Book picks similar to
Natural Operations in Differential Geometry by Ivan Kolar


mathematics
differential
general-relativity-mathematics
library-new

Cryptography: A Very Short Introduction


Fred C. Piper - 2002
    It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas arehighlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticatedbanking methods.

Proofs and Refutations: The Logic of Mathematical Discovery


Imre Lakatos - 1976
    Much of the book takes the form of a discussion between a teacher and his students. They propose various solutions to some mathematical problems and investigate the strengths and weaknesses of these solutions. Their discussion (which mirrors certain real developments in the history of mathematics) raises some philosophical problems and some problems about the nature of mathematical discovery or creativity. Imre Lakatos is concerned throughout to combat the classical picture of mathematical development as a steady accumulation of established truths. He shows that mathematics grows instead through a richer, more dramatic process of the successive improvement of creative hypotheses by attempts to 'prove' them and by criticism of these attempts: the logic of proofs and refutations.

Google+ for Business: How Google's Social Network Changes Everything


Chris Brogan - 2011
    Top social media consultant and Google+ early adopter Chris Brogan shows business people how to leverage its immense potential before their competitors even realize it's there.

CEH Certified Ethical Hacker Study Guide


Kimberly Graves - 2010
    That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews

Information Theory: A Tutorial Introduction


James V. Stone - 2015
    In this richly illustrated book, accessible examples are used to show how information theory can be understood in terms of everyday games like '20 Questions', and the simple MatLab programs provided give hands-on experience of information theory in action. Written in a tutorial style, with a comprehensive glossary, this text represents an ideal primer for novices who wish to become familiar with the basic principles of information theory.Download chapter 1 from http://jim-stone.staff.shef.ac.uk/Boo...

TechGnosis: Myth, Magic Mysticism in the Age of Information


Erik Davis - 1998
    Davis uncovers startling connections between such seemingly disparate topics as electricity and alchemy; online role-playing games and religious and occult practices; virtual reality and gnostic mythology; programming languages and Kabbalah. The final chapters address the apocalyptic dreams that haunt technology, providing vital historical context as well as new ways to think about a future defined by the mutant intermingling of mind and machine, nightmare and fantasy.

Introduction to Automata Theory, Languages, and Computation


John E. Hopcroft - 1979
    With this long-awaited revision, the authors continue to present the theory in a concise and straightforward manner, now with an eye out for the practical applications. They have revised this book to make it more accessible to today's students, including the addition of more material on writing proofs, more figures and pictures to convey ideas, side-boxes to highlight other interesting material, and a less formal writing style. Exercises at the end of each chapter, including some new, easier exercises, help readers confirm and enhance their understanding of the material. *NEW! Completely rewritten to be less formal, providing more accessibility to todays students. *NEW! Increased usage of figures and pictures to help convey ideas. *NEW! More detail and intuition provided for definitions and proofs. *NEW! Provides special side-boxes to present supplemental material that may be of interest to readers. *NEW! Includes more exercises, including many at a lower level. *NEW! Presents program-like notation for PDAs and Turing machines. *NEW! Increas

Six Degrees: The Science of a Connected Age


Duncan J. Watts - 2003
    Whether they bind computers, economies, or terrorist organizations, networks are everywhere in the real world, yet only recently have scientists attempted to explain their mysterious workings.From epidemics of disease to outbreaks of market madness, from people searching for information to firms surviving crisis and change, from the structure of personal relationships to the technological and social choices of entire societies, Watts weaves together a network of discoveries across an array of disciplines to tell the story of an explosive new field of knowledge, the people who are building it, and his own peculiar path in forging this new science.

Stalking the Riemann Hypothesis: The Quest to Find the Hidden Law of Prime Numbers


Dan Rockmore - 2005
    Now, at a moment when mathematicians are finally moving in on a proof, Dartmouth professor Dan Rockmore tells the riveting history of the hunt for a solution.In 1859 German professor Bernhard Riemann postulated a law capable of describing with an amazing degree of accuracy the occurrence of the prime numbers. Rockmore takes us all the way from Euclid to the mysteries of quantum chaos to show how the Riemann hypothesis lies at the very heart of some of the most cutting-edge research going on today in physics and mathematics.

The Social Life of Information


John Seely Brown - 2000
    John Seely Brown and Paul Duguid argue that the gap between digerati hype and end-user gloom is largely due to the "tunnel vision" that information-driven technologies breed. We've become so focused on where we think we ought to be--a place where technology empowers individuals and obliterates social organizations--that we often fail to see where we're really going.The Social Life of Information shows us how to look beyond our obsession with information and individuals to include the critical social networks of which these are always a part.

Surfing Through Hyperspace: Understanding Higher Universes in Six Easy Lessons


Clifford A. Pickover - 1999
    With this astonishing guidebook, Surfing Through Hyperspace, you need not be a mathematician or an astrophysicist to explore the all-but-unfathomable concepts of hyperspace and higher-dimensional geometry.No subject in mathematics has intrigued both children and adults as much as the idea of a fourth dimension. Philosophers and parapsychologists have meditated on this mysterious space that no one can point to but may be all around us. Yet this extra dimension has a very real, practical value to mathematicians and physicists who use it every day in their calculations. In the tradtion of Flatland, and with an infectious enthusiasm, Clifford Pickover tackles the problems inherent in our 3-D brains trying to visualize a 4-D world, muses on the religious implications of the existence of higher-dimensional consciousness, and urges all curious readers to venture into the unexplored territory lying beyond the prison of the obvious. Pickover alternates sections that explain the science of hyperspace with sections that dramatize mind-expanding concepts through a fictional dialogue between two futuristic FBI agents who dabble in the fourth dimension as a matter of national security. This highly accessible and entertaining approach turns an intimidating subject into a scientific game open to all dreamers.Surfing Through Hyperspace concludes with a number of puzzles, computer experiments and formulas for further exploration, inviting readers to extend their minds across this inexhaustibly intriguing scientific terrain.

Saving Bletchley Park: How #socialmedia saved the home of the WWII codebreakers


Sue Black - 2015
    It is a testament to the remarkable and mysterious work during World War II that made it a place worth saving. It is a book about campaigners, veterans, enthusiasts, computer geeks, technology, Twitter, trees and Stephen Fry stuck in a lift.And finally, it is a story about preserving the past for the generations of tomorrow.

CK-12 Calculus


CK-12 Foundation - 2010
    Topics include: Limits, Derivatives, and Integrations.

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference


Cameron Davidson-Pilon - 2014
    However, most discussions of Bayesian inference rely on intensely complex mathematical analyses and artificial examples, making it inaccessible to anyone without a strong mathematical background. Now, though, Cameron Davidson-Pilon introduces Bayesian inference from a computational perspective, bridging theory to practice-freeing you to get results using computing power. Bayesian Methods for Hackers illuminates Bayesian inference through probabilistic programming with the powerful PyMC language and the closely related Python tools NumPy, SciPy, and Matplotlib. Using this approach, you can reach effective solutions in small increments, without extensive mathematical intervention. Davidson-Pilon begins by introducing the concepts underlying Bayesian inference, comparing it with other techniques and guiding you through building and training your first Bayesian model. Next, he introduces PyMC through a series of detailed examples and intuitive explanations that have been refined after extensive user feedback. You'll learn how to use the Markov Chain Monte Carlo algorithm, choose appropriate sample sizes and priors, work with loss functions, and apply Bayesian inference in domains ranging from finance to marketing. Once you've mastered these techniques, you'll constantly turn to this guide for the working PyMC code you need to jumpstart future projects. Coverage includes - Learning the Bayesian "state of mind" and its practical implications - Understanding how computers perform Bayesian inference - Using the PyMC Python library to program Bayesian analyses - Building and debugging models with PyMC - Testing your model's "goodness of fit" - Opening the "black box" of the Markov Chain Monte Carlo algorithm to see how and why it works - Leveraging the power of the "Law of Large Numbers" - Mastering key concepts, such as clustering, convergence, autocorrelation, and thinning - Using loss functions to measure an estimate's weaknesses based on your goals and desired outcomes - Selecting appropriate priors and understanding how their influence changes with dataset size - Overcoming the "exploration versus exploitation" dilemma: deciding when "pretty good" is good enough - Using Bayesian inference to improve A/B testing - Solving data science problems when only small amounts of data are available Cameron Davidson-Pilon has worked in many areas of applied mathematics, from the evolutionary dynamics of genes and diseases to stochastic modeling of financial prices. His contributions to the open source community include lifelines, an implementation of survival analysis in Python. Educated at the University of Waterloo and at the Independent University of Moscow, he currently works with the online commerce leader Shopify.

Harmonograph: A Visual Guide to the Mathematics of Music


Anthony Ashton - 1999
    Harmonograph is an introduction to the evolution of simple harmonic theory, from the discoveries of Pythagoras to diatonic tuning and equal temperament. Beautiful drawings show the octave as triangle, the fifth as pentagram; diagrams show the principles of harmonics, overtones, and the monochord. Anthony Ashton examines the phenomenon of resonance in Chladni patterns, describes how to build a harmonograph of your own, and provides tables of world tuning systems. This inspiring book will appeal to musicians, mathematicians, designers, and artists alike.