Skip to Content

Books by Subject

Mathematical Logic Books

You are currently browsing 1–10 of 71 new and published books in the subject of Mathematical Logic — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Multilevel Modeling of Secure Systems in QoP-ML

    By Bogdan Księżopolski

    In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and...

    Published June 10th 2015 by Auerbach Publications

  2. Group Theoretic Cryptography

    By Maria Isabel González Vasco, Rainer Steinwandt

    Series: Chapman & Hall/CRC Cryptography and Network Security Series

    Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential...

    Published April 1st 2015 by Chapman and Hall/CRC

  3. Application of Fuzzy Logic to Social Choice Theory

    By John N. Mordeson, Davender S. Malik, Terry D. Clark

    Series: Monographs and Research Notes in Mathematics

    Fuzzy social choice theory is useful for modeling the uncertainty and imprecision prevalent in social life yet it has been scarcely applied and studied in the social sciences. Filling this gap, Application of Fuzzy Logic to Social Choice Theory provides a comprehensive study of fuzzy social choice...

    Published March 3rd 2015 by Chapman and Hall/CRC

  4. Practical Cryptography

    Algorithms and Implementations Using C++

    Edited by Saiful Azad, Al-Sakib Khan Pathan

    Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an...

    Published November 17th 2014 by Auerbach Publications

  5. Introduction to Modern Cryptography, Second Edition

    By Jonathan Katz, Yehuda Lindell

    Series: Chapman & Hall/CRC Cryptography and Network Security Series

    Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of...

    Published November 6th 2014 by Chapman and Hall/CRC

  6. Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

    Published October 29th 2014 by Chapman and Hall/CRC

  7. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

    Published January 17th 2014 by Auerbach Publications

  8. Managing Trust in Cyberspace

    Edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

    In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between...

    Published December 14th 2013 by Chapman and Hall/CRC

  9. Introduction to Computer and Network Security

    Navigating Shades of Gray

    By Richard R. Brooks

    Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical...

    Published August 19th 2013 by Chapman and Hall/CRC

  10. Distributed Networks

    Intelligence, Security, and Applications

    Edited by Qurban A. Memon

    For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,...

    Published July 22nd 2013 by CRC Press