Narrow your search

Library

KU Leuven (3)

Odisee (3)

Thomas More Mechelen (3)

UCLL (3)

VIVES (3)

Thomas More Kempen (2)

ULB (2)

ULiège (2)

AP (1)

KBC (1)

More...

Resource type

book (6)

digital (1)


Language

English (7)


Year
From To Submit

2023 (1)

2022 (2)

2020 (3)

2013 (1)

Listing 1 - 7 of 7
Sort by

Book
Arguments that count : physics, computing, and missile defense, 1949-2012
Author:
ISBN: 9780262316538 9781461939016 1461939011 0262316536 9780262019446 0262019442 0262316544 Year: 2013 Publisher: Cambridge, Massachusetts : The MIT Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"In a rapidly changing world, we rely upon experts to assess the promise and risks of new technology. But how do these experts make sense of a highly uncertain future? In Arguments that Count, Rebecca Slayton offers an important new perspective. Drawing on new historical documents and interviews as well as perspectives in science and technology studies, she provides an original account of how scientists came to terms with the unprecedented threat of nuclear-armed intercontinental ballistic missiles (ICBMs). She compares how two different professional communities -- physicists and computer scientists -- constructed arguments about the risks of missile defense, and how these arguments changed over time. Slayton shows that our understanding of technological risks is shaped by disciplinary repertoires -- the codified knowledge and mathematical rules that experts use to frame new challenges. And, significantly, a new repertoire can bring long-neglected risks into clear view.In the 1950s, scientists recognized that high-speed computers would be needed to cope with the unprecedented speed of ICBMs. But the nation's elite science advisors had no way to analyze the risks of computers so used physics to assess what they could: radar and missile performance. Only decades later, after establishing computing as a science, were advisors able to analyze authoritatively the risks associated with complex software -- most notably, the risk of a catastrophic failure. As we continue to confront new threats, including that of cyber attack, Slayton offers valuable insight into how different kinds of expertise can limit or expand our capacity to address novel technological risks."


Book
Democratizing Cryptography : The Work of Whitfield Diffie and Martin Hellman
Author:
ISBN: 1450398286 Year: 2022 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more.While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman.The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Keywords

Cryptography.


Book
Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman
Author:
ISBN: 145039826X Year: 2022 Publisher: ACM Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptograpy, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more.While other books have documented the development of public key cryptograpy, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distiguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman.The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Keywords


Book
Traumatic Dental Injuries in Children : A Clinical Guide to Management and Prevention
Authors: ---
ISBN: 3030257932 3030257924 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is a clinical guide to the prevention and management of traumatic dental injuries, including crown and root fractures and luxation injuries, in children of all ages. Readers will find clear descriptions of the challenges posed by the pediatric population, the evaluation of injuries, diagnosis, management, and follow-up. Whenever available, evidence-based guidelines are used to inform clinicians of the most appropriate care for each type of injury. A holistic approach is adopted, taking into account the child's developmental stage and ability to tolerate the proposed treatment. When indicated, more advanced forms of behavior guidance are discussed to enable the delivery of safe and effective care that will allow the best outcome to be achieved. Often, traumatic dental injuries result in sequelae that compromise the health of the developing permanent teeth. These sequelae and appropriate treatment options are described along with innovative approaches designed to preserve bone and maximize future treatment possibilities. The book will be a valuable asset for both pediatric and general dentists.


Digital
Traumatic Dental Injuries in Children : A Clinical Guide to Management and Prevention
Authors: ---
ISBN: 9783030257934 Year: 2020 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is a clinical guide to the prevention and management of traumatic dental injuries, including crown and root fractures and luxation injuries, in children of all ages. Readers will find clear descriptions of the challenges posed by the pediatric population, the evaluation of injuries, diagnosis, management, and follow-up. Whenever available, evidence-based guidelines are used to inform clinicians of the most appropriate care for each type of injury. A holistic approach is adopted, taking into account the child's developmental stage and ability to tolerate the proposed treatment. When indicated, more advanced forms of behavior guidance are discussed to enable the delivery of safe and effective care that will allow the best outcome to be achieved. Often, traumatic dental injuries result in sequelae that compromise the health of the developing permanent teeth. These sequelae and appropriate treatment options are described along with innovative approaches designed to preserve bone and maximize future treatment possibilities. The book will be a valuable asset for both pediatric and general dentists.


Book
Traumatic Dental Injuries in Children
Authors: --- ---
ISBN: 9783030257934 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cyberspace and Instability

Loading...
Export citation

Choose an application

Bookmark

Abstract

Reconceptualises instability in relation to cyberspaceAssesses the risks of inadvertent escalation in cyberspaceExamines the role of NATO in cyber conflictExplores the infrastructural aspects of stability and the role of resilienceCase studies include US-China relations, the 2016 Presidential Elections, IoT devices and the African Union A wide range of actors have publicly identified cyber stability as a key policy goal but the meaning of stability in the context of cyber policy remains vague and contested. Vague because most policymakers and experts do not define cyber stability when they use the concept. Contested because they propose measures that rely - often implicitly - on divergent understandings of cyber stability. This volume is a thorough investigation of instability within cyberspace and of cyberspace itself. Its purpose is to reconceptualise stability and instability for cyberspace, highlight their various dimensions and thereby identify relevant policy measures. This book critically examines both 'classic' notions associated with stability - for example, whether cyber operations can lead to unwanted escalation - as well as topics that have so far not been addressed in the existing cyber literature, such as the application of a decolonial lens to investigate Euro-American conceptualisations of stability in cyberspace.

Listing 1 - 7 of 7
Sort by