These reviews have been chosen by the editors to be highlighted.
All Media Types
Linux hardening in hostile networks: server security from TLS to Tor
Rankin K., Addison-Wesley Professional, Boston, MA, 2017. 272 pp. Type: Book (978-0-134173-26-9)
The book’s preface notes that many of the available hardening guides were written some years ago. Its chapters are therefore intended to replace the outdated information found in those guides with recommendations that provide maximum impact ...
Nov 19 2018
Formalization of the resolution calculus for first-order logic
Schlichtkrull A. Journal of Automated Reasoning 61(1-4): 455-484, 2018. Type: Article
Are you interested in proof assistants in which human experts guide automatic theorem provers to verify subgoals? The paper focuses on research dedicated to a theoretical aim: applying a special proof assistant to produce human-readable rigorous p...
Nov 12 2018
Guide to competitive programming: learning and improving algorithms through contests
Laaksonen A., Springer International Publishing, New York, NY, 2017. 283 pp. Type: Book (978-3-319725-46-8)
Competitive programming is not new, but is now widely available through different online competitions. As Laaksonen notes, competitive programming provides opportunities for practice and helps to bridge the gap between theory and practice by forci...
Nov 5 2018
Software engineering (10th ed.)
Sommerville I., Pearson, Boston, MA, 2016. 816 pp. Type: Book (978-0-133943-03-0), Reviews: (2 of 2)
This book has been around for about three decades. This newest version is the tenth edition. Software engineering is--has become--an enormous subject. The book is very long--over 800 pages--and yet it does not actually cover al...
Oct 29 2018
How to teach computer ethics through science fiction
Burton E., Goldsmith J., Mattei N. Communications of the ACM 61(8): 54-64, 2018. Type: Article
This is one of those very strange articles that makes one happy, just by its very existence....
Oct 22 2018
Codes, cryptology and curves with computer algebra
Pellikaan R., Wu X., Bulygin S., Jurrius R., Cambridge University Press, New York, NY, 2018. 606 pp. Type: Book (978-0-521520-36-2)
This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content), curves (spe...
Oct 15 2018
3D metal printing technology: the need to re-invent design practice
Duda T., Raghavan L. AI & Society 33(2): 241-252, 2018. Type: Article
Additive manufacturing (AM) (also know as 3D printing) is the process of manufacturing objects directly from 3D model data, typically using a layer-by-layer material build-up strategy. Metal AM is a tool-less process that can manufacture fully den...
Oct 8 2018
Digital behaviour change interventions to break and form habits
Pinder C., Vermeulen J., Cowan B., Beale R. ACM Transactions on Computer-Human Interaction 25(3): 1-66, 2018. Type: Article
Whenever research on behavior is in progress, a special category is also under review in terms of habit. In the context of behavior change, it is of interest to find how habit could influence behavior, especially in digital environments. Thus, it ...
Oct 1 2018
Poibeau T., The MIT Press, Cambridge, MA, 2017. 296 pp. Type: Book (978-0-262534-21-5), Reviews: (2 of 3)
This small book (approximately size A5), part of the Massachusetts Institute of Technology (MIT) Press “Essential Knowledge” series, captures the essence of the machine translation (MT) field, from its origins to the present. As opposed...
Sep 24 2018
Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp. Type: Book (978-1-630811-34-1), Reviews: (2 of 2)
In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them,...
Sep 17 2018
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2018 ThinkLoud, Inc.