Skip to content

    Computer Science Textbooks

    Filters

    +
    Read more about Yet Another Introductory Number Theory Textbook (Cryptology Emphasis Version)

    Yet Another Introductory Number Theory Textbook (Cryptology Emphasis Version)

    Copyright Year:

    Contributor: Poritz

    Publisher: Jonathan Poritz

    License: CC BY-SA

    This version of YAINTT has a particular emphasis on connections to cryptology. The cryptologic material appears in Chapter 4 and §§5.5 and 5.6, arising naturally (I hope) out of the ambient number theory. The main cryptologic applications – being the RSA cryptosystem, Diffie-Hellman key exchange, and the ElGamal cryptosystem – come out so naturally from considerations of Euler’s Theorem, primitive roots, and indices that it renders quite ironic G.H. Hardy’s assertion [Har05] of the purity and eternal inapplicability of number theory. Note, however, that once we broach the subject of these cryptologic algorithms, we take the time to make careful definitions for many cryptological concepts and to develop some related ideas of cryptology which have much more tenuous connections to the topic of number theory. This material therefore has something of a different flavor from the rest of the text – as is true of all scholarly work in cryptology (indeed, perhaps in all of computer science), which is clearly a discipline with a different culture from that of “pure”mathematics. Obviously, these sections could be skipped by an uninterested reader, or remixed away by an instructor for her own particular class approach.

    whole starwhole starwhole starwhole starempty star

    (1 review)

    READ MORE

    Read more about A Tale of Two Systems

    A Tale of Two Systems

    Copyright Year:

    Contributors: Reitsma and Krueger

    Publisher: Oregon State University

    License: CC BY-NC-SA

    This is the story of a web-based information system rebuild. The system in question is www.teachengineering.org, a digital library of K-12 engineering curriculum that was built from the ground up with established technology and which for 13 years enjoyed lasting support from its growing user community and its sponsors. These 13 years, however, cover the period during which smart phones and tablets became commonplace, during which the Internet of Things started replacing the Semantic Web, during which NoSQL databases made their way out of the research labs and into everyday development shops, during which we collectively started moving IT functions and services into ‘the cloud,’ and during which computing performance doubled a few times, yet again. During this same period, TeachEngineering’s user base grew from a few hundred to more than 3 million users annually, its collection size quadrupled, it went through several user interface renewals, and significant functionality was added while having an exemplary service record, and it enjoyed continued financial support from its sponsors.

    No ratings

    (0 reviews)

    READ MORE

    Read more about Unmanned Aircraft Systems in the Cyber Domain - Second Edition

    Unmanned Aircraft Systems in the Cyber Domain - Second Edition

    Copyright Year:

    Contributors: Nichols, Mumm, and Lonstein

    Publisher: New Prairie Press

    License: CC BY-NC-SA

    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.

    whole starwhole starwhole starwhole starhalf star

    (4 reviews)

    READ MORE

    Read more about Technology in Schools

    Technology in Schools

    Copyright Year:

    Contributor: Ackerman

    Publisher: hackscience.education

    License: CC BY-NC

    My purpose in writing this book is to give readers a view into the work of managing information technology in schools. IT professionals will notice differences (some nuanced and some significant) between the needs and expectations of IT users in business and IT in school. With the more complete and more accurate concept the nature of the computing environment necessary for successful schooling, which I intend to provide through this book, IT professionals will be better prepared to meet those needs. Educators will also benefit from this book by clarifying the nature of their IT needs and how these may be different from those that are familiar to IT professionals who are hired to work in your school.

    whole starwhole starwhole starwhole starhalf star

    (1 review)

    READ MORE