Skip to Content

Books by Subject

Mathematical Logic Books

You are currently browsing 1–10 of 68 new and published books in the subject of Mathematical Logic — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Practical Cryptography

    Algorithms and Implementations Using C++

    Edited by Saiful Azad, Al-Sakib Khan Pathan

    Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an...

    Published November 16th 2014 by Auerbach Publications

  2. Introduction to Modern Cryptography, Second Edition

    By Jonathan Katz, Yehuda Lindell

    Series: Chapman & Hall/CRC Cryptography and Network Security Series

    Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of...

    Published November 5th 2014 by Chapman and Hall/CRC

  3. Hardware Security

    Design, Threats, and Safeguards

    By Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

    Published October 28th 2014 by Chapman and Hall/CRC

  4. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

    Published January 16th 2014 by Auerbach Publications

  5. Managing Trust in Cyberspace

    Edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey

    In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between...

    Published December 13th 2013 by Chapman and Hall/CRC

  6. Introduction to Computer and Network Security

    Navigating Shades of Gray

    By Richard R. Brooks

    Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical...

    Published August 18th 2013 by Chapman and Hall/CRC

  7. Distributed Networks

    Intelligence, Security, and Applications

    Edited by Qurban A. Memon

    For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,...

    Published July 21st 2013 by CRC Press

  8. Unauthorized Access

    The Crisis in Online Privacy and Security

    By Robert H. Sloan, Richard Warner

    Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in...

    Published July 14th 2013 by CRC Press

  9. Network Anomaly Detection

    A Machine Learning Perspective

    By Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita

    With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming...

    Published June 17th 2013 by Chapman and Hall/CRC

  10. Handbook of Finite Fields

    By Gary L. Mullen, Daniel Panario

    Series: Discrete Mathematics and Its Applications

    Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the...

    Published June 16th 2013 by Chapman and Hall/CRC