You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public key cryptography.
Edges of Books examines a familiar form from an unfamiliar perspective. When books are on display it is usually their spines, covers, text, or illustrations that are featured. These are the familiar parts of the books--the parts that modern readers have come to interact with the most. Edges of Books takes a different approach, uncovering a tradition that extends back centuries in which the edges of books were important sites for information and decoration. This is a catalog of an exhibition of the same name at the Cary Collection.
Successfully managing rare book collections requires very specific knowledge and skills. This handbook provides that essential information in a single volume. Rare Book Librarianship for the 21st Century is the first new rare books handbook of practice in 25 years. Authored by two special collections experts with extensive field experience, this book is also the first to discuss the role of digital technologies in managing a rare book collection. After a fascinating discussion of the history and current state of rare book libraries, this handbook provides a comprehensive account of the core skills and knowledge needed to be a successful rare book librarian. Topics include best practices for handling, housing, and conserving rare materials; collection development techniques; and user education and outreach. This book will serve as a handbook for practitioners in academic settings, large public libraries, and special libraries, and as a textbook for students in MLIS courses on rare book librarianship and curatorship.
Communicating Knowledge Visually presents a timely, in-depth examination of information design pioneer, Will Burtin. Using a methodical approach, the authors analyze Burtin's way of working and nine of his seminal projects, including his exhibitions for The Upjohn Company and diagrams for SCOPE magazine.Excerpts taken from Burtin's unpublished writing offer insight into his thinking process and explain how he transformed complex scientific information into easy, accessible visual forms. Scientists, designers, educators and students will gain valuable knowledge from Burtin's unique design approach in meeting the current challenges of communicating complexity in their respective fields.
With searing wit and incisive commentary, John Kenneth Galbraith redefined America's perception of itself in The New Industrial State, one of his landmark works. The United States is no longer a free-enterprise society, Galbraith argues, but a structured state controlled by the largest companies. Advertising is the means by which these companies manage demand and create consumer "need" where none previously existed. Multinational corporations are the continuation of this power system on an international level. The goal of these companies is not the betterment of society, but immortality through an uninterrupted stream of earnings. First published in 1967, The New Industrial State continues to resonate today.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2022, CT-RSA 2022, held in San Francisco, CA, USA, in February 2022.* The 24 full papers presented in this volume were carefully reviewed and selected from 87 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security. *The conference was held as a hybrid event.
An innovative account of the literary Restoration that stresses its diversity, historical self-awareness, and openness to new voices.
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.
John Kenneth Galbraith's classic study of the Wall Street Crash of 1929.
This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005. The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes.