You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Skating on Thin Ice exposes the culture of toxic masculinity in professional hockey and suggests how sport and society can change the narrative on sexual assault and violence. Why is it that professional sports, and notably hockey, remain a bastion for rape culture and violence against women? What are the conditions that allow a culture of toxic masculinity to persist despite awakenings elsewhere in society? What is the path forward, and how do we make officials, coaches, and athletes accountable? Drawing on decades of award-winning sociological research and sports journalism, Walter S. DeKeseredy, Martin D. Schwartz, and veteran sportswriter Stu Cowan find answers to these questions in Skat...
Despite being 2000 years old, cryptography is still a very active field of research. New needs and application fields, like privacy, the Internet of Things (IoT), physically unclonable functions (PUFs), post-quantum cryptography, and quantum key distribution, will keep fueling the work in this field. This book discusses quantum cryptography, lightweight cryptography for IoT, PUFs, cryptanalysis, and more. It provides a snapshot of some recent research results in the field, providing readers with some useful tools and stimulating new ideas and applications for future investigation.
The book discusses the activities involved in developing an Enterprise Continuity Program (ECP) that will cover both Business Continuity Management (BCM) as well as Disaster Recovery Management (DRM). The creation of quantitative metrics for BCM are discussed as well as several models and methods that correspond to the goals and objectives of the International Standards Organisation (ISO) Technical Committee ISO/TC 292 "Security and resilience”. Significantly, the book contains the results of not only qualitative, but also quantitative, measures of Cyber Resilience which for the first time regulates organizations’ activities on protecting their critical information infrastructure. The bo...
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. - Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures - Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks - Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
This handbook represents a collection of previously published technical journal articles of the highest caliber originating from the Air Force Institute of Technology (AFIT). The collection will help promote and affirm the leading-edge technical publications that have emanated from AFIT, for the first time presented as a cohesive collection. In its over 100 years of existence, AFIT has produced the best technical minds for national defense and has contributed to the advancement of science and technology through technology transfer throughout the nation. This handbook fills the need to share the outputs of AFIT that can guide further advancement of technical areas that include cutting-edge te...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science.Of particular interest are the potential impacts of quantum physics:(i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices.
Important new insights into how various components and systems evolved Premised on the idea that one cannot know a science without knowing its history, History of Wireless offers a lively new treatment that introduces previously unacknowledged pioneers and developments, setting a new standard for understanding the evolution of this important technology. Starting with the background-magnetism, electricity, light, and Maxwell's Electromagnetic Theory-this book offers new insights into the initial theory and experimental exploration of wireless. In addition to the well-known contributions of Maxwell, Hertz, and Marconi, it examines work done by Heaviside, Tesla, and passionate amateurs such as ...
None
None