This book introduces the field of data science in a practical and accessible manner, using a hands-on approach that assumes no prior knowledge of the subject. The foundational ideas and techniques of data science are provided independently from technology, allowing students to easily develop a firm understanding of the subject without a strong technical background, as well as being presented wi…
Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s hist…
Laying the Foundation: Digital Humanities in Academic Libraries examines the library’s role in the development, implementation, and instruction of successful digital humanities projects. It pays special attention to the critical role of librarians in building sustainable programs. It also examines how libraries can support the use of digital scholarship tools and techniques in undergraduate e…
Over the last twenty years, advanced communication technologies have become pervasive throughout Western society. These technologies have not only revolutionised the delivery of public and private services, they have shaped consumers’ expectations about service quality. This guide (written for managers who have an interest in expanding their approach to public engagement, rather than IT profe…
This important volume examines European perspectives on the historical relations that women have maintained with information and communication technologies (ICTs), since the telegraph. Presenting a dialogue which encompasses a diverse selection of transnational and interdisciplinary studies, the text investigates forms of female empowerment, gendered representations and women's professionalizat…
This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication devices, highlighting the need to develop improved algorithms, protocols, and best practices to enhance the security of public, private and enterprise systems alike. Features: introduces the fundamentals of traditional computer networks and …
This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security …
This new and expanded monograph improves upon Mohan's earlier book, Residue Number Systems (Springer, 2002) with a state of the art treatment of the subject. Replete with detailed illustrations and helpful examples, this book covers a host of cutting edge topics such as the core function, the quotient function, new Chinese Remainder theorems, and large integer operations. It also features many …
This book constitutes the proceedings of the 19th International Conference on Theory and Practice of Digital Libraries, TPDL 2015, held in Poznań, Poland, in September 2015. The 22 full papers and 14 poster and demo papers presented in this volume were carefully reviewed and selected from 61 submissions. They were organized in topical sections named: interoperability and information integra…
This monograph presents a broad treatment of developments in an area of constructive approximation involving the so-called "max-product" type operators. The exposition highlights the max-product operators as those which allow one to obtain, in many cases, more valuable estimates than those obtained by classical approaches. The text considers a wide variety of operators which are studied for a n…