Listing 1 - 7 of 7 |
Sort by
|
Choose an application
"In a rapidly changing world, we rely upon experts to assess the promise and risks of new technology. But how do these experts make sense of a highly uncertain future? In Arguments that Count, Rebecca Slayton offers an important new perspective. Drawing on new historical documents and interviews as well as perspectives in science and technology studies, she provides an original account of how scientists came to terms with the unprecedented threat of nuclear-armed intercontinental ballistic missiles (ICBMs). She compares how two different professional communities -- physicists and computer scientists -- constructed arguments about the risks of missile defense, and how these arguments changed over time. Slayton shows that our understanding of technological risks is shaped by disciplinary repertoires -- the codified knowledge and mathematical rules that experts use to frame new challenges. And, significantly, a new repertoire can bring long-neglected risks into clear view.In the 1950s, scientists recognized that high-speed computers would be needed to cope with the unprecedented speed of ICBMs. But the nation's elite science advisors had no way to analyze the risks of computers so used physics to assess what they could: radar and missile performance. Only decades later, after establishing computing as a science, were advisors able to analyze authoritatively the risks associated with complex software -- most notably, the risk of a catastrophic failure. As we continue to confront new threats, including that of cyber attack, Slayton offers valuable insight into how different kinds of expertise can limit or expand our capacity to address novel technological risks."
National security --- Ballistic missile defenses --- Physicists --- Computer scientists --- Physics --- Computer science --- Technological complexity --- Software engineering --- History --- History. --- Political activity --- Political aspects --- United States --- Military policy. --- Computer software engineering --- Engineering --- Complexity, Technological --- Anthropology --- Industries, Primitive --- Informatics --- Science --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Scientists --- Physical scientists --- Defenses, Ballistic missile --- Air defenses --- Technology --- SCIENCE, TECHNOLOGY & SOCIETY/General --- SCIENCE, TECHNOLOGY & SOCIETY/History of Technology
Choose an application
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more.While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman.The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.
Choose an application
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptograpy, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more.While other books have documented the development of public key cryptograpy, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distiguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman.The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.
Choose an application
This book is a clinical guide to the prevention and management of traumatic dental injuries, including crown and root fractures and luxation injuries, in children of all ages. Readers will find clear descriptions of the challenges posed by the pediatric population, the evaluation of injuries, diagnosis, management, and follow-up. Whenever available, evidence-based guidelines are used to inform clinicians of the most appropriate care for each type of injury. A holistic approach is adopted, taking into account the child's developmental stage and ability to tolerate the proposed treatment. When indicated, more advanced forms of behavior guidance are discussed to enable the delivery of safe and effective care that will allow the best outcome to be achieved. Often, traumatic dental injuries result in sequelae that compromise the health of the developing permanent teeth. These sequelae and appropriate treatment options are described along with innovative approaches designed to preserve bone and maximize future treatment possibilities. The book will be a valuable asset for both pediatric and general dentists.
Pedodontics. --- Dental emergencies. --- Dentistry. --- Pediatrics. --- Paediatrics --- Pediatric medicine --- Medicine --- Children --- Dental surgery --- Odontology --- Surgery, Dental --- Oral medicine --- Teeth --- Diseases --- Health and hygiene
Choose an application
This book is a clinical guide to the prevention and management of traumatic dental injuries, including crown and root fractures and luxation injuries, in children of all ages. Readers will find clear descriptions of the challenges posed by the pediatric population, the evaluation of injuries, diagnosis, management, and follow-up. Whenever available, evidence-based guidelines are used to inform clinicians of the most appropriate care for each type of injury. A holistic approach is adopted, taking into account the child's developmental stage and ability to tolerate the proposed treatment. When indicated, more advanced forms of behavior guidance are discussed to enable the delivery of safe and effective care that will allow the best outcome to be achieved. Often, traumatic dental injuries result in sequelae that compromise the health of the developing permanent teeth. These sequelae and appropriate treatment options are described along with innovative approaches designed to preserve bone and maximize future treatment possibilities. The book will be a valuable asset for both pediatric and general dentists.
Paediatrics --- Stomatology --- pediatrie --- stomatologie
Choose an application
Paediatrics --- Stomatology --- pediatrie --- stomatologie
Choose an application
Reconceptualises instability in relation to cyberspaceAssesses the risks of inadvertent escalation in cyberspaceExamines the role of NATO in cyber conflictExplores the infrastructural aspects of stability and the role of resilienceCase studies include US-China relations, the 2016 Presidential Elections, IoT devices and the African Union A wide range of actors have publicly identified cyber stability as a key policy goal but the meaning of stability in the context of cyber policy remains vague and contested. Vague because most policymakers and experts do not define cyber stability when they use the concept. Contested because they propose measures that rely - often implicitly - on divergent understandings of cyber stability. This volume is a thorough investigation of instability within cyberspace and of cyberspace itself. Its purpose is to reconceptualise stability and instability for cyberspace, highlight their various dimensions and thereby identify relevant policy measures. This book critically examines both 'classic' notions associated with stability - for example, whether cyber operations can lead to unwanted escalation - as well as topics that have so far not been addressed in the existing cyber literature, such as the application of a decolonial lens to investigate Euro-American conceptualisations of stability in cyberspace.
Listing 1 - 7 of 7 |
Sort by
|