Out on the road, no one speaks, everything talks.Hard-drinking, foul-mouthed, and allergic to bullshit, Jean is not your usual grandma. She's never been good at getting on with other humans, apart from her beloved granddaughter, Kimberly. Instead, she surrounds herself with animals, working as a guide in an outback wildlife park. And although Jean talks to all her charges, she has a particular soft spot for a young dingo called Sue.As disturbing news arrives of a pandemic sweeping the country, Jean realises this is no ordinary flu: its chief symptom is that its victims begin to understand the language of animals--first mammals, then birds and insects, too. As the flu progresses, the unstoppable voices become overwhelming, and many people begin to lose their minds, including Jean's infected son, Lee. When he takes off with Kimberly, heading south, Jean feels the pull to follow her kin.Setting off on their trail, with Sue the dingo riding shotgun, they find themselves in a stark, strange
This book covers advanced topics in Discrete Mathematics and its applications to day-to-day problems in several areas. It is intended for graduate students of Computer Science, Mathematics and Enginee
Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the
This text introduces cryptography, from its earliest roots to cryptosystems used today for secure online communication.Beginning with classical ciphers and their cryptanalysis, this book proceeds to f
This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012.The 12 papers prese
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volu
This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this
Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Towards a Quarter-Century of Public
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various method
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading o
Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It thoroughly discusses the java.security package and the Java Cryptography Extensions (JCE), showing you
Oppliger, who works for the Federal Authorities of the Swiss Confederation and teaches at the U. of Zurich, Switzerland, provides students and practitioners such as computer scientists, electrical eng
Every e-mail message, every online purchase, and every cell phone call gets encrypted at one end of its journey and decrypted at the other. Now an everyday application, "crypto" is part of the job des