Secure Communicating Systems: Design, Analysis, and ImplementationThis volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical... | | Constraint Processing (The Morgan Kaufmann Series in Artificial Intelligence)
A constraint is a restriction on a space of possibilities; it is a piece of knowledge that
narrows the scope of this space. Because constraints arise naturally in most areas of
human endeavor, they are the most general means for formulating regularities that
govern our computational, physical, biological, and social worlds. Some... | | Victimology
Unmasking Women and Crime provides a cohesive view of the theory, history, and current issues having to do with the intersection between women and crime. This fresh perspective from recognized experts brings women out from behind the mask of simplistic stereotyping and examines the nuanced roles and issues of women offenders, women victims,... |