Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today´s designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book´s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.
In an increasingly complex and interconnected world, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses a spectrum of security awareness issues and how this awareness can help to reduce the risk of becoming a victim: The security mindset and good security practices. Assets that need to be protected at work and at home. Threats that face every individual and business, all the time. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
Understanding Virtual Reality: Interface, Application, and Design, Second Edition, arrives at a time when the technologies behind virtual reality have advanced dramatically in their development and deployment, providing meaningful and productive virtual reality applications. The aim of this book is to help users take advantage of ways they can identify and prepare for the applications of VR in their field, whatever it may be. The included information counters both exaggerated claims for VR, citing dozens of real-world examples. By approaching VR as a communications medium, the authors have created a resource that will remain relevant even as the underlying technologies evolve. You get a history of VR, along with a good look at systems currently in use. However, the focus remains squarely on the application of VR and the many issues that arise in application design and implementation, including hardware requirements, system integration, interaction techniques and usability. Features substantive, illuminating coverage designed for technical or business readers and the classroom Examines VR´s constituent technologies, drawn from visualization, representation, graphics, human-computer interaction and other fields Provides (via a companion website) additional case studies, tutorials, instructional materials and a link to an open-source VR programming system Includes updated perception material and new sections on game engines, optical tracking, VR visual interface software and a new glossary with pictures
Machine learning is one of the fastest growing areas of computer science, with far-reaching applications. The aim of this textbook is to introduce machine learning, and the algorithmic paradigms it offers, in a principled way. The book provides a theoretical account of the fundamentals underlying machine learning and the mathematical derivations that transform these principles into practical algorithms. Following a presentation of the basics, the book covers a wide array of central topics unaddressed by previous textbooks. These include a discussion of the computational complexity of learning and the concepts of convexity and stability; important algorithmic paradigms including stochastic gradient descent, neural networks, and structured output learning; and emerging theoretical concepts such as the PAC-Bayes approach and compression-based bounds. Designed for advanced undergraduates or beginning graduates, the text makes the fundamentals and algorithms of machine learning accessible to students and non-expert readers in statistics, computer science, mathematics and engineering.
From the inventor of the PalmPilot comes a new and compelling theory of intelligence, brain function, and the future of intelligent machines Jeff Hawkins, the man who created the PalmPilot, Treo smart phone, and other handheld devices, has reshaped our relationship to computers. Now he stands ready to revolutionize both neuroscience and computing in one stroke, with a new understanding of intelligence itself. Hawkins develops a powerful theory of how the human brain works, explaining why computers are not intelligent and how, based on this new theory, we can finally build intelligent machines. The brain is not a computer, but a memory system that stores experiences in a way that reflects the true structure of the world, remembering sequences of events and their nested relationships and making predictions based on those memories. It is this memory-prediction system that forms the basis of intelligence, perception, creativity, and even consciousness. In an engaging style that will captivate audiences from the merely curious to the professional scientist, Hawkins shows how a clear understanding of how the brain works will make it possible for us to build intelligent machines, in silicon, that will exceed our human ability in surprising ways. Written with acclaimed science writer Sandra Blakeslee, ´´On Intelligence´´ promises to completely transfigure the possibilities of the technology age. It is a landmark book in its scope and clarity.
Explains what the agile methodology is and offers a guide to understanding and implementing agile concepts and ideas, along with a complete study guide for the PMI-ACP certification exam, which includes a full-length practice exam.
Presents a systematic approach to improving and creating data and information quality within the enterprise. This title describes a methodology that combines a conceptual framework for understanding information quality with the tools, techniques, and instructions for improving and creating information quality.
This seminal book injects the topic of superintelligence into the academic and popular mainstream. What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? In a tour de force of analytic thinking, Bostrom lays a foundation for understanding the future of humanity and intelligent life.
Presents one hundred short, illustrated lessons that teach the practical skills needed to succeed as a user experience designer, including understanding user and business goals, visual design principles, and the psychology of usability.