Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
Teaching content and measuring content are frequently considered separate entities when designing teaching instruction. This can create a disconnect between how students are taught and how well they succeed when it comes time for assessment. To heal this rift, the theory of meaningful learning is a potential solution for designing effective teaching-learning and assessment materials. Design and Measurement Strategies for Meaningful Learning considers the best practices, challenges, and opportunities of instructional design as well as the theory and impact of meaningful learning. It provides educators with an essential text instructing them on how to successfully design and measure the content they teach. Covering a wide range of topics such as blended learning, online interaction, and learning assessment, this reference work is ideal for teachers, instructional designers, curriculum developers, policymakers, administrators, academicians, researchers, practitioners, and students.
This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples of realistic size. A distinctive feature of the author's approach is the use of Maple as a programming environment in which not just the cryptographic primitives but also the most important cryptographic schemes are implemented following the recommendations of standards bodies such as NIST, with many of the known cryptanalytic attacks implemented as well. The purpose of the Maple implementations is to let the reader experiment and learn, and for this reason the author includes numerous examples. The book discusses important recent subjects such as homomorphic encryption, identity-based cryptography and elliptic curve cryptography. The algorithms and schemes which are treated in detail and implemented in Maple include AES and modes of operation, CMAC, GCM/GMAC, SHA-256, HMAC, RSA, Rabin, Elgamal, Paillier, Cocks IBE, DSA and ECDSA. In addition, some recently introduced schemes enjoying strong security properties, such as RSA-OAEP, Rabin-SAEP, Cramer--Shoup, and PSS, are also discussed and implemented. On the cryptanalysis side, Maple implementations and examples are used to discuss many important algorithms, including birthday and man-in-the-middle attacks, integer factorization algorithms such as Pollard's rho and the quadratic sieve, and discrete log algorithms such as baby-step giant-step, Pollard's rho, Pohlig--Hellman and the index calculus method. This textbook is suitable for advanced undergraduate and graduate students of computer science, engineering and mathematics, satisfying the requirements of various types of courses: a basic introductory course; a theoretically oriented course whose focus is on the precise definition of security concepts and on cryptographic schemes with reductionist security proofs; a practice-oriented course requiring little mathematical background and with an emphasis on applications; or a mathematically advanced course addressed to students with a stronger mathematical background. The main prerequisite is a basic knowledge of linear algebra and elementary calculus, and while some knowledge of probability and abstract algebra would be helpful, it is not essential because the book includes the necessary background from these subjects and, furthermore, explores the number-theoretic material in detail. The book is also a comprehensive reference and is suitable for self-study by practitioners and programmers."
Public Economics: A Concise Introduction provides a concise and non-technical overview of the role of government in the economy. Using the questions 'why?', 'what for?' and 'how?', the text initially surveys the place of the public sector in a market economy. It then considers the possible reasons which could justify government involvement. Next, the book examines the aims of state economic activity, and the instruments which a government has at its disposal. Lastly, the final chapter provides an illuminating tour of economic history and history of economic thought in relation to government economic activity. The book offers an international focus throughout, with examples taken from all over the globe. Readers are supported with a range of pedagogical features, including example boxes, chapter objectives and summaries, and end-of-chapter multiple choice and reflection questions. Public Economics: A Concise Introduction will be a valuable text for students on courses in public economics, welfare economics, public finance, public policy and related areas.
Public Economics: A Concise Introduction provides a concise and non-technical overview of the role of government in the economy. Using the questions 'why?', 'what for?' and 'how?', the text initially surveys the place of the public sector in a market economy. It then considers the possible reasons which could justify government involvement. Next, the book examines the aims of state economic activity, and the instruments which a government has at its disposal. Lastly, the final chapter provides an illuminating tour of economic history and history of economic thought in relation to government economic activity. The book offers an international focus throughout, with examples taken from all over the globe. Readers are supported with a range of pedagogical features, including example boxes, chapter objectives and summaries, and end-of-chapter multiple choice and reflection questions. Public Economics: A Concise Introduction will be a valuable text for students on courses in public economics, welfare economics, public finance, public policy and related areas.
Marine environment can be affected by several pollutants such as the presence of elements and their chemical species, pharmaceuticals, nanoparticles and other emerging contaminants. Environmental monitoring can be assessed by genomics, proteomics (i.e. redox proteomics), chemical speciation analysis and metallomics, metabolomics as well as other advanced strategies. The present book is a useful methodological tool for researchers and specialists in the field of analytical chemistry, environmental sciences, biochemistry, genomics and toxicology. The book includes for the first time the methodological aspects and applications related to chemical speciation and -omics strategies applied to marine environment.
This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples of realistic size. A distinctive feature of the author's approach is the use of Maple as a programming environment in which not just the cryptographic primitives but also the most important cryptographic schemes are implemented following the recommendations of standards bodies such as NIST, with many of the known cryptanalytic attacks implemented as well. The purpose of the Maple implementations is to let the reader experiment and learn, and for this reason the author includes numerous examples. The book discusses important recent subjects such as homomorphic encryption, identity-based cryptography and elliptic curve cryptography. The algorithms and schemes which are treated in detail and implemented in Maple include AES and modes of operation, CMAC, GCM/GMAC, SHA-256, HMAC, RSA, Rabin, Elgamal, Paillier, Cocks IBE, DSA and ECDSA. In addition, some recently introduced schemes enjoying strong security properties, such as RSA-OAEP, Rabin-SAEP, Cramer--Shoup, and PSS, are also discussed and implemented. On the cryptanalysis side, Maple implementations and examples are used to discuss many important algorithms, including birthday and man-in-the-middle attacks, integer factorization algorithms such as Pollard's rho and the quadratic sieve, and discrete log algorithms such as baby-step giant-step, Pollard's rho, Pohlig--Hellman and the index calculus method. This textbook is suitable for advanced undergraduate and graduate students of computer science, engineering and mathematics, satisfying the requirements of various types of courses: a basic introductory course; a theoretically oriented course whose focus is on the precise definition of security concepts and on cryptographic schemes with reductionist security proofs; a practice-oriented course requiring little mathematical background and with an emphasis on applications; or a mathematically advanced course addressed to students with a stronger mathematical background. The main prerequisite is a basic knowledge of linear algebra and elementary calculus, and while some knowledge of probability and abstract algebra would be helpful, it is not essential because the book includes the necessary background from these subjects and, furthermore, explores the number-theoretic material in detail. The book is also a comprehensive reference and is suitable for self-study by practitioners and programmers.
Marine environment can be affected by several pollutants such as the presence of elements and their chemical species, pharmaceuticals, nanoparticles and other emerging contaminants. Environmental monitoring can be assessed by genomics, proteomics (i.e. redox proteomics), chemical speciation analysis and metallomics, metabolomics as well as other advanced strategies. The present book is a useful methodological tool for researchers and specialists in the field of analytical chemistry, environmental sciences, biochemistry, genomics and toxicology. The book includes for the first time the methodological aspects and applications related to chemical speciation and -omics strategies applied to marine environment.
Teaching content and measuring content are frequently considered separate entities when designing teaching instruction. This can create a disconnect between how students are taught and how well they succeed when it comes time for assessment. To heal this rift, the theory of meaningful learning is a potential solution for designing effective teaching-learning and assessment materials. em>Design and Measurement Strategies for Meaningful Learning considers the best practices, challenges, and opportunities of instructional design as well as the theory and impact of meaningful learning. It provides educators with an essential text instructing them on how to successfully design and measure the content they teach. Covering a wide range of topics such as blended learning, online interaction, and learning assessment, this reference work is ideal for teachers, instructional designers, curriculum developers, policymakers, administrators, academicians, researchers, practitioners, and students.
|
You may like...
The Lie Of 1652 - A Decolonised History…
Patric Tariq Mellet
Paperback
(7)
|