el cat en
База данных: ELS EBSCO eBook
Page 1, Results: 2
Отмеченные записи: 0
1.
Подробнее
DDC 658.514
K 83
Krishnakumar, Arunkumar,.
Quantum computing and Blockchain in business : : exploring the applications, challenges, and collision of quantum computing and blockchain / / Arunkumar Krishnakumar. - Birmingham, UK : : Packt Publishing,, 2020. - 1 online resource (1 volume) : : il. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/58D30AF0-02FA-4E32-9F42-E5F6D4682ECC. - ISBN 1838646132. - ISBN 9781838646134 (electronic bk.)
Description based on online resource; title from title page (Safari, viewed September 3, 2020).
Содержание:
Table of ContentsIntroduction to Quantum Computing and BlockchainQuantum Computing - Key Discussion PointsThe Data EconomyThe Impact on Financial ServicesInterview with Dr. Dave Snelling, Fujitsu FellowThe Impact on Healthcare and PharmaInterview with Dr. B. Rajathilagam, Head of AI Research, Amrita Vishwa VidyapeethamThe Impact on GovernanceInterview with Max Henderson, Senior Data Scientist, Rigetti and QxBranchThe Impact on Smart Cities and EnvironmentInterview with Sam McArdle, Quantum Computing Researcher at the University of OxfordThe Impact on ChemistryThe Impact on Logistics(N.B. Please use the Look Inside option to see further chapters).
~РУБ DDC 658.514
Рубрики: Quantum computing.
Blockchains (Databases)
Information technology--Management.
Technological innovations--Management.
Coding theory & cryptology.
Data encryption.
Artificial intelligence.
Machine learning.
Mathematical theory of computation.
Computers--Intelligence (AI) & Semantics.
Computers--Security--Cryptography.
Computers--Machine Theory.
Blockchains (Databases)
Information technology--Management
Quantum computing
Technological innovations--Management
K 83
Krishnakumar, Arunkumar,.
Quantum computing and Blockchain in business : : exploring the applications, challenges, and collision of quantum computing and blockchain / / Arunkumar Krishnakumar. - Birmingham, UK : : Packt Publishing,, 2020. - 1 online resource (1 volume) : : il. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/58D30AF0-02FA-4E32-9F42-E5F6D4682ECC. - ISBN 1838646132. - ISBN 9781838646134 (electronic bk.)
Description based on online resource; title from title page (Safari, viewed September 3, 2020).
Содержание:
Table of ContentsIntroduction to Quantum Computing and BlockchainQuantum Computing - Key Discussion PointsThe Data EconomyThe Impact on Financial ServicesInterview with Dr. Dave Snelling, Fujitsu FellowThe Impact on Healthcare and PharmaInterview with Dr. B. Rajathilagam, Head of AI Research, Amrita Vishwa VidyapeethamThe Impact on GovernanceInterview with Max Henderson, Senior Data Scientist, Rigetti and QxBranchThe Impact on Smart Cities and EnvironmentInterview with Sam McArdle, Quantum Computing Researcher at the University of OxfordThe Impact on ChemistryThe Impact on Logistics(N.B. Please use the Look Inside option to see further chapters).
Рубрики: Quantum computing.
Blockchains (Databases)
Information technology--Management.
Technological innovations--Management.
Coding theory & cryptology.
Data encryption.
Artificial intelligence.
Machine learning.
Mathematical theory of computation.
Computers--Intelligence (AI) & Semantics.
Computers--Security--Cryptography.
Computers--Machine Theory.
Blockchains (Databases)
Information technology--Management
Quantum computing
Technological innovations--Management
2.
Подробнее
DDC 005.8/24
L 54
Lennon, Brian, (1971-).
Passwords : : philology, security, authentication / / Brian Lennon. - Cambridge, Massachusetts ; ; London, England : : The Belknap Press of Harvard University Press,, ©2018. - 1 online resource (xviii, 207 pages). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/DF5AFBBD-E879-49CA-8B50-EB48023C4A59. - ISBN 9780674985391 (electronic bk.). - ISBN 0674985397 (electronic bk.)
Print version record.
Параллельные издания: Print version: : Lennon, Brian, 1971- Passwords. - Cambridge, Massachusetts : The Belknap Press of Harvard University Press, 2018. - ISBN 9780674980761
~РУБ DDC 005.8/24
Рубрики: Computers--Access control--Passwords.
Cryptography.
Data encryption (Computer science)
Philology.
Electronic surveillance.
Philology, Modern.
Ordinateurs--Accès--Contrôle--Mots de passe.
Cryptographie.
Chiffrement (Informatique)
Philologie.
Surveillance électronique.
philology.
COMPUTERS--Security--Cryptography.
COMPUTERS / History
Computers--Access control--Passwords.
Cryptography.
Data encryption (Computer science)
Electronic surveillance.
Philology.
Аннотация: Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.--
L 54
Lennon, Brian, (1971-).
Passwords : : philology, security, authentication / / Brian Lennon. - Cambridge, Massachusetts ; ; London, England : : The Belknap Press of Harvard University Press,, ©2018. - 1 online resource (xviii, 207 pages). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/DF5AFBBD-E879-49CA-8B50-EB48023C4A59. - ISBN 9780674985391 (electronic bk.). - ISBN 0674985397 (electronic bk.)
Print version record.
Параллельные издания: Print version: : Lennon, Brian, 1971- Passwords. - Cambridge, Massachusetts : The Belknap Press of Harvard University Press, 2018. - ISBN 9780674980761
Рубрики: Computers--Access control--Passwords.
Cryptography.
Data encryption (Computer science)
Philology.
Electronic surveillance.
Philology, Modern.
Ordinateurs--Accès--Contrôle--Mots de passe.
Cryptographie.
Chiffrement (Informatique)
Philologie.
Surveillance électronique.
philology.
COMPUTERS--Security--Cryptography.
COMPUTERS / History
Computers--Access control--Passwords.
Cryptography.
Data encryption (Computer science)
Electronic surveillance.
Philology.
Аннотация: Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.--
Page 1, Results: 2