Beyond Human: Living with Robots and Cyborgs
Author: Gregory Benford
Would your body work better with some artificial parts? Will you live longer, perhaps a lot longer, than you now expect? The next decade promises another qualitative shift in the way we view technology, as once purely fictional concepts—robots, cyborg parts, and the many variations in between—become part of reality.
Beyond Human treats the landscape of human self-change and robotic development as poles of the same phenomenon. Can we go too far in making ourselves machine-like or making machines resemble us? Once made, what will such creatures think about us? These questions will arise in myriad ways in the next few decades, as we press against boundaries that a short while ago existed only in works of the imagination. Written in a lively and provocative style, this is a readable book about the accumulation of small scientific advances that add up to something large and challenging.
Go to: Ten Years Younger or Cross Training For Dummies
Network Security Essentials: Applications and Standards
Author: William Stallings
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography–covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
Table of Contents:
Ch. 1 | Introduction | 1 |
Ch. 2 | Symmetric encryption and message confidentiality | 28 |
Ch. 3 | Public-key cryptography and message authentication | 59 |
Ch. 4 | Authentication applications | 94 |
Ch. 5 | Electronic mail security | 130 |
Ch. 6 | IP security | 177 |
Ch. 7 | Web security | 221 |
Ch. 8 | Network management security | 257 |
Ch. 9 | Intruders | 299 |
Ch. 10 | Malicious software | 332 |
Ch. 11 | Firewalls | 355 |
App. A | Some aspects of number theory | 381 |
App. B | Projects for teaching network security | 386 |
No comments:
Post a Comment