Used by 366 students
in 24
courses
Description: This text introduces the field of complexity science which uses computation to explore the physical and social sciences. It employs graphs, cellular automata, and agent-based models to study interdiciplinary applications in physics, biology, and economics.
Register for complex
keywords:
By: Dr. Jan Pearce, Editor
Used by 14 students
in 3
courses
Description: This work is designed as an introduction to the applied topic of computer security. Students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures. Some sections that are related to legal issue are US-centric.
Register for comp-sys-sec
keywords: