Skip to Content

Books by Subject

Mathematical Logic Books

You are currently browsing 1–10 of 66 new and published books in the subject of Mathematical Logic — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

    Published January 16th 2014 by Auerbach Publications

  2. Managing Trust in Cyberspace

    Edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

    In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between...

    Published December 13th 2013 by Chapman and Hall/CRC

  3. Introduction to Computer and Network Security

    Navigating Shades of Gray

    By Richard R. Brooks

    Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical...

    Published August 18th 2013 by Chapman and Hall/CRC

  4. Distributed Networks

    Intelligence, Security, and Applications

    Edited by Qurban A. Memon

    For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,...

    Published July 21st 2013 by CRC Press

  5. Unauthorized Access

    The Crisis in Online Privacy and Security

    By Robert H. Sloan, Richard Warner

    Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in...

    Published July 14th 2013 by CRC Press

  6. Network Anomaly Detection

    A Machine Learning Perspective

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming...

    Published June 17th 2013 by Chapman and Hall/CRC

  7. Handbook of Finite Fields

    By Gary L. Mullen, Daniel Panario

    Series: Discrete Mathematics and Its Applications

    Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the...

    Published June 16th 2013 by Chapman and Hall/CRC

  8. Algebraic Curves in Cryptography

    By San Ling, Huaxiong Wang, Chaoping Xing

    Series: Discrete Mathematics and Its Applications

    The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a...

    Published June 12th 2013 by Chapman and Hall/CRC

  9. Discrete Dynamical Systems and Chaotic Machines

    Theory and Applications

    By Jacques M. Bahi, Christophe Guyeux

    Series: Chapman & Hall/CRC Numerical Analysis and Scientific Computing Series

    For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines:...

    Published June 6th 2013 by CRC Press

  10. Iris Biometric Model for Secured Network Access

    By Franjieh El Khoury

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured...

    Published May 7th 2013 by CRC Press