ManusCrypt


Book Description

Information security primarily serves these six distinct purposes—authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation. The entire gamut of infosec rests upon cryptography. The author begins as a protagonist to explain that modern cryptography is more suited for machines rather than humans. This is explained through a brief history of ciphers and their evolution into cryptography and its various forms. The premise is further reinforced by a critical assessment of algorithm-based modern cryptography in the age of emerging technologies like artificial intelligence and blockchain. With simple and lucid examples, the author demonstrates that the hypothetical "man versus machine" scenario is not by chance, but by design. The book doesn’t end here like most others that wind up with a sermon on ethics and eventual merging of humans with technology (i.e., singularity). A very much practicable solution has been presented with a real-world use-case scenario, wherein infosec is designed around the needs, biases, flaws and skills of humans. This innovative approach, as trivial as it may seem to some, has the power to bring about a paradigm shift in the overall strategy of information technology that can change our world for the better.







Computational Science and Its Applications -- ICCSA 2004


Book Description

The natural mission of Computational Science is to tackle all sorts of human problems and to work out intelligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che- stry, environmental science, physics and several other scienti?c and engineering disciplines) is increasingly turning its attention to all ?elds of human activity. In all activities, in fact, intensive computation, information handling, kn- ledge synthesis, the use of ad-hoc devices, etc. increasingly need to be exploited and coordinated regardless of the location of both the users and the (various and heterogeneous) computing platforms. As a result the key to understanding the explosive growth of this discipline lies in two adjectives that more and more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregiveninthepresentfourLNCSvolumescontainingthecontri- tions delivered at the 2004 International Conference on Computational Science and its Applications (ICCSA 2004) held in Assisi, Italy, May 14–17, 2004.







ManusCrypt


Book Description

A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans.