1.

Record Nr.

UNINA9910254285703321

Autore

Lynch Stephen

Titolo

Dynamical Systems with Applications Using Mathematica® / / by Stephen Lynch

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2017

ISBN

3-319-61485-1

Edizione

[2nd ed. 2017.]

Descrizione fisica

1 online resource (XVI, 585 p. 270 illus., 98 illus. in color.)

Disciplina

510.285536

Soggetti

Dynamics

Mathematics

Differential equations

System theory

Engineering mathematics

Engineering - Data processing

Computer software

Dynamical Systems

Applications of Mathematics

Differential Equations

Complex Systems

Mathematical and Computational Engineering Applications

Mathematical Software

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

A Tutorial Introduction to Mathematica -- Differential Equations -- Planar Systems -- Interacting Species -- Limit Cycles -- Hamiltonian Systems, Lyapunov Functions, and Stability -- Bifurcation Theory -- Three-Dimensional Autonomous Systems and Chaos -- Poincaré Maps and Nonautonomous Systems in the Plane -- Local and Global Bifurcations -- The Second Part of Hilbert’s Sixteenth Problem -- Linear Discrete Dynamical Systems -- Nonlinear Discrete Dynamical Systems -- Complex Iterative Maps -- Electromagnetic Waves and Optical Resonators -- Fractals and Multifractals -- Chaos Control and



Synchronization -- Neural Networks -- Examination-Type Questions -- Solutions to Exercises.

Sommario/riassunto

This textbook, now in its second edition, provides a broad introduction to the theory and practice of both continuous and discrete dynamical systems with the aid of the Mathematica software suite. Taking a hands-on approach, the reader is guided from basic concepts to modern research topics. Emphasized throughout are numerous applications to biology, chemical kinetics, economics, electronics, epidemiology, nonlinear optics, mechanics, population dynamics, and neural networks. The book begins with an efficient tutorial introduction to Mathematica, enabling new users to become familiar with the program, while providing a good reference source for experts. Working Mathematica notebooks will be available at: http://library.wolfram.com/infocenter/Books/9563/ The author has focused on breadth of coverage rather than fine detail, with theorems and proofs being kept to a minimum, though references are included for the inquisitive reader. The book is intended for senior undergraduate and graduate students as well as working scientists in applied mathematics, the natural sciences, and engineering. Many of the chapters are especially useful as reference material for senior undergraduate independent project work. New to the second edition: Since the first printing of this book in 2007, Mathematica has evolved from version 6.0 to version 11.2 in 2017. Accordingly, the second edition has been thoroughly updated and new material has been added. There are many more applications, examples and exercises, all with solutions, and new sections on series solutions of ordinary differential equations and Newton fractals, have been added. There are also new chapters on delay differential equations, image processing, binary oscillator computing, and simulation with Wolfram SystemModeler. Praise for the first edition: “[This book’s] content and presentation style convey the excitement that has drawn many students and researchers to dynamical systems in the firstplace.” —Dynamical Systems Magazine “This book presents an original, cheap and powerful solution to the problem of analysis of large data sets.” —Studia Universitatis Babes’-Bolyai Mathematica “The one-liner programs come to life when typed in, and the growing programming skill lends itself to inventing [one's] own extensions to the supplied problems.” —Datafile, The Journal of the HPCC.



2.

Record Nr.

UNINA9910502589803321

Autore

Van Oorschot Paul C.

Titolo

Computer Security and the Internet : Tools and Jewels from Malware to Bitcoin / / by Paul C. van Oorschot

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021

ISBN

3-030-83411-5

Edizione

[2nd ed. 2021.]

Descrizione fisica

1 online resource (464 pages)

Collana

Information Security and Cryptography, , 2197-845X

Disciplina

005.8

Soggetti

Data protection

Security systems

Computer engineering

Computer networks

Telecommunication

Application software

Data and Information Security

Security Science and Technology

Computer Engineering and Networks

Communications Engineering, Networks

Computer and Information Systems Applications

Protecció de dades

Sistemes de seguretat

Enginyeria de programari

Telecomunicació

Programari d'aplicació

Seguretat informàtica

Llibres electrònics

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

1. Security Concepts and Principles -- 2. Cryptographic Building Blocks -- 3. User Authentication—Passwords, Biometrics and Alternatives -- 4. Authentication Protocols and Key Establishment.-5. Operating System



Security and Access Control -- 6. Software Security—Exploits and Privilege Escalation -- 7. Malicious Software -- 8. Public-Key Certificate Management and Use Cases -- 9. Web and Browser Security -- 10. Firewalls and Tunnels -- 11. Intrusion Detection and Network-Based Attacks -- 12. Wireless LAN Security: 802.11 and Wi-Fi -- 13. Bitcoin, Blockchains and Ethereum -- Epilogue -- Index. .

Sommario/riassunto

Building on the core strengths of the inaugural book, this second edition of a uniquely accessible textbook provides a concise, yet comprehensive overview of computer and Internet security. It builds on the design principles to address security-related error patterns that have plagued software and system designs for more than 50 years. Computer Security and the Internet is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details. The book reinforces fundamental academic concepts with examples and also relates these concepts to practical challenges and real-world incidents. Its overriding focus is brevity, without sacrificing breadth of core topics or technical detail within them; it designates selected content as optional to help readers prioritize topics. While knowledge of elementary operating-system and networking concepts is helpful, review sections summarize the essential background. Topics and features: Delivers comprehensive, technically sound explanations without burdening readers with mathematical proofs or lengthy source-code examples (NEW) adds chapter on wireless LAN security (Wi-Fi and 802.11) (NEW) adds chapter on Bitcoin and Ethereum, blockchains and cryptocurrencies Integrates inline exercises and supplemental per-chapter references and endnotes, bridging to further topics and serving as a springboard to research literature Dives selectively into fine points for exemplary topics to concretely illustrate concepts and principles Provides pointers to key surveys and relevant standards, including from the Internet Engineering Task Force and the U.S. National Institute of Standards and Technology Ideal for a one- or two-term introductory course for junior/senior undergraduate or first-year graduate students, this textbook/reference is also suitable for self-study by anyone seeking a solid footing in security, including software developers and computing professionals, technical managers, and government staff. Paul C. van Oorschot is a Professor of Computer Science at Carleton University (Ottawa), Canada Research Chair in Authentication and Computer Security, ACM Fellow, and IEEE Fellow. His earlier industrial career was in telecommunications and software security.