We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
In this original and modern book, the complexities of quantum phenomena and quantum resource theories are meticulously unravelled, from foundational entanglement and thermodynamics to the nuanced realms of asymmetry and beyond. Ideal for those aspiring to grasp the full scope of quantum resources, the text integrates advanced mathematical methods and physical principles within a comprehensive, accessible framework. Including over 760 exercises throughout, to develop and expand key concepts, readers will gain an unrivalled understanding of the topic. With its unique blend of pedagogical depth and cutting-edge research, it not only paves the way for a deep understanding of quantum resource theories but also illuminates the path toward innovative research directions. Providing the latest developments in the field as well as established knowledge within a unified framework, this book will be indispensable to students, educators, and researchers interested in quantum science's profound mysteries and applications.
Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA students and industry professionals explores key Web3 concepts, starting from foundational principles and moving to advanced topics like blockchain, smart contracts, tokenomics, and DeFi. The book takes a clear, practical approach to demystify the tech behind NFTs and DAOs as well as the complex regulatory landscape. It confronts challenges of blockchain scalability, a barrier to mainstream adoption of this transformative technology, and examines smart contracts and the growing ecosystem leveraging their potential. The book also explains the nuances of tokenomics, a vital element underpinning Web3's new economic model. This book is ideal for readers seeking to stay on top of emerging trends in the digital economy.
The book offers a succinct overview of the technical components of blockchain networks, also known as distributed digital ledger networks. Written from an academic perspective, it surveys ongoing research challenges as well as existing literature. Several chapters illustrate how the mathematical tools of game theory and algorithmic mechanism design can be applied to the analysis, design, and improvement of blockchain network protocols. Using an engineering perspective, insights are provided into how the economic interests of different types of participants shape the behaviors of blockchain systems. Readers are thus provided with a paradigm for developing blockchain consensus protocols and distributed economic mechanisms that regulate the interactions of system participants, thus leading to desired cooperative behaviors in the form of system equilibria. This book will be a vital resource for students and scholars of this budding field.
Drawing on philosophies of gaming and play from Heraclitus and Plato through to Marx, Nietzsche and Heidegger, Kostas Axelos outlines an extraordinary, unique vision of our contemporary world. Originally published in 1969, The Game of the World brilliantly anticipates a twenty-first century in which ever-accelerating technological transformations coincide with a world at play and in play, at once fragmentary and totalised, disordered and hyper-organised. In the midst of this paradoxical and deranging becoming-planetary of the world, Axelos offers a sequence of profound meditations on play and playing, games and gaming, directing us towards new means of thinking and action that may enable us to face the world-historical challenges of our own present.
Providing a logical framework for student learning, this is the first textbook on adversarial learning. It introduces vulnerabilities of deep learning, then demonstrates methods for defending against attacks and making AI generally more robust. To help students connect theory with practice, it explains and evaluates attack-and-defense scenarios alongside real-world examples. Feasible, hands-on student projects, which increase in difficulty throughout the book, give students practical experience and help to improve their Python and PyTorch skills. Book chapters conclude with questions that can be used for classroom discussions. In addition to deep neural networks, students will also learn about logistic regression, naïve Bayes classifiers, and support vector machines. Written for senior undergraduate and first-year graduate courses, the book offers a window into research methods and current challenges. Online resources include lecture slides and image files for instructors, and software for early course projects for students.
At the forefront of cutting-edge technologies, this text provides a comprehensive treatment of a crucial network performance metric, ushering in new opportunities for rethinking the whole design of communication systems. Detailed exposition of the communication and network theoretic foundations of Age of Information (AoI) gives the reader a solid background, and discussion of the implications on signal processing and control theory shed light on the important potential of recent research. The text includes extensive real-world applications of this vital metric, including caching, the Internet of Things (IoT), and energy harvesting networks. The far-reaching applications of AoI include networked monitoring systems, cyber-physical systems such as the IoT, and information-oriented systems and data analytics applications ranging from the stock market to social networks. The future of this exciting subject in 5G communication systems and beyond make this a vital resource for graduate students, researchers and professionals.
Data is now one of, if not the world's most valuable resource. The adoption of data-driven applications across economic sectors has made data and the flow of data so pervasive that it has become integral to everything we as members of society do - from conducting our finances to operating businesses to powering the apps we use every day. For this reason, governing cross-border data flows is inherently difficult given the ubiquity and value of data, and the impact government policies can have on national competitiveness, business attractiveness and personal rights. The challenge for governments is to address in a coherent manner the broad range of data-related issues in the context of a global data-driven economy.
This book engages with the unexplored topic of why and how governments should develop a coherent and consistent strategic framework regulating cross-border data flows. The objective is to fill a very significant gap in the legal and policy setting by considering multiple perspectives in order to assist in the development of a jurisdiction's coherent and strategic policy framework.
As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and end users. Analyzing data across different segments of cybersecurity domains, particularly data generated during cyber-attacks, can help us understand threats better, prevent future cyber-attacks, and provide insights into the evolving cyber threat landscape. This book takes a data oriented approach to studying cyber threats, showing in depth how traditional methods such as anomaly detection can be extended using data analytics and also applies data analytics to non-traditional views of cybersecurity, such as multi domain analysis, time series and spatial data analysis, and human-centered cybersecurity.
An interdisciplinary volume of essays identifying the impact of technology on the age-old cultural practice of collecting, as well as the opportunities and pitfalls of collecting in the digital era.
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.
Using easy-to-follow mathematics, this textbook provides comprehensive coverage of block codes and techniques for reliable communications and data storage. It covers major code designs and constructions from geometric, algebraic, and graph-theoretic points of view, decoding algorithms, error control additive white Gaussian noise (AWGN) and erasure, and dataless recovery. It simplifies a highly mathematical subject to a level that can be understood and applied with a minimum background in mathematics, provides step-by-step explanation of all covered topics, both fundamental and advanced, and includes plenty of practical illustrative examples to assist understanding. Numerous homework problems are included to strengthen student comprehension of new and abstract concepts, and a solutions manual is available online for instructors. Modern developments, including polar codes, are also covered. An essential textbook for senior undergraduates and graduates taking introductory coding courses, students taking advanced full-year graduate coding courses, and professionals working on coding for communications and data storage.
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology - a hybridization of machine learning, artificial intelligence, and social network analysis methods - and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems.
In this unique collection the authors present a wide range of interdisciplinary methods to study, document, and conserve material cultural heritage. The methods used serve as exemplars of best practice with a wide variety of cultural heritage objects having been recorded, examined, and visualised. The objects range in date, scale, materials, and state of preservation and so pose different research questions and challenges for digitization, conservation, and ontological representation of knowledge. Heritage science and specialist digital technologies are presented in a way approachable to non-scientists, while a separate technical section provides details of methods and techniques, alongside examples of notable applications of spatial and spectral documentation of material cultural heritage, with selected literature and identification of future research. This book is an outcome of interdisciplinary research and debates conducted by the participants of the COST Action TD1201, Colour and Space in Cultural Heritage, 2012–16 and is an Open Access publication available under a CC BY-NC-ND licence.
Literary archives differ from most other types of archival papers in that their locations are more diverse and difficult to predict. The essays collected in this book derive from the recent work of the Diasporic Literary Archives Network, whose focus on diaspora provides a philosophical framework which gives a highly original set of points of reference for the study of literary archives, including concepts such as the natural home, the appropriate location, exile, dissidence, fugitive existence, cultural hegemony, patrimony, heritage, and economic migration.
This report provides technical information from a study on the lives of the second generation of Turkish and Moroccan immigrants in the Netherlands today. Respondents provided detailed information on cultural, social, and economic aspects of integration in Dutch society. This report has a methodological focus and is important to those wishing to further explore the collected data and examine aspects of the survey's design and implementation.
This book explores medieval cityscapes within the modern urban environment, using place as a catalyst to forge connections between past and present, and investigating timely questions concerning theoretical approaches to medieval urban heritage, as well as the presentation and interpretation of that heritage for public audiences. Written by a specialist in literary and cultural history with substantial experience of multi-disciplinary research into medieval towns, 'Medieval Cityscapes Today' teases out stories and strata of meaning from the urban landscape, bringing techniques of close reading to the material fabric of the city, as well as textual artefacts associated with it.
What does it mean to digitize a medieval manuscript? This book examines this question by exploring a range of advanced imaging technologies. The author focuses on the relationship between digital technologies and the complex materiality of manuscripts and the human bodies that engage them. The chapters explore imaging technologies, interfaces to present digital surrogates, and limitations to and enhancements through the digital, plus historical photographs. Essential reading for all those involved in manuscript digitization projects in both scholarly and cultural heritage contexts.
This is the first book to study how the political content of information literacy (IL) arises from the way it has become defined and is taught. It introduces new methods for research into the development of information literacy in learners, and explores the implications of this research for the design of IL teaching, both in formal educational settings and in workplaces. Power is not an inherently dominating thing, wielded only from 'the top' (governments, senior managers in organisations, etc.) and used to oppress. The idea that information literacy education can be empowering , giving those at 'the bottom' the power to investigate information practices and change them if necessary, is supported by the models of power emerging from the work of Michel Foucault. He sees power as being available, potentially, to all actors and agents in a given setting. This is view of power as something emerging from, and shaping, micro-level discourses, and which can generate capital, helping learners change their world and the practices that shape it. To understand how such an approach can be empowering, the book explores how we can draw on difference in productive ways in IL education with a theory-led, empirical investigation of how the way information literacy is taught - whether formally or informally, and whether in schools, universities or workplaces - influences the development of information practices at the micro-level. The book also draws on original research to provide a detailed account of how information practices emerge from communities of learners in different settings and how discursive mapping can be taught to learners. It also covers how the capacity to engage in it emerges from educational environments in a more indirect way, and how learners respond to and resist institutionalised power by developing their own capacity to stewarding their information landscapes and digital habitats. Information literacy educators, whether in libraries, other HE courses, high schools or the workplace, will benefit by learning about how mapping - implicitly and explicitly - can be used as a method of teaching IL. Also, how they can design learning environments that exploit the positive value
Information communication technology (ICT) has changed the way we access and use information. It has also dramatically increased the amount of information available. The information environment constantly changes, and it requires particular skills to make use of the bewildering flood of information. These skills, collectively referred to as information literacy skills, include the ability to locate, evaluate, and use information effectively. They are important for everyone, but especially for undergraduate students. This book will not only ensure that you, as a student, cope with your studies, but will also enable you to participate in the global economy and keep abreast of the ever-changing environment once you graduate. The book examines the various aspects of information literacy, including finding information in a range of sources and resources, such as a library and the internet; and differentiating between various types of resources such as journals, grey literature, government publications, data bases and the internet. It demonstrates how to search electronic information sources effectively, and evaluate information obtained from the internet. It clarifies what is ethical use of information. Also covered in this book are the essential skills of compiling notes and summaries from sources; reading and writing skills - especially as related to writing assignments; and referencing methods needed for compiling an accurate and complete bibliography. The book includes self-test activities and is an indispensable tool for undergraduates.