Browse Results

Showing 22,351 through 22,375 of 28,170 results

Secondary Stem Educational Reform

by Carla C. Johnson

Federal and state funding agencies have invested billions of dollars into secondary STEM (Science, Technology, Education, Mathematics) educational reform over the past decade. This volume addresses the interplay of external and internal variables associated with school reform and how this dynamic has impacted many efforts.

Secret History: The Story of Cryptology (Chapman & Hall/CRC Cryptography and Network Security Series #76)

by Craig Bauer

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers

Secret History: The Story of Cryptology (Discrete Mathematics and Its Applications)

by Craig P. Bauer

Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the

Secrets of Creation: The Mystery Of The Prime Numbers (Urbanomic / Redactions)

by Robin Mackay Conrad Shawcross Matthew Watkins

An artist and a mathematician debate, find common ground, and jointly create an assemblage that is neither (or both) an artwork and a mathematical model.A week-long residency project brought together artist Conrad Shawcross and mathematician Matthew Watkins to reflect on the ways in which artists use (or misuse) scientific and mathematical concepts. Secrets of Creation documents this fascinating meeting of worlds, presenting both the week's discussions and debates, and the project upon which Shawcross and Watkins subsequently embarked.Navigating a route that tacked between formalism and natural language, experts and laymen, quantity and quality, poetics and mechanics, Shawcross and Watkins gradually forged a shared discourse in which the concerns of the artist and those of the mathematician could find a common ground. The project ended with their joint creation of an assemblage that was neither (or both) an artwork and a mathematical model.

Secrets of Mental Math: The Mathemagician's Guide to Lightning Calculation and Amazing Math Tricks

by Michael Shermer Arthur Benjamin

These simple math secrets and tricks will forever change how you look at the world of numbers. Secrets of Mental Math will have you thinking like a math genius in no time. Get ready to amaze your friends--and yourself--with incredible calculations you never thought you could master, as renowned "mathemagician" Arthur Benjamin shares his techniques for lightning-quick calculations and amazing number tricks. This book will teach you to do math in your head faster than you ever thought possible, dramatically improve your memory for numbers, and--maybe for the first time--make mathematics fun. <p><p> Yes, even you can learn to do seemingly complex equations in your head; all you need to learn are a few tricks. You'll be able to quickly multiply and divide triple digits, compute with fractions, and determine squares, cubes, and roots without blinking an eye. No matter what your age or current math ability, Secrets of Mental Math will allow you to perform fantastic feats of the mind effortlessly. This is the math they never taught you in school.<p><p> <i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. To explore further access options with us, please contact us through the Book Quality link on the right sidebar. Benetech is actively working on projects to improve accessibility issues such as these.</i> <P> <b>There is another version of the book with mathematical expressions not rendered as images at https://www.bookshare.org/browse/book/446779</b>

Secrets of Mental Math: The Mathemagician's Guide to Lightning Calculation and Amazing Math Tricks, 1st Edition

by Michael Shermer Arthur Benjamin

Arthur Benjamin shares his techniques for lightning-quick calculations and amazing number tricks. This book will teach you to do math in your head faster than you ever thought possible, dramatically improve your memory for numbers, and--maybe for the first time--make mathematics fun.

Secrets of the Moon: Understanding and Analysing the Lunar Surface

by Gilbert Fielder

Secrets of the Moon: Understanding and Analysing the Lunar Surface provides a unique account of the origin of key features on the lunar surface. Containing historical accounts and the latest observations from the field, in addition to exciting data from the Apollo manned missions, it describes the development of our current understanding of our Moon. It also explores the fracturing of the Moon, a topic not explored in other literature in the area, and contains a statistical treatment of the smaller craters of the Moon, as well as a geological treatment of the larger craters. This moderately technical account is designed to clarify and update the general thinking on the nature and origin of the most important lunar surface features for both undergraduate and research students. It may also be read by the professional scientist, especially the astronomer and the geologist who has found little time to study the Moon’s topography, in addition to the lunar amateur astronomer and even the dedicated layman with a keen interest in lunar science. The book excludes nearly all mathematical symbols in order to remain accessible to those without a formal education in the area. Key Features: Authored by an expert in the area Presents a comprehensive account of the lunar surface, from historical observations to the NASA Apollo manned missions and the latest observations and data in the field Includes a statistical and geological treatment of the craters Dr. Gilbert Fielder is Reader Emeritus at Lancaster University, United Kingdom. He performed extended teaching at Lancaster University on Planetary Science and introduced a new degree course on Remote Sensing. Prior to this, he was Principal Investigator in NASA’s Heat Capacity Mapping Programme, while continuing to head the Lunar and Planetary Unit at Lancaster until retirement. Dr. Fielder has authored several books, and presented many BBC and ITA television news programmes, as well as popular programmes with Sir Patrick Moore (on the BBC’s "The Sky at Night") and, on the occasion of the first landing of astronauts on the Moon, with David Frost as Chairman in a special programme.

Secular Cycles

by Peter Turchin Sergey A. Nefedov

Many historical processes exhibit recurrent patterns of change. Century-long periods of population expansion come before long periods of stagnation and decline; the dynamics of prices mirror population oscillations; and states go through strong expansionist phases followed by periods of state failure, endemic sociopolitical instability, and territorial loss. Peter Turchin and Sergey Nefedov explore the dynamics and causal connections between such demographic, economic, and political variables in agrarian societies and offer detailed explanations for these long-term oscillations--what the authors call secular cycles. Secular Cycles elaborates and expands upon the demographic-structural theory first advanced by Jack Goldstone, which provides an explanation of long-term oscillations. This book tests that theory's specific and quantitative predictions by tracing the dynamics of population numbers, prices and real wages, elite numbers and incomes, state finances, and sociopolitical instability. Turchin and Nefedov study societies in England, France, and Russia during the medieval and early modern periods, and look back at the Roman Republic and Empire. Incorporating theoretical and quantitative history, the authors examine a specific model of historical change and, more generally, investigate the utility of the dynamical systems approach in historical applications. An indispensable and groundbreaking resource for a wide variety of social scientists, Secular Cycles will interest practitioners of economic history, historical sociology, complexity studies, and demography.

Secure Networked Inference with Unreliable Data Sources

by Aditya Vempaty Bhavya Kailkhura Pramod K. Varshney

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

Security Framework and Defense Mechanisms for IoT Reactive Jamming Attacks (Studies in Systems, Decision and Control #548)

by Alvaro Rocha Fadele Ayotunde Alaba

This book digs into the important confluence of cybersecurity and big data, providing insights into the ever-changing environment of cyber threats and solutions to protect these enormous databases. In the modern digital era, large amounts of data have evolved into the vital organs of businesses, providing the impetus for decision-making, creativity, and a competitive edge. Cyberattacks pose a persistent danger to this important resource since they can result in data breaches, financial losses, and harm to an organization's brand. Features of particular interest include: a. Understanding the Threat Landscape: The book gives a complete review of the many different types of cyber threats that target big data, including data breaches, ransomware attacks, and insider threats. b. Analysing Real-World Case Studies: The purpose of this section is to provide the reader with useful insights into the strategies, methods, and processes that cyber adversaries use via the in-depth examination of real-world assaults on big data. c. Strategies for Risk Mitigation: This book provides a comprehensive and actionable approach to reducing the dangers of cyberattacks on large amounts of data. It encompasses a broad variety of tactics, including network protection, encoding, and access restrictions d. Emerging Technologies: This section introduces readers to cutting-edge technologies and best practices for securing large data. e. Compliance with Regulations: The book examines the regulatory environment that governs data protection and privacy, including the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and industry-specific requirements. f. Trends of the Future: This book covers current trends and issues in cybersecurity and gives forward-looking views into the future of big data security. This is done in recognition that the cybersecurity environment is always shifting and developing. g. Contributors of Expertise: The book includes contributions from industry practitioners, data scientists, and cybersecurity specialists who have hands-on experience defending large data settings.

Security Management for Industrial Safety Critical Applications: A Practical Approach (Asset Analytics)

by Lalit Kumar Singh Pooja Singh Raj Kamal Kaur Ajit K. Verma

The book introduces dependability (security metric) ideas, gives a general overview of the security analysis of Safety-Critical Systems (SCSs), explains why the study is necessary and defines key terms relevant to this research. It makes an effort to emphasize the significance of security in comparison to other dependability indicators and illustrates the key drivers of this research's purpose. The mathematical foundation of the security analysis process is briefly illustrated, and key mathematical terminology and concepts are presented that are crucial for the security evaluation of critical systems. This book's objective is to provide a thorough understanding of the security analysis process. It will be a research-focused book designed for undergraduate, graduate, and doctoral courses in software and cyber security. The fundamentals of reliability, security, metrics, and mathematical foundation have been covered in this book. Each technique's actual applications, along with benefits and drawbacks, are also shown. Applying each technique to the various case studies serves as a demonstration of how it works. By using the many case studies of safety-critical systems, the students can also learn different analysis approaches and how to model them. Students will be able to use these tools, in particular, on a case study of their choice to analyze system security. The book includes a comparison of various strategies and appropriate recommendations for further reading on these subjects. Moreover, this book's target audience includes software professionals who are interested in security analysis.

Security Risk Models for Cyber Insurance

by David Rios Insua Caroline Baylon Jose Vila

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude—and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution – based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts – but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Security and Environmental Sustainability of Multimodal Transport

by Michael Bell Solmaz Haji Hosseinloo Urszula Kanturska

This book is the result of a NATO Advanced Research Workshop which was held at Imperial College London in January 2009. It features contributions from a range of international experts covering topics related to the transport of hazardous materials, such as routeing and scheduling, risk assessment, security, and social and environmental exposure. There is also a broad look at the implications of climate change for transport. This unique resource offers a deep understanding of hazardous material transportation and concomitant security and environmental problems. The risks involved in the transport of dangerous goods are shown to arise mainly from the location of the sources and destinations as well as the timing of deliveries. Environmental concerns, including the implications of climate change for transport, provide a useful context for the more analytical material. The book is timely and topical as the subjects covered have become a focus for public concern in recent years, due in part to terrorist attacks on transport systems. This comprehensive reference provides examples from around the world, illustrating the diversity of regulations which apply to the handling and transport of dangerous goods. It also provides interesting insights into the global energy supply chain and describes on-going work on establishing network vulnerability.

Security and Privacy in Cyberspace (Blockchain Technologies)

by Manoj Kumar Omprakash Kaiwartya Ashutosh Mishra Keshav Kaushik Sachin Kumar Gupta

This book highlights the literature and the practical aspects to understand cybersecurity and privacy in various networks and communication devices. It provides details of emerging technologies on various networks by protecting the privacy and security of cyberspace. This book presents state-of-the-art advances in the field of cryptography and network security, cybersecurity and privacy, providing a good reference for professionals and researchers.

Security and Trust Management: 20th International Workshop, STM 2024, Bydgoszcz, Poland, September 19–20, 2024, Proceedings (Lecture Notes in Computer Science #15235)

by Fabio Martinelli Ruben Rios

This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19–20, 2024 and co-located with ESORICS 2024 conference. The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions. They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.

Security for Software Engineers

by James N. Helfrich

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint. Features: <P><P> Targets software engineering students - one of the only security texts to target this audience. <P><P> Focuses on the white-hat side of the security equation rather than the black-hat side. <P><P> Includes many practical and real-world examples that easily translate into the workplace. <P><P> Covers a one-semester undergraduate course. <P><P> Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry. <P><P> This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user’s information assets.

Sedentary Behaviour Epidemiology (Springer Series on Epidemiology and Public Health)

by Michael F. Leitzmann Carmen Jochem Daniela Schmid

This book addresses the origins, determinants and magnitude of the global problem of sedentary behaviour, along with concise yet in-depth solutions for tackling it. As a consequence of major technological advances in modern society, many people find themselves in environments characterized by prolonged sedentary behaviour. Building on the contributions of leading experts in the field, the new edition of this book presents updated knowledge about sedentary behaviour, its medical and public health significance, its correlates and determinants, measurement techniques, and recommendations for addressing this behaviour at the individual, community, environmental, and policy level. The book encompasses current research linking the COVID-19 pandemic to increased levels of sedentary behavior, and it covers global and planetary health aspects of sedentary behavior, highlighting sustainable development goals such as health and well-being for all. Applying a cross-disciplinary methodology, the book avoids considering physical activity and sedentary behavior as a single continuum, which potentially hampers progress in confronting widespread levels of sedentariness. Rather, the book helps readers better understand how sedentary and physically active behavior co-occur and how the two behaviours have distinct contributing factors. Building on the contributions of distinguished international experts in the field, this thorough resource is a valuable asset and challenges professionals, researchers, students, and practitioners alike to adopt new strategies and expand their reach.

See Ya Later Calculator: Simple Math Tricks You Can Do in Your Head

by Editors of Portable Press

The math book for anyone who thinks they hate math, full of easy, entertaining and practical tricks for mentally solving problems in seconds.No matter how much you might try to avoid numbers, we all use math every day to calculate a tip, figure out an interest rate, or estimate the cost of the groceries in your cart. But the good news is, math can be easy—and even fun—if you know how to do it all in your head.With these simple and downright magical math tricks, you can do everyday math faster than it takes to dig out your phone and find the calculator app. Step-by-step and easy-to-memorize directions show more than 125 math operations anyone can do in their head.Plus, it features do-it-yourself math projects, puzzles, and a bonus section for advanced mathophiles. Get ready to tackle problems such as . . .• How to easily square any number • How to add three-digit numbers • How to use a mirror to measure the height of a building • How to make a ruler out of a dollar bill • How to use geometry to paint walls, cut floor tiling, and do other home renovations • How to subtract numbers . . . by adding And lots more . . . No calculator required.

Seeing Symmetry

by Amy Tao

Join us as we go on a journey into the world of symmetry! Learn about the wonders of line symmetry—or reflection—as you create mirror images and watch how rotational symmetry works in this brief peek into this area of geometry.

Seeing Through Statistics (Fourth Edition)

by Jessica M. Utts

Develops statistical literacy and critical thinking through real-world applications, with an emphasis on ideas, not calculations. This text focuses on the key concepts that educated citizens need to know about statistics.

Seemingly Unrelated Regression Equations Models: Estimation and Inference

by Virendera K. Srivastava David E.A. Giles

This book brings together the scattered literature associated with the seemingly unrelated regression equations (SURE) model used by econometricians and others. It focuses on the theoretical statistical results associated with the SURE model.

Segregation

by Eric Fong Brent Berry Kumiko Shibuya

Segregation is one of the starkest social realities of contemporary societies. Though often associated with explicitly racist laws of the past, it is a phenomenon that persists to this day and is a crucial element for understanding group relations and the wellbeing of different populations in society. In this book, Eric Fong and Kumiko Shibuya provide a thorough discussion of the evolving complexity of segregation in all its variety and variations. The authors focus not only on past trends and the development of segregation measures, but also the current state of affairs, and demonstrate the connections between the segregation of racial/ethnic groups, immigrant communities, and schools, along with poverty concentration. By taking a wide, cross-cutting view, the authors identify commonalities and differences in the causes, mechanisms, and consequences of segregation. Spatial and social segregation together perpetuate and reinforce the unequal distribution of resources among racial and ethnic groups, which in turn can have positive and negative consequences for individuals and groups. This critical overview of segregation will be a valuable and insightful resource for students of sociology, geography, and ethnic studies, as well as those keen to get a handle on this persistent challenge to equal and inclusive societies.

Sehbeeinträchtigung im Alter: Alltagserleben, Rehabilitation und Motivation (Blinden- und Sehbehindertenpädagogik im Kontext Lebenslangen Lernens)

by Sabine Lauber-Pohle Alexander Seifert

Sehbeeinträchtigungen im Alter zu erfahren, gehört für zunehmend mehr Menschen zu einer herausfordernden Alltagssituation. Das Buch nimmt sich dieser Lebenssituation der Seniorinnen und Senioren an und diskutiert anhand von theoretischen, empirischen und praxisevaluierenden Beiträgen die Vielfalt der sinnesbeeinträchtigenden Herausforderung im Alltag der älteren Menschen. Mit dem Buch präsentieren Expertinnen und Experten aus dem deutschsprachigen Raum ihre Forschungsergebnisse und beschreiben ihre Beratungsprojekte. Sie liefern so einen Fundus für die praktische Arbeit mit älteren Menschen.

Seismic Imaging and Inversion

by Robert H. Stolt Arthur B. Weglein

Extracting information from seismic data requires knowledge of seismic wave propagation and reflection. The commonly used method involves solving linearly for a reflectivity at every point within the Earth, but this book follows an alternative approach which invokes inverse scattering theory. By developing the theory of seismic imaging from basic principles, the authors relate the different models of seismic propagation, reflection and imaging - thus providing links to reflectivity-based imaging on the one hand and to nonlinear seismic inversion on the other. The comprehensive and physically complete linear imaging foundation developed presents new results at the leading edge of seismic processing for target location and identification. This book serves as a fundamental guide to seismic imaging principles and algorithms and their foundation in inverse scattering theory and is a valuable resource for working geoscientists, scientific programmers and theoretical physicists.

Seismic Performance Analysis of Concrete Gravity Dams (Advanced Topics in Science and Technology in China #57)

by Gaohui Wang Wenbo Lu Sherong Zhang

This book evaluates the seismic performance of concrete gravity dams, considering the effects of strong motion duration, mainshock-aftershock seismic sequence, and near-fault ground motion. It employs both the extended finite element method (XFEM) and concrete damaged plasticity (CDP) models to characterize the mechanical behavior of concrete gravity dams under strong ground motions, including the dam-reservoir-foundation interaction. In addition, it discusses the effects of the initial crack, earthquake direction, and cross-stream seismic excitation on the nonlinear dynamic response to strong ground motions, and on the damage-cracking risk of concrete gravity dams.This book provides a theoretical basis for the seismic performance evaluation of high dams, and can also be used as a reference resource for researchers and graduate students engaged in the seismic design of high dams.

Refine Search

Showing 22,351 through 22,375 of 28,170 results