| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910458474003321 |
|
|
Autore |
Cupillari Antonella |
|
|
Titolo |
The nuts and bolts of proofs [[electronic resource] /] / Antonella Cupillari |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Amsterdam ; ; Boston, : Elsevier Academic Press, c2005 |
|
|
|
|
|
|
|
ISBN |
|
1-281-05681-2 |
9786611056810 |
0-08-053790-1 |
|
|
|
|
|
|
|
|
Edizione |
[3rd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (193 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Proof theory |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. 173-176) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; The Nuts and Bolts of Proofs; Copyright Page; List of Symbols; Contents; Preface; Chapter 1. Introduction and Basic Terminology; Chapter 2. General Suggestions; Chapter 3. Basic Techniques to Prove If/Then Statements; Direct Proof; Related Statements; Proof by Contrapositive (AKA Proof by Contradiction or Indirect Proof); How to Construct the Negation of a Statement; Chapter 4. Special Kinds of Theorems; ""If and Only If"" or ""Equivalence Theorems""; Use of Counterexamples; Mathematical Induction; Existence Theorems; Uniqueness Theorems; Equality of Sets; Equality of Numbers |
Composite StatementsLimits; Chapter 5. Review Exercises; Chapter 6. Exercises Without Solutions; Chapter 7. Collection of Proofs; Chapter 8. Solutions for the Exercises at the End of the Sections and the Review Exercises; Solutions for the Exercises at the End of the Sections; Solutions for the Review Exercises; Chapter 9. Other Books on the Subject of Proofs and Mathematical Writing; Index; A Guide to Selecting a Method of Proof |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The Nuts and Bolts of Proof instructs students on the basic logic of mathematical proofs, showing how and why proofs of mathematical statements work. It provides them with techniques they can use to |
|
|
|
|
|
|
|
|
|
|
|
|
|
gain an inside view of the subject, reach other results, remember results more easily, or rederive them if the results are forgotten.A flow chart graphically demonstrates the basic steps in the construction of any proof and numerous examples illustrate the method and detail necessary to prove various kinds of theorems.* The ""List of Symbols"" has been extended.* Set Theory section ha |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910349301503321 |
|
|
Titolo |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense : Control- and Game-Theoretic Approaches to Cyber Security / / edited by Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2019.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (VII, 263 p. 120 illus., 45 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 11830 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer crimes |
Computer engineering |
Computer networks |
Computers |
Computer science - Mathematics |
Mathematical statistics |
Computer Crime |
Computer Engineering and Networks |
Computing Milieux |
Computer Communication Networks |
Probability and Statistics in Computer Science |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Overview of Control and Game Theory in Adaptive Cyber-Defenses -- Control Theoretic Approaches to Cyber-Security -- Game-Theoretic |
|
|
|
|
|
|
|
|
|
|
|
Approaches to Cyber-Security: Issues and Challenges and Results -- Reinforcement Learning for Adaptive Cyber Defense against Zero-day Attacks -- Moving Target Defense Quantification -- Empirical Game-Theoretic Methods for Adaptive Cyber-Defense -- MTD Techniques for Memory Protection against Zero-Day Attacks -- Adaptive Cyber Defenses for Botnet Detection and Mitigation -- Optimizing Alert Data Management Processes at a Cyber Security Operations Center -- Online and Scalable Adaptive Cyber Defense. |
|
|
|
|
|
|
Sommario/riassunto |
|
Today’s cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous functionalities but randomized manifestations. The 10 papers included in this State-of-the Art Survey present recent advances made by a large team of researchers working on the same US Department of Defense Multidisciplinary University Research Initiative (MURI) project during 2013-2019. This project has developed a new class of technologies called Adaptive Cyber Defense (ACD) by building on two active but heretofore separate research areas: Adaptation Techniques (AT) and Adversarial Reasoning (AR). AT methods introduce diversity and uncertainty into networks, applications, and hosts. AR combines machine learning, behavioral science, operations research, control theory, and game theory to address the goal of computing effective strategies in dynamic, adversarial environments. . |
|
|
|
|
|
|
|
| |