Mostrando 4,281 - 4,300 Resultados de 4,558 Para Buscar '"Álgebra"', tiempo de consulta: 0.14s Limitar resultados
  1. 4281
    por Rebaza, Jorge
    Publicado 2012
    Tabla de Contenidos: “…A First Course in Applied Mathematics; CONTENTS; Preface; 1 Basics of Linear Algebra; 1.1 Notation and Terminology; 1.2 Vector and Matrix Norms; 1.3 Dot Product and Orthogonality; 1.4 Special Matrices; 1.4.1 Diagonal and triangular matrices; 1.4.2 Hessenberg matrices; 1.4.3 Nonsingular and inverse matrices; 1.4.4 Symmetric and positive definite matrices; 1.4.5 Matrix exponential; 1.4.6 Permutation matrices; 1.4.7 Orthogonal matrices; 1.5 Vector Spaces; 1.6 Linear Independence and Basis; 1.7 Orthogonalization and Direct Sums; 1.8 Column Space, Row Space, and Null Space…”
    Libro electrónico
  2. 4282
    Publicado 2009
    Tabla de Contenidos: “…3.4.2 Optical Communication Beaconing3.4.3 Network Architecture; 3.5 Evaluation; 3.5.1 Localization Accuracy; 3.5.2 Node Density; 3.5.3 Latency; 3.6 Conclusions; References; Chapter 4. Building an Algebraic Topological Model of Wireless Camera Networks; 4.1 Introduction; 4.2 Mathematical Background; 4.2.1 Simplicial Homology; 4.2.2 Example; 4.2.3 Cech Theorem; 4.3 The Camera and the Environment Models; 4.4 The CN-Complex; 4.5 Recovering Topology: 2D Case; 4.5.1 Algorithms; 4.5.2 Simulation in 2D; 4.6 Recovering Topology: 2.5D Case; 4.6.1 Mapping from 2.5D to 2D; 4.6.2 Building the CN-Complex…”
    Libro electrónico
  3. 4283
    por Ferdjallah, Mohammed
    Publicado 2011
    Tabla de Contenidos: “…2.5 SIGNED AND UNSIGNED NUMBERS2.6 BINARY ARITHMETIC; 2.7 ADDITION OF SIGNED NUMBERS; 2.8 BINARY-CODED DECIMAL REPRESENTATION; 2.9 BCD ADDITION; PROBLEMS; 3 Boolean Algebra and Logic; 3.1 OBJECTIVES; 3.2 BOOLEAN THEORY; 3.3 LOGIC VARIABLES AND LOGIC FUNCTIONS; 3.4 BOOLEAN AXIOMS AND THEOREMS; 3.5 BASIC LOGIC GATES AND TRUTH TABLES; 3.6 LOGIC REPRESENTATIONS AND CIRCUIT DESIGN; 3.7 TRUTH TABLE; 3.8 TIMING DIAGRAM; 3.9 LOGIC DESIGN CONCEPTS; 3.10 SUM-OF-PRODUCTS DESIGN; 3.11 PRODUCT-OF-SUMS DESIGN; 3.12 DESIGN EXAMPLES; 3.13 NAND AND NOR EQUIVALENT CIRCUIT DESIGN…”
    Libro electrónico
  4. 4284
    Publicado 2024
    Tabla de Contenidos: “…-- Tools needed for flowcharts and pseudocode -- Pseudocode tools -- Flowchart tools -- Whiteboarding -- Design exercises -- The quadradic equation -- The beer program -- Final project - Robot startup system -- Design requirements -- Design logic -- Wait sequence -- Pseudocode -- Flowchart -- Summary -- Questions -- Chapter 6: Boolean Algebra -- Technical requirements -- What is Boolean algebra? …”
    Libro electrónico
  5. 4285
    Publicado 2013
    Tabla de Contenidos: “…2.4.5 Printers -- 2.4.6 Telecommunications Equipment -- 2.4.7 Digital Cameras -- 2.4.8 Character Codes -- 2.5 SUMMARY -- 3 THE DIGITAL LOGIC LEVEL -- 3.1 GATES AND BOOLEAN ALGEBRA -- 3.1.1 Gates -- 3.1.2 Boolean Algebra -- 3.1.3 Implementation of Boolean Functions -- 3.1.4 Circuit Equivalence -- 3.2 BASIC DIGITAL LOGIC CIRCUITS -- 3.2.1 Integrated Circuits -- 3.2.2 Combinational Circuits -- 3.2.3 Arithmetic Circuits -- 3.2.4 Clocks -- 3.3 MEMORY -- 3.3.1 Latches -- 3.3.2 Flip-Flops -- 3.3.3 Registers -- 3.3.4 Memory Organization -- 3.3.5 Memory Chips -- 3.3.6 RAMs and ROMs -- 3.4 CPU CHIPS AND BUSES -- 3.4.1 CPU Chips -- 3.4.2 Computer Buses -- 3.4.3 Bus Width -- 3.4.4 Bus Clocking -- 3.4.5 Bus Arbitration -- 3.4.6 Bus Operations -- 3.5 EXAMPLE CPU CHIPS -- 3.5.1 The Intel Core i7 -- 3.5.2 The Texas Instruments OMAP4430 System-on-a-Chip -- 3.5.3 The Atmel ATmega168 Microcontroller -- 3.6 EXAMPLE BUSES -- 3.6.1 The PCI Bus -- 3.6.2 PCI Express -- 3.6.3 The Universal Serial Bus -- 3.7 INTERFACING -- 3.7.1 I/O Interfaces -- 3.7.2 Address Decoding -- 3.8 SUMMARY -- 4 THE MICROARCHITECTURE LEVEL -- 4.1 AN EXAMPLE MICROARCHITECTURE -- 4.1.1 The Data Path -- 4.1.2 Microinstructions -- 4.1.3 Microinstruction Control: The Mic-1 -- 4.2 AN EXAMPLE ISA: IJVM -- 4.2.1 Stacks -- 4.2.2 The IJVM Memory Model -- 4.2.3 The IJVM Instruction Set -- 4.2.4 Compiling Java to IJVM -- 4.3 AN EXAMPLE IMPLEMENTATION -- 4.3.1 Microinstructions and Notation -- 4.3.2 Implementation of IJVM Using the Mic-1 -- 4.4 DESIGN OF THE MICROARCHITECTURE LEVEL -- 4.4.1 Speed versus Cost -- 4.4.2 Reducing the Execution Path Length -- 4.4.3 A Design with Prefetching: The Mic-2 -- 4.4.4 A Pipelined Design: The Mic-3 -- 4.4.5 A Seven-Stage Pipeline: The Mic-4 -- 4.5 IMPROVING PERFORMANCE -- 4.5.1 Cache Memory -- 4.5.2 Branch Prediction -- 4.5.3 Out-of-Order Execution and Register Renaming…”
    Libro electrónico
  6. 4286
    Publicado 2000
    Tabla de Contenidos: “…QUÍMICA TEÓRICA Y COMPUTACIONAL ; PÁGINA LEGAL; ÍNDICE; CAPÍTULO 1 FUNDAMENTOS; 1.1 ÁLGEBRA LINEAL; 1.1.1 Matrices; 1.1.1.1 Definiciones sobre matrices.; 1.1.1.2 Propiedades de las matrices.; 1.1.2 Determinantes; 1.1.3 Espacios vectoriales complejos n-dimensionales; 1.1.3.1 Notación de Dirac.; 1.1.3.2 Vectores.; 1.1.3.3 Operadores en el espacio real de tres dimensiones.; 1.1.4 Cambio de base; 1.1.5 Valores propios; 1.1.5.1 Ecuación de valores propios.; 1.1.5.2 Propiedades de los vectores y valores propios de una matriz Hermítica.; 1.1.5.3 Ortogonalización de vectores…”
    Libro electrónico
  7. 4287
    por Moreau, Nicolas, 1945-
    Publicado 2011
    Tabla de Contenidos: “…Vector quantization by transform2.5.6. Algebraic vector quantization; 2.6. Gain-shape vector quantization; 2.6.1. …”
    Libro electrónico
  8. 4288
    Publicado 2008
    Tabla de Contenidos: “…Introduction; 1.1 About This Book; 1.2 Graphics on Handheld Devices; 1.3 Mobile Graphics Standards; Part I: Anatomy of a Graphics Engine; Chapter 2. Linear Algebra for 3D Graphics; 2.1 Coordinate Systems; 2.2 Matrices; 2.3 Affine Transformations; 2.4 Eye Coordinate System; 2.5 Projections; 2.6 Viewport and 2D Coordinate Systems; Chapter 3. …”
    Libro electrónico
  9. 4289
    por Klette, Reinhard
    Publicado 2004
    Tabla de Contenidos: “…Introduction; 1.1 Pictures; 1.1.1 Pixels, voxels, and their values; 1.1.2 Picture resolution and picture size; 1.1.3 Scan orders; 1.1.4 Adjacency and connectedness; 1.2 Digital Geometry and Related Disciplines; 1.2.1 Coordinates and metric spaces; 1.2.2 Euclidean, similarity, and affine geometry; 1.2.3 Projective geometry; 1.2.4 Vector and geometric algebra; 1.2.5 Graph theory; 1.2.6 Topology; 1.2.7 Approximation and estimation; 1.2.8 Combinatorial geometry; 1.2.9 Computational geometry; 1.2.10 Fuzzy geometry…”
    Libro electrónico
  10. 4290
    por Harris, David Money
    Publicado 2012
    Tabla de Contenidos: “…1.6.1 Supply Voltage1.6.2 Logic Levels; 1.6.3 Noise Margins; 1.6.4 DC Transfer Characteristics; 1.6.5 The Static Discipline; 1.7 CMOS Transistors*; 1.7.1 Semiconductors; 1.7.2 Diodes; 1.7.3 Capacitors; 1.7.4 nMOS and pMOS Transistors; 1.7.5 CMOS NOT Gate; 1.7.6 Other CMOS Logic Gates; 1.7.7 Transmission Gates; 1.7.8 Pseudo-nMOS Logic; 1.8 Power Consumption*; 1.9 Summary and a Look Ahead; Exercises; Interview Questions; 2 Combinational Logic Design; 2.1 Introduction; 2.2 Boolean Equations; 2.2.1 Terminology; 2.2.2 Sum-of-Products Form; 2.2.3 Product-of-Sums Form; 2.3 Boolean Algebra…”
    Libro electrónico
  11. 4291
    Publicado 2011
    Tabla de Contenidos: “…Block Codes (Grigorii Kabatiansky, Evgenii Krouk, Andrei Ovchinnikov, and Sergei Semenov) -- 3.1 Main Definitions -- 3.2 Algebraic Structures -- 3.3 Linear Block Codes -- 3.4 Cyclic Codes -- 3.5 Bounds on Minimum Distance -- 3.6 Minimum Distance Decoding -- 3.7 Information Set Decoding -- 3.8 Hamming Codes -- 3.9 Reed-Solomon Codes -- 3.10 BCH Codes -- 3.11 Decoding of BCH Codes -- 3.12 Sudan Algorithm and Its Extensions -- 3.13 LDPC Codes -- References -- 4. …”
    Libro electrónico
  12. 4292
    Publicado 2018
    “…Some knowledge of linear algebra, calculus, and the Python programming language will help you understand the concepts covered in this book. …”
    Libro electrónico
  13. 4293
    Publicado 2015
    Tabla de Contenidos: “…Anaconda from Continuum Analytics -- Interactive visualization -- Event listeners -- Layouts -- Circular layout -- Radial layout -- Balloon layout -- Summary -- Chapter 3: Getting Started with the Python IDE -- The IDE tools in Python -- Python 3.x versus Python 2.7 -- Types of interactive tools -- IPython -- Plotly -- Types of Python IDE -- PyCharm -- PyDev -- Interactive Editor for Python (IEP) -- Canopy from Enthought -- Anaconda from Continuum Analytics -- Visualization plots with Anaconda -- The surface-3D plot -- The square map plot -- Interactive visualization packages -- Bokeh -- VisPy -- Summary -- Chapter 4: Numerical Computing and Interactive Plotting -- NumPy, SciPy, and MKL functions -- NumPy -- NumPy universal functions -- Shape and reshape manipulation -- An example of interpolation -- Vectorizing functions -- Summary of NumPy linear algebra -- SciPy -- An example of linear equations -- The vectorized numerical derivative -- MKL functions -- The performance of Python -- Scalar selection -- Slicing -- Slice using flat -- Array indexing -- Numerical indexing -- Logical indexing -- Other data structures -- Stacks -- Tuples -- Sets -- Queues -- Dictionaries -- Dictionaries for matrix representation -- Sparse matrices -- Dictionaries for memoization -- Tries -- Visualization using matplotlib -- Word clouds -- Installing word clouds -- Input for word clouds -- Web feeds -- The Twitter text -- Plotting the stock price chart -- Obtaining data -- The visualization example in sports -- Summary -- Chapter 5: Financial and Statistical Models -- The deterministic model -- Gross returns -- The stochastic model -- Monte Carlo simulation -- What exactly is Monte Carlo simulation? …”
    Libro electrónico
  14. 4294
    por Ray, Chhanda
    Publicado 2009
    Tabla de Contenidos: “…Cover -- Distributed Database Systems -- Copyright -- Contents -- Preface -- Overview of Relational1 DBMS -- Concepts of Relational Databases -- Integrity Constraints -- Normalization -- Functional Dependencies -- Normal Forms -- Relational Algebra -- Selection Operation -- Projection Operation -- Union Operation -- Set Difference Operation -- Cartesian Product Operation -- Intersection Operation -- Join Operation -- Division Operation -- Relational Database Management System -- Chapter Summary -- Exercises -- Review of Database Systems -- Evolution of Distributed Database System -- Overview of Parallel Processing System -- Parallel Databases -- Benefits of Parallel Databases -- Parallel Database Architectures -- Parallel Database Design -- Data Partitioning -- Chapter Summary -- Exercises -- Distributed Database Concepts -- Fundamentals of Distributed Databases -- Features of a Distributed DBMS -- Advantages and Disadvantages of Distributed -- An Example of Distributed -- Homogeneous and Heterogeneous Distributed -- Functions of Distributed -- Components of a Distributed -- Date's 12 Objectives for Distributed Database Systems -- Chapter Summary -- Exercises -- Overview of Computer Networking -- Introduction to Networking -- Types of Computer Networks -- Communication Schemes -- Network Topologies -- The OSI Model -- Network Protocols -- TCP/IP -- SPX/IPX -- NetBIOS -- APPC -- DEC net -- Apple Talk -- WAP -- The Internet and the World-Wide Web -- Chapter Summary -- Exercises -- Distributed Database Design -- Distributed Database Design Concepts -- Alternative Approaches for Distributed Database Design -- Objectives of Data Distribution -- Alternative Strategies for Data Allocation -- Data Fragmentation -- Benefits of Data Fragmentation -- Correctness Rules for Data Fragmentation -- Different Types of Fragmentation -- The Allocation of Fragments…”
    Libro electrónico
  15. 4295
    por Gallegos Ruiz, Amalia
    Publicado 2017
    Tabla de Contenidos: “…LENGUAJES RELACIONALES -- 6.1 TIPOS DE LENGUAJES RELACIONALES -- 6.2 OPERACIONES EN EL MODELO RELACIONAL -- 6.3 ÁLGEBRA RELACIONAL -- 6.3.1 CLASIFICACIÓN DE OPERADORES -- 6.3.2 DENOMINACIÓN DE ATRIBUTOS -- 6.3.3 RELACIONES DERIVADAS -- 6.3.4 OPERACIONES PRIMITIVAS: SELECCIÓN, (...) -- 6.3.5 OTRAS OPERACIONES: INTERSECCIÓN, (...) -- 6.4 CÁLCULO RELACIONAL…”
    Libro electrónico
  16. 4296
    Publicado 2017
    Tabla de Contenidos: “…Nemenzo, Masami Isoda, Maitree Inprasitha, Sampan Thinwiangthong, Narumon Changsri, Nisakorn Boonsena, Chan Roth, Monkolsery Lin, Souksomphone Anothay, Phoutsakhone Channgakham, Nguyen Chi Thanh, VŨ NHƯ Thư Hương, Phương Thảo Nguyễn -- Teaching and learning mathematics in Turkey, Huriye Arikan -- Part 6: Reports from the Topical Study Groups -- Topic study group no. 01 Early childhood mathematics education (up to age 7), Iliada Elia, Joanne Mulligan -- Topic study group no. 02 Mathematics education at tertiary level, Victor Giraldo, Chris Rasmussen -- Topic study group no. 03 Mathematics education in and for work, Diana Coben, Geoff Wake -- Topic study group no. 04 Activities for, and research on, mathematically gifted students, Florence Mihaela Singer, Linda Jensen Sheffield -- Topic study group no. 05 Classroom practice and research for students with mathematical learning difficulties, Lourdes Figueiras, Rose Griffiths -- Topic study group no. 06 Adult learning, Pradeep Kumar Misra, Jürgen Maaß -- Topic study group no. 07 Populariztion of Mathematics, Christian Mercat, Patrick Vennebush -- Topic study group no. 08 Teaching and learning of arithmetic and number systems (focus on primary education), Pi-Jen Lin, Terezinha Nunes -- Topic study group no. 09 Teaching and learning of measurement (focus on primary education), Christine Chambris, Barbara Dougherty -- Topic study group no. 10 Teaching and learning of early algebra, Carolyn Kieran, JeongSuk Pang -- Topic study group no. 11 Teaching and Learning of Algebra, Rakhi Banerjee, Amy Ellis -- Topic study group no. 12 Teaching and learning of geometry (primary level), Sinan Olkun, Ewa Swoboda -- Topic study group no. 13 Teaching and learning of geometry – secondary level, Ui Hock Cheah, Patricio G. …”
    Libro electrónico
  17. 4297
    por Yang, Won Y.
    Publicado 2020
    Tabla de Contenidos: “…A Vector -- Appendix D Laplace Transform -- Appendix E Fourier Transform -- Appendix F Useful Formulas -- Appendix G Symbolic Computation -- G.1 How to Declare Symbolic Variables and Handle Symbolic Expressions -- G.2 Calculus -- G.2.1 Symbolic Summation -- G.2.2 Limits -- G.2.3 Differentiation -- G.2.4 Integration -- G.2.5 Taylor Series Expansion -- G.3 Linear Algebra -- G.4 Solving Algebraic Equations -- G.5 Solving Differential Equations -- Appendix H Sparse Matrices -- Appendix I MATLAB -- References -- Index -- Index for MATLAB Functions -- Index for Tables -- EULA…”
    Libro electrónico
  18. 4298
    Publicado 2023
    Tabla de Contenidos: “…2.2 Instrumentation Operators -- 2.3 Instrumentation Correctness -- 3 Instrumentation Application Strategies -- 4 Instrumentation Operators for Arrays -- 4.1 Instrumentation Operators for Quantification over Arrays -- 4.2 Instrumentation Operators for Aggregation over Arrays -- 5 Evaluation -- 5.1 Implementation -- 5.2 Experiments and Comparisons -- 6 Related Work -- 7 Conclusion -- References -- Boolean Abstractions for Realizability Modulo Theories -- 1 Introduction -- 2 Preliminaries -- 3 Boolean Abstraction -- 3.1 Notation -- 3.2 The Boolean Abstraction Algorithm -- 3.3 From Local Simulation to Equi-Realizability -- 4 Efficient Algorithms for Boolean Abstraction -- 4.1 Quasi-reactions -- 4.2 Quasi-reaction-based Optimizations -- 4.3 A Single Model-Loop Algorithm (Algorithm 2) -- 4.4 A Nested-SAT Algorithm (Algorithm 3) -- 5 Empirical Evaluation -- 6 Related Work and Conclusions -- References -- Certified Verification for Algebraic Abstraction -- 1 Introduction -- 2 Preliminaries -- 3 ToyLang -- 3.1 Syntax and Semantics -- 4 Algebraic Abstraction -- 4.1 Soundness Conditions -- 4.2 Polynomial Program Verification -- 5 Certified Verification -- 5.1 Verified Abstraction Algorithm -- 5.2 Verification through Certification -- 5.3 Optimization -- 6 Evaluation -- 6.1 Field and Group Operation in Elliptic Curves -- 6.2 Number-Theoretic Transform in Kyber -- 7 Conclusion -- References -- Complete Multiparty Session Type Projection with Automata -- 1 Introduction -- 2 Motivation and Overview -- 3 Preliminaries -- 4 Synthesizing Implementations -- 5 Checking Implementability -- 6 Soundness -- 7 Completeness -- 8 Complexity -- 9 Evaluation -- 10 Discussion -- 11 Related Work -- References -- Early Verification of Legal Compliance via Bounded Satisfiability Checking -- 1 Introduction -- 2 Preliminaries -- 3 Bounded Satisfiability Checking Problem…”
    Libro electrónico
  19. 4299
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  20. 4300
    por Valderrey Sanz, Pablo
    Publicado 2014
    Tabla de Contenidos: “…EL MODELO RELACIONAL; 2.1 INTRODUCCIÓN AL MODELO RELACIONAL; 2.2 RELACIONES; 2.2.1 Definición formal de relación; 2.2.2 Propiedades y tipos de relaciones; 2.2.3 Intención y extensión de las relaciones; 2.2.4 Claves de las relaciones; 2.2.5 Nulos; 2.3 RESTRICCIONES; 2.4 ESQUEMAS DE BASES DE DATOS RELACIONALES; 2.4.1 Grafos relacionales; 2.4.2 Esquemas relacionales; 2.5 ÁLGEBRA RELACIONAL; 2.5.1 Operaciones relacionales básicas; 2.5.2 Otras operaciones relacionales (...) ; 2.6 NORMALIZACIÓN; 2.6.1 Formas normales; 2.6.2 Primera forma normal…”
    Libro electrónico