Author: Simon Singh
Release Date: 2011-01-26
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy. Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.
Author: Simon Singh
Publisher: HarperCollins UK
Release Date: 2010-06-24
The Science of Secrecy from Ancient Egypt to Quantum Cryptography From the best-selling author of Fermat’s Last Theorem, The Code Book is a history of man’s urge to uncover the secrets of codes, from Egyptian puzzles to modern day computer encryptions.
Author: Song Y. Yan
Release Date: 2018-12-04
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
xn + yn = zn, where n represents 3, 4, 5, ...no solution "I have discovered a truly marvelous demonstration of this proposition which this margin is too narrow to contain." With these words, the seventeenth-century French mathematician Pierre de Fermat threw down the gauntlet to future generations. What came to be known as Fermat's Last Theorem looked simple; proving it, however, became the Holy Grail of mathematics, baffling its finest minds for more than 350 years. In Fermat's Enigma--based on the author's award-winning documentary film, which aired on PBS's "Nova"--Simon Singh tells the astonishingly entertaining story of the pursuit of that grail, and the lives that were devoted to, sacrificed for, and saved by it. Here is a mesmerizing tale of heartbreak and mastery that will forever change your feelings about mathematics.
Author: Vladimir G. Plekhanov
Publisher: Springer Science & Business Media
Release Date: 2012-05-26
The present book provides to the main ideas and techniques of the rapid progressing field of quantum information and quantum computation using isotope - mixed materials. It starts with an introduction to the isotope physics and then describes of the isotope - based quantum information and quantum computation. The ability to manipulate and control electron and/or nucleus spin in semiconductor devices provides a new route to expand the capabilities of inorganic semiconductor-based electronics and to design innovative devices with potential application in quantum computing. One of the major challenges towards these objectives is to develop semiconductor-based systems and architectures in which the spatial distribution of spins and their properties can be controlled. For instance, to eliminate electron spin decoherence resulting from hyperfine interaction due to nuclear spin background, isotopically controlled devices are needed (i.e., nuclear spin-depleted). In other emerging concepts, the control of the spatial distribution of isotopes with nuclear spins is a prerequisite to implement the quantum bits (or qbits). Therefore, stable semiconductor isotopes are important elements in the development of solid-state quantum information. There are not only different algorithms of quantum computation discussed but also the different models of quantum computers are presented. With numerous illustrations this small book is of great interest for undergraduate students taking courses in mesoscopic physics or nanoelectronics as well as quantum information, and academic and industrial researches working in this field.
Author: Christopher H. Sterling
Release Date: 2008
"Military Communications: From Ancient Times to the 21st Century" is the first comprehensive reference work on the applications of communications technology to military tactics and strategy--a field that is just now coming into its own as a focus of historical study. Ranging from ancient times to the war in Iraq, it offers over 300 alphabetically organized entries covering many methods and modes of transmitting communication through the centuries, as well as key personalities, organizations, strategic applications, and more. "Military Communications" includes examples from armed forces around the world, with a focus on the United States, where many of the most dramatic advances in communications technology and techniques were realized. A number of entries focus on specific battles where communications superiority helped turn the tide, including Tsushima (1905), Tannenberg and the Marne (both 1914), Jutland (1916), and Midway (1942). The book also addresses a range of related topics such as codebreaking, propaganda, and the development of civilian telecommunications.
Author: Richard A. Mollin
Publisher: CRC Press
Release Date: 2005-05-24
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist. The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.
Author: Revathi Subramanian
Publisher: John Wiley & Sons
Release Date: 2014-03-11
Genre: Business & Economics
Learn how advances in technology can help curb bank fraud Fraud prevention specialists are grappling with ever-mountingquantities of data, but in today's volatile commercial environment,paying attention to that data is more important than ever. BankFraud provides a frank discussion of the attitudes, strategies,and—most importantly—the technology that specialistswill need to combat fraud. Fraudulent activity may have increased over the years, but sohas the field of data science and the results that can be achievedby applying the right principles, a necessary tool today forfinancial institutions to protect themselves and their clientele.This resource helps professionals in the financial servicesindustry make the most of data intelligence and uncovers theapplicable methods to strengthening defenses against fraudulentbehavior. This in-depth treatment of the topic begins with a briefhistory of fraud detection in banking and definitions of key terms,then discusses the benefits of technology, data sharing, andanalysis, along with other in-depth information, including: The challenges of fraud detection in a financial servicesenvironment The use of statistics, including effective ways to measurelosses per account and ROI by product/initiative The Ten Commandments for tackling fraud and ways to build aneffective model for fraud management Bank Fraud offers a compelling narrative that ultimatelyurges security and fraud prevention professionals to make the mostof the data they have so painstakingly gathered. Such professionalsshouldn't let their most important intellectualasset—data—go to waste. This book shows you just how toleverage data and the most up-to-date tools, technologies, andmethods to thwart fraud at every turn.
Author: David Kinney
Publisher: Simon and Schuster
Release Date: 2014-05-13
A joyous and poignant exploration of the meaning of fandom, the healing power of art, and the importance of embracing what moves you, “The Dylanologists is juicy…artfully told…and an often moving chronicle of the ecstasies and depravities of obsession” (New York Daily News). Bob Dylan is the most influential songwriter of our time, and, after a half century, he continues to be a touchstone, a fascination, and an enigma. From the very beginning, he attracted an intensely fanatical cult following, and in The Dylanologists, Pulitzer Prize–winning journalist David Kinney ventures deep into this eccentric subculture to answer a question: What can Dylan’s grip on his most enthusiastic listeners tell us about his towering place in American culture? Kinney introduces us to a vibrant underground: diggers searching for unheard tapes and lost manuscripts, researchers obsessing over the facts of Dylan’s life and career, writers working to decode the unyieldingly mysterious songs, fans who meticulously record and dissect every concert. It’s an affectionate mania, but as far as Dylan is concerned, a mania nonetheless. Over the years, the intensely private and fiercely combative musician has been frightened, annoyed, and perplexed by fans who try to peel back his layers. He has made one thing—perhaps the only thing—crystal clear: He does not wish to be known. Told with tremendous insight, intelligence, and warmth, “entertaining and well-written…The Dylanologists is as much a book about obsession—about the ways our fascinations manifest themselves, about how we cope with what we love but don’t quite understand—as it is a book about a musician and his nutty fans” (The Wall Street Journal).
NEW YORK TIMES BESTSELLER For fans of Jacqueline Winspear, Laurie R. King, and Anne Perry, whip-smart heroine Maggie Hope returns to embark on a clandestine mission behind enemy lines where no one can be trusted, and even the smallest indiscretion can be deadly. World War II has finally come home to Britain, but it takes more than nightly air raids to rattle intrepid spy and expert code breaker Maggie Hope. After serving as a secret agent to protect Princess Elizabeth at Windsor Castle, Maggie is now an elite member of the Special Operations Executive—a black ops organization designed to aid the British effort abroad—and her first assignment sends her straight into Nazi-controlled Berlin, the very heart of the German war machine. Relying on her quick wit and keen instincts, Maggie infiltrates the highest level of Berlin society, gathering information to pass on to London headquarters. But the secrets she unveils will expose a darker, more dangerous side of the war—and of her own past. “You’ll be [Maggie Hope’s] loyal subject, ready to follow her wherever she goes.”—O: The Oprah Magazine From the Trade Paperback edition.
Author: Simon Singh
Publisher: A&C Black
Release Date: 2013-10-29
Genre: Social Science
You may have watched hundreds of episodes of The Simpsons (and its sister show Futurama) without ever realising that they contain enough maths to form an entire university course. In The Simpsons and Their Mathematical Secrets, Simon Singh explains how the brilliant writers, some of the mathematicians, have smuggled in mathematical jokes throughout the cartoon's twenty-five year history, exploring everything from to Mersenne primes, from Euler's equation to the unsolved riddle of P vs. NP, from perfect numbers to narcissistic numbers, and much more. With wit, clarity and a true fan's zeal, Singh analyses such memorable episodes as 'Bart the Genius' and 'HomerÂ3' to offer an entirely new insight into the most successful show in television history.
Author: Berthold Vöcking
Publisher: Springer Science & Business Media
Release Date: 2010-12-10
Algorithms specify the way computers process information and how they execute tasks. Many recent technological innovations and achievements rely on algorithmic ideas – they facilitate new applications in science, medicine, production, logistics, traffic, communi¬cation and entertainment. Efficient algorithms not only enable your personal computer to execute the newest generation of games with features unimaginable only a few years ago, they are also key to several recent scientific breakthroughs – for example, the sequencing of the human genome would not have been possible without the invention of new algorithmic ideas that speed up computations by several orders of magnitude. The greatest improvements in the area of algorithms rely on beautiful ideas for tackling computational tasks more efficiently. The problems solved are not restricted to arithmetic tasks in a narrow sense but often relate to exciting questions of nonmathematical flavor, such as: How can I find the exit out of a maze? How can I partition a treasure map so that the treasure can only be found if all parts of the map are recombined? How should I plan my trip to minimize cost? Solving these challenging problems requires logical reasoning, geometric and combinatorial imagination, and, last but not least, creativity – the skills needed for the design and analysis of algorithms. In this book we present some of the most beautiful algorithmic ideas in 41 articles written in colloquial, nontechnical language. Most of the articles arose out of an initiative among German-language universities to communicate the fascination of algorithms and computer science to high-school students. The book can be understood without any prior knowledge of algorithms and computing, and it will be an enlightening and fun read for students and interested adults.
Author: Pedro Franco
Publisher: John Wiley & Sons
Release Date: 2014-10-21
Genre: Business & Economics
Discover Bitcoin, the cryptocurrency that has the finance worldbuzzing Bitcoin is arguably one of the biggest developments in financesince the advent of fiat currency. With UnderstandingBitcoin, expert author Pedro Franco provides financeprofessionals with a complete technical guide and resource to thecryptography, engineering and economic development of Bitcoin andother cryptocurrencies. This comprehensive, yet accessible workfully explores the supporting economic realities and technologicaladvances of Bitcoin, and presents positive and negative argumentsfrom various economic schools regarding its continuedviability. This authoritative text provides a step-by-step description ofhow Bitcoin works, starting with public key cryptography and movingon to explain transaction processing, the blockchain and miningtechnologies. This vital resource reviews Bitcoin from the broaderperspective of digital currencies and explores historical attemptsat cryptographic currencies. Bitcoin is, after all, not just adigital currency; it's a modern approach to the secure transfer ofvalue using cryptography. This book is a detailed guide to what itis, how it works, and how it just may jumpstart a change in the waydigital value changes hands. Understand how Bitcoin works, and the technology behind it Delve into the economics of Bitcoin, and its impact on thefinancial industry Discover alt-coins and other available cryptocurrencies Explore the ideas behind Bitcoin 2.0 technologies Learn transaction protocols, micropayment channels, atomiccross-chain trading, and more Bitcoin challenges the basic assumption under which the currentfinancial system rests: that currencies are issued by centralgovernments, and their supply is managed by central banks. To fullyunderstand this revolutionary technology, UnderstandingBitcoin is a uniquely complete, reader-friendly guide.