilfe für Praktiker und stellt anhand zahlreicher Beispiele Konzepte, Methoden und Instrumente vor, die es ermöglichen, Risiken in der Logistik zu identifizieren und effektiv zu handhaben. Der Inhalt Grundlagen und Struktur des Risikomanagements in der Logistik Aufbau- und ablauforganisatorische Einbindung Risiko-Bewertung strategischer Handlungsoptionen in der Supply Chain am Beispiel Outsourcing Simulationsmethoden im Logistik-Risikomanagement Internationale Standards Rechtlicher Rahmen für das Logistik-Risikomanagement Versicherungen als risikopolitische Maßnahme Logistik-Risikomanagement in der verarbeitenden Industrie, im Handel und bei Logistikdienstleistern Bewertung von Supply Chain-Risiken ECR Shrinkage Roadmap Risikomanagement in der Kontraktlogistik Katastrophen- und Risikomanagement in der humanitären Logistik Die Herausgeber Prof. Dr. Michael Huth lehrt Allgemeine Betriebswirtschaftslehre, insbesondere Logistik, an der Hochschule Fulda. Frank Romeike ist geschäftsführender Gesellschafter der RiskNET GmbH und zählt international zu den führenden Experten im Bereich Risiko- und Chancenmanagement. .
Choose an application
Computer software --- System design --- Logiciels --- Systèmes, Conception de --- Development --- Congresses --- Développement --- Congrès --- Computer software -- Development -- Congresses. --- Electronic books. -- local. --- System analysis -- Congresses. --- System design -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- System analysis --- Systèmes, Conception de --- Développement --- Congrès --- EPUB-LIV-FT SPRINGER-B --- Computer science. --- Computer communication systems. --- Software engineering. --- Algorithms. --- Computer logic. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Logics and Meanings of Programs. --- Software Engineering. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Logic design. --- Computer software. --- Software, Computer --- Computer systems --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Computer software engineering --- Engineering --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer science logic --- Logic, Symbolic and mathematical --- Foundations --- Distributed processing --- Development. --- Development of computer software --- Software development --- System design - Congresses. --- Computer software - Development - Congresses. --- Congresses. --- Computer networks. --- Computer Science Logic and Foundations of Programming. --- Informatics --- Science
Choose an application
The books in this trilogy capture the foundational core of advanced informatics. The authors make the foundations accessible, enabling students to become effective problem solvers. This first volume establishes the inductive approach as a fundamental principle for system and domain analysis. After a brief introduction to the elementary mathematical structures, such as sets, propositional logic, relations, and functions, the authors focus on the separation between syntax (representation) and semantics (meaning), and on the advantages of the consistent and persistent use of inductive definitions. They identify compositionality as a feature that not only acts as a foundation for algebraic proofs but also as a key for more general scalability of modeling and analysis. A core principle throughout is invariance, which the authors consider a key for the mastery of change, whether in the form of extensions, transformations, or abstractions. This textbook is suitable for undergraduate and graduate courses in computer science and for self-study. Most chapters contain exercises and the content has been class-tested over many years in various universities.
Computer science. --- Software engineering. --- Computers. --- Computer science --- Computer mathematics. --- Computer Science. --- Mathematics of Computing. --- Theory of Computation. --- Mathematical Applications in Computer Science. --- Software Engineering/Programming and Operating Systems. --- Mathematics. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Computer software engineering --- Engineering --- Informatics --- Science --- Computer science—Mathematics. --- Computer mathematics --- Electronic data processing --- Mathematics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Machine theory --- Calculators --- Cyberspace
Choose an application
ETAPS 2007 is the tenth instance of the European Joint Conferences on Theory and Practice of Software, and thus a cause for celebration. The events that comprise ETAPS address various aspects of the system - velopment process, including speci?cation, design, implementation, analysis and improvement. The languages, methodologies and tools which support these - tivities are all well within its scope. Di?erent blends of theory and practice are represented, with an inclination towards theory with a practical motivation on the one hand and soundly based practice on the other. Many of the issues involved in software design apply to systems in general, including hardware s- tems, and the emphasis on software is not intended to be exclusive. HistoryandPrehistoryofETAPS ETAPS as we know it is an annual federated conference that was established in 1998 by combining ?ve conferences [Compiler Construction (CC), European SymposiumonProgramming(ESOP),FundamentalApproachestoSoftware- gineering(FASE), Foundations of SoftwareScience and ComputationStructures (FOSSACS), Tools and Algorithms for Construction and Analysis of Systems (TACAS)] with satellite events.
Listing 1 - 10 of 14 | << page >> |
Sort by
|