Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Matemáticas 775
- Álgebra 765
- Álgebra y geometría 525
- Àlgebra 200
- Mathematics 188
- Álgebra lineal 187
- Algebra 170
- Aritmética 97
- Data processing 89
- Àlgebra lineal 81
- Algebra lineal 79
- Matemàtica 78
- Problemes, exercicis, etc 60
- Machine learning 58
- Aritmètica 55
- Geometría 50
- Python (Computer program language) 48
- Trigonometría 44
- Ensenyament 41
- Artificial intelligence 40
- Ciencias Exactas 39
- Numerical analysis 36
- Mathematical models 35
- Computer science 34
- Engineering & Applied Sciences 33
- Algebra de Boole 32
- Physical Sciences & Mathematics 32
- Análisis matemático 31
- Engineering mathematics 31
- Matematicas 31
-
4281por Rebaza, JorgeTabla de Contenidos: “…A First Course in Applied Mathematics; CONTENTS; Preface; 1 Basics of Linear Algebra; 1.1 Notation and Terminology; 1.2 Vector and Matrix Norms; 1.3 Dot Product and Orthogonality; 1.4 Special Matrices; 1.4.1 Diagonal and triangular matrices; 1.4.2 Hessenberg matrices; 1.4.3 Nonsingular and inverse matrices; 1.4.4 Symmetric and positive definite matrices; 1.4.5 Matrix exponential; 1.4.6 Permutation matrices; 1.4.7 Orthogonal matrices; 1.5 Vector Spaces; 1.6 Linear Independence and Basis; 1.7 Orthogonalization and Direct Sums; 1.8 Column Space, Row Space, and Null Space…”
Publicado 2012
Libro electrónico -
4282Publicado 2009Tabla de Contenidos: “…3.4.2 Optical Communication Beaconing3.4.3 Network Architecture; 3.5 Evaluation; 3.5.1 Localization Accuracy; 3.5.2 Node Density; 3.5.3 Latency; 3.6 Conclusions; References; Chapter 4. Building an Algebraic Topological Model of Wireless Camera Networks; 4.1 Introduction; 4.2 Mathematical Background; 4.2.1 Simplicial Homology; 4.2.2 Example; 4.2.3 Cech Theorem; 4.3 The Camera and the Environment Models; 4.4 The CN-Complex; 4.5 Recovering Topology: 2D Case; 4.5.1 Algorithms; 4.5.2 Simulation in 2D; 4.6 Recovering Topology: 2.5D Case; 4.6.1 Mapping from 2.5D to 2D; 4.6.2 Building the CN-Complex…”
Libro electrónico -
4283por Ferdjallah, MohammedTabla de Contenidos: “…2.5 SIGNED AND UNSIGNED NUMBERS2.6 BINARY ARITHMETIC; 2.7 ADDITION OF SIGNED NUMBERS; 2.8 BINARY-CODED DECIMAL REPRESENTATION; 2.9 BCD ADDITION; PROBLEMS; 3 Boolean Algebra and Logic; 3.1 OBJECTIVES; 3.2 BOOLEAN THEORY; 3.3 LOGIC VARIABLES AND LOGIC FUNCTIONS; 3.4 BOOLEAN AXIOMS AND THEOREMS; 3.5 BASIC LOGIC GATES AND TRUTH TABLES; 3.6 LOGIC REPRESENTATIONS AND CIRCUIT DESIGN; 3.7 TRUTH TABLE; 3.8 TIMING DIAGRAM; 3.9 LOGIC DESIGN CONCEPTS; 3.10 SUM-OF-PRODUCTS DESIGN; 3.11 PRODUCT-OF-SUMS DESIGN; 3.12 DESIGN EXAMPLES; 3.13 NAND AND NOR EQUIVALENT CIRCUIT DESIGN…”
Publicado 2011
Libro electrónico -
4284Publicado 2024Tabla de Contenidos: “…-- Tools needed for flowcharts and pseudocode -- Pseudocode tools -- Flowchart tools -- Whiteboarding -- Design exercises -- The quadradic equation -- The beer program -- Final project - Robot startup system -- Design requirements -- Design logic -- Wait sequence -- Pseudocode -- Flowchart -- Summary -- Questions -- Chapter 6: Boolean Algebra -- Technical requirements -- What is Boolean algebra? …”
Libro electrónico -
4285Publicado 2013Tabla de Contenidos: “…2.4.5 Printers -- 2.4.6 Telecommunications Equipment -- 2.4.7 Digital Cameras -- 2.4.8 Character Codes -- 2.5 SUMMARY -- 3 THE DIGITAL LOGIC LEVEL -- 3.1 GATES AND BOOLEAN ALGEBRA -- 3.1.1 Gates -- 3.1.2 Boolean Algebra -- 3.1.3 Implementation of Boolean Functions -- 3.1.4 Circuit Equivalence -- 3.2 BASIC DIGITAL LOGIC CIRCUITS -- 3.2.1 Integrated Circuits -- 3.2.2 Combinational Circuits -- 3.2.3 Arithmetic Circuits -- 3.2.4 Clocks -- 3.3 MEMORY -- 3.3.1 Latches -- 3.3.2 Flip-Flops -- 3.3.3 Registers -- 3.3.4 Memory Organization -- 3.3.5 Memory Chips -- 3.3.6 RAMs and ROMs -- 3.4 CPU CHIPS AND BUSES -- 3.4.1 CPU Chips -- 3.4.2 Computer Buses -- 3.4.3 Bus Width -- 3.4.4 Bus Clocking -- 3.4.5 Bus Arbitration -- 3.4.6 Bus Operations -- 3.5 EXAMPLE CPU CHIPS -- 3.5.1 The Intel Core i7 -- 3.5.2 The Texas Instruments OMAP4430 System-on-a-Chip -- 3.5.3 The Atmel ATmega168 Microcontroller -- 3.6 EXAMPLE BUSES -- 3.6.1 The PCI Bus -- 3.6.2 PCI Express -- 3.6.3 The Universal Serial Bus -- 3.7 INTERFACING -- 3.7.1 I/O Interfaces -- 3.7.2 Address Decoding -- 3.8 SUMMARY -- 4 THE MICROARCHITECTURE LEVEL -- 4.1 AN EXAMPLE MICROARCHITECTURE -- 4.1.1 The Data Path -- 4.1.2 Microinstructions -- 4.1.3 Microinstruction Control: The Mic-1 -- 4.2 AN EXAMPLE ISA: IJVM -- 4.2.1 Stacks -- 4.2.2 The IJVM Memory Model -- 4.2.3 The IJVM Instruction Set -- 4.2.4 Compiling Java to IJVM -- 4.3 AN EXAMPLE IMPLEMENTATION -- 4.3.1 Microinstructions and Notation -- 4.3.2 Implementation of IJVM Using the Mic-1 -- 4.4 DESIGN OF THE MICROARCHITECTURE LEVEL -- 4.4.1 Speed versus Cost -- 4.4.2 Reducing the Execution Path Length -- 4.4.3 A Design with Prefetching: The Mic-2 -- 4.4.4 A Pipelined Design: The Mic-3 -- 4.4.5 A Seven-Stage Pipeline: The Mic-4 -- 4.5 IMPROVING PERFORMANCE -- 4.5.1 Cache Memory -- 4.5.2 Branch Prediction -- 4.5.3 Out-of-Order Execution and Register Renaming…”
Libro electrónico -
4286Publicado 2000Tabla de Contenidos: “…QUÍMICA TEÓRICA Y COMPUTACIONAL ; PÁGINA LEGAL; ÍNDICE; CAPÍTULO 1 FUNDAMENTOS; 1.1 ÁLGEBRA LINEAL; 1.1.1 Matrices; 1.1.1.1 Definiciones sobre matrices.; 1.1.1.2 Propiedades de las matrices.; 1.1.2 Determinantes; 1.1.3 Espacios vectoriales complejos n-dimensionales; 1.1.3.1 Notación de Dirac.; 1.1.3.2 Vectores.; 1.1.3.3 Operadores en el espacio real de tres dimensiones.; 1.1.4 Cambio de base; 1.1.5 Valores propios; 1.1.5.1 Ecuación de valores propios.; 1.1.5.2 Propiedades de los vectores y valores propios de una matriz Hermítica.; 1.1.5.3 Ortogonalización de vectores…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4287por Moreau, Nicolas, 1945-Tabla de Contenidos: “…Vector quantization by transform2.5.6. Algebraic vector quantization; 2.6. Gain-shape vector quantization; 2.6.1. …”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4288Publicado 2008Tabla de Contenidos: “…Introduction; 1.1 About This Book; 1.2 Graphics on Handheld Devices; 1.3 Mobile Graphics Standards; Part I: Anatomy of a Graphics Engine; Chapter 2. Linear Algebra for 3D Graphics; 2.1 Coordinate Systems; 2.2 Matrices; 2.3 Affine Transformations; 2.4 Eye Coordinate System; 2.5 Projections; 2.6 Viewport and 2D Coordinate Systems; Chapter 3. …”
Libro electrónico -
4289por Klette, ReinhardTabla de Contenidos: “…Introduction; 1.1 Pictures; 1.1.1 Pixels, voxels, and their values; 1.1.2 Picture resolution and picture size; 1.1.3 Scan orders; 1.1.4 Adjacency and connectedness; 1.2 Digital Geometry and Related Disciplines; 1.2.1 Coordinates and metric spaces; 1.2.2 Euclidean, similarity, and affine geometry; 1.2.3 Projective geometry; 1.2.4 Vector and geometric algebra; 1.2.5 Graph theory; 1.2.6 Topology; 1.2.7 Approximation and estimation; 1.2.8 Combinatorial geometry; 1.2.9 Computational geometry; 1.2.10 Fuzzy geometry…”
Publicado 2004
Libro electrónico -
4290por Harris, David MoneyTabla de Contenidos: “…1.6.1 Supply Voltage1.6.2 Logic Levels; 1.6.3 Noise Margins; 1.6.4 DC Transfer Characteristics; 1.6.5 The Static Discipline; 1.7 CMOS Transistors*; 1.7.1 Semiconductors; 1.7.2 Diodes; 1.7.3 Capacitors; 1.7.4 nMOS and pMOS Transistors; 1.7.5 CMOS NOT Gate; 1.7.6 Other CMOS Logic Gates; 1.7.7 Transmission Gates; 1.7.8 Pseudo-nMOS Logic; 1.8 Power Consumption*; 1.9 Summary and a Look Ahead; Exercises; Interview Questions; 2 Combinational Logic Design; 2.1 Introduction; 2.2 Boolean Equations; 2.2.1 Terminology; 2.2.2 Sum-of-Products Form; 2.2.3 Product-of-Sums Form; 2.3 Boolean Algebra…”
Publicado 2012
Libro electrónico -
4291Publicado 2011Tabla de Contenidos: “…Block Codes (Grigorii Kabatiansky, Evgenii Krouk, Andrei Ovchinnikov, and Sergei Semenov) -- 3.1 Main Definitions -- 3.2 Algebraic Structures -- 3.3 Linear Block Codes -- 3.4 Cyclic Codes -- 3.5 Bounds on Minimum Distance -- 3.6 Minimum Distance Decoding -- 3.7 Information Set Decoding -- 3.8 Hamming Codes -- 3.9 Reed-Solomon Codes -- 3.10 BCH Codes -- 3.11 Decoding of BCH Codes -- 3.12 Sudan Algorithm and Its Extensions -- 3.13 LDPC Codes -- References -- 4. …”
Libro electrónico -
4292Publicado 2018“…Some knowledge of linear algebra, calculus, and the Python programming language will help you understand the concepts covered in this book. …”
Libro electrónico -
4293Publicado 2015Tabla de Contenidos: “…Anaconda from Continuum Analytics -- Interactive visualization -- Event listeners -- Layouts -- Circular layout -- Radial layout -- Balloon layout -- Summary -- Chapter 3: Getting Started with the Python IDE -- The IDE tools in Python -- Python 3.x versus Python 2.7 -- Types of interactive tools -- IPython -- Plotly -- Types of Python IDE -- PyCharm -- PyDev -- Interactive Editor for Python (IEP) -- Canopy from Enthought -- Anaconda from Continuum Analytics -- Visualization plots with Anaconda -- The surface-3D plot -- The square map plot -- Interactive visualization packages -- Bokeh -- VisPy -- Summary -- Chapter 4: Numerical Computing and Interactive Plotting -- NumPy, SciPy, and MKL functions -- NumPy -- NumPy universal functions -- Shape and reshape manipulation -- An example of interpolation -- Vectorizing functions -- Summary of NumPy linear algebra -- SciPy -- An example of linear equations -- The vectorized numerical derivative -- MKL functions -- The performance of Python -- Scalar selection -- Slicing -- Slice using flat -- Array indexing -- Numerical indexing -- Logical indexing -- Other data structures -- Stacks -- Tuples -- Sets -- Queues -- Dictionaries -- Dictionaries for matrix representation -- Sparse matrices -- Dictionaries for memoization -- Tries -- Visualization using matplotlib -- Word clouds -- Installing word clouds -- Input for word clouds -- Web feeds -- The Twitter text -- Plotting the stock price chart -- Obtaining data -- The visualization example in sports -- Summary -- Chapter 5: Financial and Statistical Models -- The deterministic model -- Gross returns -- The stochastic model -- Monte Carlo simulation -- What exactly is Monte Carlo simulation? …”
Libro electrónico -
4294por Ray, ChhandaTabla de Contenidos: “…Cover -- Distributed Database Systems -- Copyright -- Contents -- Preface -- Overview of Relational1 DBMS -- Concepts of Relational Databases -- Integrity Constraints -- Normalization -- Functional Dependencies -- Normal Forms -- Relational Algebra -- Selection Operation -- Projection Operation -- Union Operation -- Set Difference Operation -- Cartesian Product Operation -- Intersection Operation -- Join Operation -- Division Operation -- Relational Database Management System -- Chapter Summary -- Exercises -- Review of Database Systems -- Evolution of Distributed Database System -- Overview of Parallel Processing System -- Parallel Databases -- Benefits of Parallel Databases -- Parallel Database Architectures -- Parallel Database Design -- Data Partitioning -- Chapter Summary -- Exercises -- Distributed Database Concepts -- Fundamentals of Distributed Databases -- Features of a Distributed DBMS -- Advantages and Disadvantages of Distributed -- An Example of Distributed -- Homogeneous and Heterogeneous Distributed -- Functions of Distributed -- Components of a Distributed -- Date's 12 Objectives for Distributed Database Systems -- Chapter Summary -- Exercises -- Overview of Computer Networking -- Introduction to Networking -- Types of Computer Networks -- Communication Schemes -- Network Topologies -- The OSI Model -- Network Protocols -- TCP/IP -- SPX/IPX -- NetBIOS -- APPC -- DEC net -- Apple Talk -- WAP -- The Internet and the World-Wide Web -- Chapter Summary -- Exercises -- Distributed Database Design -- Distributed Database Design Concepts -- Alternative Approaches for Distributed Database Design -- Objectives of Data Distribution -- Alternative Strategies for Data Allocation -- Data Fragmentation -- Benefits of Data Fragmentation -- Correctness Rules for Data Fragmentation -- Different Types of Fragmentation -- The Allocation of Fragments…”
Publicado 2009
Libro electrónico -
4295por Gallegos Ruiz, AmaliaTabla de Contenidos: “…LENGUAJES RELACIONALES -- 6.1 TIPOS DE LENGUAJES RELACIONALES -- 6.2 OPERACIONES EN EL MODELO RELACIONAL -- 6.3 ÁLGEBRA RELACIONAL -- 6.3.1 CLASIFICACIÓN DE OPERADORES -- 6.3.2 DENOMINACIÓN DE ATRIBUTOS -- 6.3.3 RELACIONES DERIVADAS -- 6.3.4 OPERACIONES PRIMITIVAS: SELECCIÓN, (...) -- 6.3.5 OTRAS OPERACIONES: INTERSECCIÓN, (...) -- 6.4 CÁLCULO RELACIONAL…”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4296Publicado 2017Tabla de Contenidos: “…Nemenzo, Masami Isoda, Maitree Inprasitha, Sampan Thinwiangthong, Narumon Changsri, Nisakorn Boonsena, Chan Roth, Monkolsery Lin, Souksomphone Anothay, Phoutsakhone Channgakham, Nguyen Chi Thanh, VŨ NHƯ Thư Hương, Phương Thảo Nguyễn -- Teaching and learning mathematics in Turkey, Huriye Arikan -- Part 6: Reports from the Topical Study Groups -- Topic study group no. 01 Early childhood mathematics education (up to age 7), Iliada Elia, Joanne Mulligan -- Topic study group no. 02 Mathematics education at tertiary level, Victor Giraldo, Chris Rasmussen -- Topic study group no. 03 Mathematics education in and for work, Diana Coben, Geoff Wake -- Topic study group no. 04 Activities for, and research on, mathematically gifted students, Florence Mihaela Singer, Linda Jensen Sheffield -- Topic study group no. 05 Classroom practice and research for students with mathematical learning difficulties, Lourdes Figueiras, Rose Griffiths -- Topic study group no. 06 Adult learning, Pradeep Kumar Misra, Jürgen Maaß -- Topic study group no. 07 Populariztion of Mathematics, Christian Mercat, Patrick Vennebush -- Topic study group no. 08 Teaching and learning of arithmetic and number systems (focus on primary education), Pi-Jen Lin, Terezinha Nunes -- Topic study group no. 09 Teaching and learning of measurement (focus on primary education), Christine Chambris, Barbara Dougherty -- Topic study group no. 10 Teaching and learning of early algebra, Carolyn Kieran, JeongSuk Pang -- Topic study group no. 11 Teaching and Learning of Algebra, Rakhi Banerjee, Amy Ellis -- Topic study group no. 12 Teaching and learning of geometry (primary level), Sinan Olkun, Ewa Swoboda -- Topic study group no. 13 Teaching and learning of geometry – secondary level, Ui Hock Cheah, Patricio G. …”
Libro electrónico -
4297por Yang, Won Y.Tabla de Contenidos: “…A Vector -- Appendix D Laplace Transform -- Appendix E Fourier Transform -- Appendix F Useful Formulas -- Appendix G Symbolic Computation -- G.1 How to Declare Symbolic Variables and Handle Symbolic Expressions -- G.2 Calculus -- G.2.1 Symbolic Summation -- G.2.2 Limits -- G.2.3 Differentiation -- G.2.4 Integration -- G.2.5 Taylor Series Expansion -- G.3 Linear Algebra -- G.4 Solving Algebraic Equations -- G.5 Solving Differential Equations -- Appendix H Sparse Matrices -- Appendix I MATLAB -- References -- Index -- Index for MATLAB Functions -- Index for Tables -- EULA…”
Publicado 2020
Libro electrónico -
4298Publicado 2023Tabla de Contenidos: “…2.2 Instrumentation Operators -- 2.3 Instrumentation Correctness -- 3 Instrumentation Application Strategies -- 4 Instrumentation Operators for Arrays -- 4.1 Instrumentation Operators for Quantification over Arrays -- 4.2 Instrumentation Operators for Aggregation over Arrays -- 5 Evaluation -- 5.1 Implementation -- 5.2 Experiments and Comparisons -- 6 Related Work -- 7 Conclusion -- References -- Boolean Abstractions for Realizability Modulo Theories -- 1 Introduction -- 2 Preliminaries -- 3 Boolean Abstraction -- 3.1 Notation -- 3.2 The Boolean Abstraction Algorithm -- 3.3 From Local Simulation to Equi-Realizability -- 4 Efficient Algorithms for Boolean Abstraction -- 4.1 Quasi-reactions -- 4.2 Quasi-reaction-based Optimizations -- 4.3 A Single Model-Loop Algorithm (Algorithm 2) -- 4.4 A Nested-SAT Algorithm (Algorithm 3) -- 5 Empirical Evaluation -- 6 Related Work and Conclusions -- References -- Certified Verification for Algebraic Abstraction -- 1 Introduction -- 2 Preliminaries -- 3 ToyLang -- 3.1 Syntax and Semantics -- 4 Algebraic Abstraction -- 4.1 Soundness Conditions -- 4.2 Polynomial Program Verification -- 5 Certified Verification -- 5.1 Verified Abstraction Algorithm -- 5.2 Verification through Certification -- 5.3 Optimization -- 6 Evaluation -- 6.1 Field and Group Operation in Elliptic Curves -- 6.2 Number-Theoretic Transform in Kyber -- 7 Conclusion -- References -- Complete Multiparty Session Type Projection with Automata -- 1 Introduction -- 2 Motivation and Overview -- 3 Preliminaries -- 4 Synthesizing Implementations -- 5 Checking Implementability -- 6 Soundness -- 7 Completeness -- 8 Complexity -- 9 Evaluation -- 10 Discussion -- 11 Related Work -- References -- Early Verification of Legal Compliance via Bounded Satisfiability Checking -- 1 Introduction -- 2 Preliminaries -- 3 Bounded Satisfiability Checking Problem…”
Libro electrónico -
4299Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
4300por Valderrey Sanz, PabloTabla de Contenidos: “…EL MODELO RELACIONAL; 2.1 INTRODUCCIÓN AL MODELO RELACIONAL; 2.2 RELACIONES; 2.2.1 Definición formal de relación; 2.2.2 Propiedades y tipos de relaciones; 2.2.3 Intención y extensión de las relaciones; 2.2.4 Claves de las relaciones; 2.2.5 Nulos; 2.3 RESTRICCIONES; 2.4 ESQUEMAS DE BASES DE DATOS RELACIONALES; 2.4.1 Grafos relacionales; 2.4.2 Esquemas relacionales; 2.5 ÁLGEBRA RELACIONAL; 2.5.1 Operaciones relacionales básicas; 2.5.2 Otras operaciones relacionales (...) ; 2.6 NORMALIZACIÓN; 2.6.1 Formas normales; 2.6.2 Primera forma normal…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico