Book picks similar to
Elementary Cryptanalysis: A Mathematical Approach by Abraham Sinkov
technical
no-action
how-to
computer-science
Drugs and Society
Glen R. Hanson - 1995
Written In An Objective And User-Friendly Manner, This Best-Selling Text Continues To Captivate Students By Incorporating Personal Drug Use And Abuse Experiences And Perspectives Throughout. Statistics And Chapter Content Have Been Revised To Include The Latest Information On Current Topics.
Physics for Scientists and Engineers, Volume 1
Raymond A. Serway - 2003
However, rather than resting on that reputation, the new edition of this text marks a significant advance in the already excellent quality of the book. While preserving concise language, state of the art educational pedagogy, and top-notch worked examples, the Eighth Edition features a unified art design as well as streamlined and carefully reorganized problem sets that enhance the thoughtful instruction for which Raymond A. Serway and John W. Jewett, Jr. earned their reputations. Likewise, PHYSICS FOR SCIENTISTS AND ENGINEERS, will continue to accompany Enhanced WebAssign in the most integrated text-technology offering available today. In an environment where new Physics texts have appeared with challenging and novel means to teach students, this book exceeds all modern standards of education from the most solid foundation in the Physics market today.
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier - 1993
… The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
Elements of Electromagnetics
Matthew N.O. Sadiku - 1993
The book also provides a balanced presentation of time-varying and static fields, preparingstudents for employment in today's industrial and manufacturing sectors. Streamlined to facilitate student understanding, this edition features worked examples in every chapter that explain how to use the theory presented in the text to solve different kinds of problems. Numerical methods, including MATLAB and vector analysis, are also included to help students analyzesituations that they are likely to encounter in industry practice. Elements of Electromagnetics, Fifth Edition, is designed for introductory undergraduate courses in electromagnetics.
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh - 1999
From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.
Multiple View Geometry in Computer Vision
Richard Hartley - 2000
This book covers relevant geometric principles and how to represent objects algebraically so they can be computed and applied. Recent major developments in the theory and practice of scene reconstruction are described in detail in a unified framework. Richard Hartley and Andrew Zisserman provide comprehensive background material and explain how to apply the methods and implement the algorithms. First Edition HB (2000): 0-521-62304-9
Elementary Solid State Physics: Principles and Applications
M. Ali Omar - 1975
I also hope that it will serve as a useful reference too for the many workers engaged in one type of solid state research activity or another, who may be without formal training in the subject.
Communication Systems
Simon Haykin - 1978
In addition to being the most up-to-date communications text available, Simon Haykin has added MATLAB computer experiments.
Fundamentals of Applied Electromagnetics
Fawwaz T. Ulaby - 1996
and abroad, this reader-friendly yet authoritative volume bridges the gap between circuits and new electromagnetics material. Ulaby begins coverage with transmission lines, leading readers from familiar concepts into more advanced topics and applications. Includes six new sections on Waveguides and Cavity Resonators, replacing the material on geometric optics in Chapter 8. Presents new Technology Briefs on relevant topics, connecting concepts in the book to everyday applications found in real life, such as liquid crystal displays, the laser, GPS, and x-ray tomography. Includes an interactive CD-ROM that allows readers to gain physical intuition about electromagnetics. A useful reference for engineers.
Digital Integrated Circuits
Jan M. Rabaey - 1995
Digital Integrated Circuits maintains a consistent, logical flow of subject matter throughout. KEY TOPICS: Addresses today's most significant and compelling industry topics, including: the impact of interconnect, design for low power, issues in timing and clocking, design methodologies, and the tremendous effect of design automation on the digital design perspective. MARKET: For readers interested in digital circuit design.
Handbook of Applied Cryptography
Alfred J. Menezes - 1996
Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
How to Prepare for Quantitative Aptitude for the CAT Common Admission Test
Arun Sharma - 2012
The book will also be extremely useful for those preparing for other MBA entrance examinations like XAT, SNAP, CMAT, NMAT, etc. Quantitative Aptitude is quite challenging component of the CAT question paper and the other mentioned MBA entrance examinations. In his inimitable style, Arun Sharma, an acknowledged authority on the topic, provides a comprehensive package of theory and practice problems to enable aspirants to attempt questions with extra speed and confidence.
Poincare's Prize: The Hundred-Year Quest to Solve One of Math's Greatest Puzzles
George G. Szpiro - 2007
Amazingly, the story unveiled in it is true.In the world of math, the Poincaré Conjecture was a holy grail. Decade after decade the theorem that informs how we understand the shape of the universe defied every effort to prove it. Now, after more than a century, an eccentric Russian recluse has found the solution to one of the seven greatest math problems of our time, earning the right to claim the first one-million-dollar Millennium math prize.George Szpiro begins his masterfully told story in 1904 when Frenchman Henri Poincaré formulated a conjecture about a seemingly simple problem. Imagine an ant crawling around on a large surface. How would it know whether the surface is a flat plane, a round sphere, or a bagel- shaped object? The ant would need to lift off into space to observe the object. How could you prove the shape was spherical without actually seeing it? Simply, this is what Poincaré sought to solve.In fact, Poincaré thought he had solved it back at the turn of the twentieth century, but soon realized his mistake. After four more years' work, he gave up. Across the generations from China to Texas, great minds stalked the solution in the wilds of higher dimensions. Among them was Grigory Perelman, a mysterious Russian who seems to have stepped out of a Dostoyevsky novel. Living in near poverty with his mother, he has refused all prizes and academic appointments, and rarely talks to anyone, including fellow mathematicians. It seemed he had lost the race in 2002, when the conjecture was widely but, again, falsely reported as solved. A year later, Perelman dropped three papers onto the Internet that not only proved the Poincaré Conjecture but enlightened the universe of higher dimensions, solving an array of even more mind-bending math with implications that will take an age to unravel. After years of review, his proof has just won him a Fields Medal--the 'Nobel of math'--awarded only once every four years. With no interest in fame, he refused to attend the ceremony, did not accept the medal, and stayed home to watch television.Perelman is a St. Petersburg hero, devoted to an ascetic life of the mind. The story of the enigma in the shape of space that he cracked is part history, part math, and a fascinating tale of the most abstract kind of creativity.
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Steven Levy - 2001
From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
The Art and Science of Java
Eric S. Roberts - 2007
By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.