Solomon Wolf Golomb left an unparalleled legacy of accomplishment and recognition for his work in the applications of mathematics to coding and communication theory. His legacy also includes a host of individuals whose lives and careers were immeasurably enriched by their interactions with him. The co-editors have attempted to collect many articles/essays in this volume, of a not-too-technical sort, by a representative collection of such individuals. Among their motivations is the wish to convince the reader of the incredibly prescient choice of his given name.The first section consists of three articles which have already appeared elsewhere, by noted experts in the fields where the majority of Sol's contributions lie — mathematics, computer science and electrical engineering. The second section consists of three articles by the co-editors in memory of and tribute to Sol. The third section contains 25-30 articles by Sol's family, friends, students, colleagues, etc. They cover a great range of topics and vary widely in length, technicality and other aspects. In the last section are contributions by Sol himself, covering various aspects of his career and interests, as well as other related material.
"Solomon Wolf Golomb left an unparalleled legacy of accomplishment and recognition for his work in the applications of mathematics to coding and communication theory. His legacy also includes a host of individuals whose lives and careers were immeasurably enriched by their interactions with him. The co-editors have attempted to collect many articles/essays in this volume, of a not-too-technical sort, by a representative collection of such individuals. Among their motivations is the wish to convince the reader of the incredibly prescient choice of his given name. The first section consists of three articles which have already appeared elsewhere, by noted experts in the fields where the majority of Sol's contributions lie - mathematics, computer science and electrical engineering. The second section consists of three articles by the co-editors in memory of and tribute to Sol. The third section contains 25-30 articles by Sol's family, friends, students, colleagues, etc. They cover a great range of topics and vary widely in length, technicality and other aspects. In the last section are contributions by Sol himself, covering various aspects of his career and interests, as well as other related material"--
This work has been selected by scholars as being culturally important and is part of the knowledge base of civilization as we know it. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. To ensure a quality reading experience, this work has been proofread and republished using a format that seamlessly blends the original graphical elements with text in an easy-to-read typeface. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Choice Outstanding Academic Title Cybernetics—the science of communication and control as it applies to machines and to humans—originates from efforts during World War II to build automatic antiaircraft systems. Following the war, this science extended beyond military needs to examine all systems that rely on information and feedback, from the level of the cell to that of society. In The Cybernetics Moment, Ronald R. Kline, a senior historian of technology, examines the intellectual and cultural history of cybernetics and information theory, whose language of “information,” “feedback,” and “control” transformed the idiom of the sciences, hastened the development of information technologies, and laid the conceptual foundation for what we now call the Information Age. Kline argues that, for about twenty years after 1950, the growth of cybernetics and information theory and ever-more-powerful computers produced a utopian information narrative—an enthusiasm for information science that influenced natural scientists, social scientists, engineers, humanists, policymakers, public intellectuals, and journalists, all of whom struggled to come to grips with new relationships between humans and intelligent machines. Kline traces the relationship between the invention of computers and communication systems and the rise, decline, and transformation of cybernetics by analyzing the lives and work of such notables as Norbert Wiener, Claude Shannon, Warren McCulloch, Margaret Mead, Gregory Bateson, and Herbert Simon. Ultimately, he reveals the crucial role played by the cybernetics moment—when cybernetics and information theory were seen as universal sciences—in setting the stage for our current preoccupation with information technologies. "Nowhere in the burgeoning secondary literature on cybernetics in the last two decades is there a concise history of cybernetics, the science of communication and control that helped usher in the current information age in America. Nowhere, that is, until now . . . Readers have in The Cybernetics Moment the first authoritative history of American cybernetics."—Information & Culture "[A]n extremely interesting and stimulating history of the concepts of cybernetics . . . This is a book for everyone to read, relish, and think about."—Choice "As a whole, the book presents a comprehensive in-depth retrospective analysis of the contribution of the American scientific school to the making, formation, and development of cybernetics and information theory. An unquestionable advantage of the book is the skillful use of numerous bibliographic sources by the author that reflect the scientific, engineering, and social significance of the questions being considered, competition of ideas and developments, and also interrelations between scientists."—Cybernetics and System Analysis "Dr. Kline is perhaps uniquely situated to take on so large and complicated [a] topic as cybernetics . . . Readers unfamiliar with Wiener and his work are well advised to start with this well-written and thorough book. Those who are already familiar will still find much that is new and informative in the thorough research and reasoned interpretations."—IEEE History Center "The most comprehensive intellectual history of cybernetics in Cold War America."—Journal of American History "The book will be most valuable as historical background for the large number of disciplines that were involved in the cybernetics moment: computer science, communications engineering, information theory, and the social sciences of sociology and anthropology."—IEEE Technology and Society Magazine "Ronald Kline’s chronicle of cybernetics certainly does what an excellent history of science should do. It takes you there—to the golden age of a new, exciting field. You will almost smell that cigar."—Second-Order Cybernetics "Kline’s The Cybernetics Moment tracks the rise and fall of the cybernetics movement in more detail than any historical account to date."—Los Angeles Review of Books
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions. Taking an evolutionary approach to security in today’s telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios. Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks. With much of the material used by the authors in their courses and drawn from their industry experiences, this book is appropriate for a wide audience, from engineering, computer science, and mathematics students to engineers, designers, and computer scientists. Illustrating security principles with existing protocols, the text helps readers understand the principles and practice of security analysis.
For Israel--more so than for any other state--an effective Intelligence Community has been a matter of life and death. Over the past half-century or so, Israel has created and refined what is broadly regarded as one of the best intelligence networks in the world. It has repeatedly undone efforts by hostile Arab neighbors to defeat it in war, foiled countless terrorist attacks, contributed to military preparedness and armament production, and helped millions of Jews to reach the Promised Land. Unfortunately, it has also committed some terrible mistakes and made blunders it can ill afford. With all of this activity, it is no wonder so much has been written about Israeli Intelligence. However, a handy reference work bringing the various strands together has been sorely needed yet unavailable, until now. The Historical Dictionary of Israeli Intelligence provides detailed information on the various agencies, operations, important leaders and operatives, and special aspects of tradecraft through a chronology, an introduction, a dictionary full of cross-referenced entries, and a bibliography suggesting further reading.
Shift register sequences cover a broad range of applications, from radar signal design, pseudo-random number generation, digital wireless telephony, and many other areas in coded communications. It is the primary area for which the author, Dr Golomb, received the US National Medal of Science. This book is the third, revised edition of the original definitive book on shift register sequences which was published in 1967, which has been widely distributed, read, and cited. It has stood the test of time, and provides a clear, comprehensive, and readily applicable description of both linear and non-linear shift register sequences.
What is Science? A Guide for Those Who Love It, Hate It, or Fear It, provides the reader with ways science has been done through discovery, exploration, experimentation and other reason-based approaches. It discusses the basic and applied sciences, the reasons why some people hate science, especially its rejection of the supernatural, and others who fear it for human applications leading to environmental degradation, climate change, nuclear war, and other outcomes of sciences applied to society.The author uses anecdotes from interviews and associations with many scientists he has encountered in his career to illustrate these features of science and their personalities and habits of thinking or work. He also explores the culture wars of science and the humanities, values involved in doing science and applying science, the need for preventing unexpected outcomes of applied science, and the ways our world view changes through the insights of science. This book will provide teachers lots of material for discussion about science and its significance in our lives. It will also be helpful for those starting out their interest in science to know the worst and best features of science as they develop their careers.