Book picks similar to
Elliptic Curves: Number Theory and Cryptography by Lawrence C. Washington
mathematics
number-theory
crypto
computer_science
Statistics for Management
Richard I. Levin - 1978
Like its predecessors, the seventh edition includes the absolute minimum of mathematical/statistical notation necessary to teach the material. Concepts are fully explained in simple, easy-to-understand language as they are presented, making the book an excellent source from which to learn and teach. After each discussion, readers are guided through real-world examples to show how book principles work in professional practice. Includes easy-to-understand explanations of difficult statistical topics, such as sampling distributions, relationship between confidence level and confidence interval, interpreting r-square. A complete package of teaching/learning aids is provided in every chapter, including chapter review exercises, chapter concepts tests,"Statistics at Work" conceptual cases, "Computer Database Exercises," "From the Textbook to the Real-World Examples." This ISBN is in two volumes Part A and Part B.
King of Infinite Space: Donald Coxeter, the Man Who Saved Geometry
Siobhan Roberts - 2006
Yet geometry is so much more than shapes and numbers; indeed, it governs much of our lives—from architecture and microchips to car design, animated movies, the molecules of food, even our own body chemistry. And as Siobhan Roberts elegantly conveys in The King of Infinite Space, there can be no better guide to the majesty of geometry than Donald Coxeter, perhaps the greatest geometer of the twentieth century.Many of the greatest names in intellectual history—Pythagoras, Plato, Archimedes, Euclid— were geometers, and their creativity and achievements illuminate those of Coxeter, revealing geometry to be a living, ever-evolving endeavor, an intellectual adventure that has always been a building block of civilization. Coxeter's special contributions—his famed Coxeter groups and Coxeter diagrams—have been called by other mathematicians "tools as essential as numbers themselves," but his greatest achievement was to almost single-handedly preserve the tradition of classical geometry when it was under attack in a mathematical era that valued all things austere and rational.Coxeter also inspired many outside the field of mathematics. Artist M. C. Escher credited Coxeter with triggering his legendary Circle Limit patterns, while futurist/inventor Buckminster Fuller acknowledged that his famed geodesic dome owed much to Coxeter's vision. The King of Infinite Space is an elegant portal into the fascinating, arcane world of geometry.
The Foundations of Chinese Medicine: A Comprehensive Text for Acupuncturists and Herbalists
Giovanni Maciocia - 1989
The material is based on rigorous reference to ancient and modern Chinese texts, and explains the application of theory in a Western practice context. The new edition features new and updated material, including discussion of 50 additional acupuncture points and more patterns. A redesigned layout complements the accessible writing style and makes the material even easier to follow. Plus, an accompanying CD-ROM contains over 750 self-testing questions in a variety of formats.
Colossus: The Secrets of Bletchley Park's Codebreaking Computers
B. Jack Copeland - 2006
This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during World War II--predates ENIAC by two years.Colossus was built during the Second World War at the Government Code and Cypher School at Bletchley Park. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the code-breaking algorithms that were employed during World War II remained in use by the British security services until a short time ago. In addition, the United States has recently declassified a considerable volume of wartime documents relating to Colossus. Jack Copeland has brought together memoirs of veterans of Bletchley Park--the top-secret headquarters of Britain's secret service--and others who draw on the wealth of declassified information to illuminate the crucial role Colossus played during World War II. Included here are pieces by the former WRENS who actually worked the machine, the scientist who pioneered the use of vacuum tubes in data processing, and leading authorities on code-breaking and computer science.A must read for anyone curious about code-breaking or World War II espionage, Colossus offers a fascinating insider's account of the world first giant computer, the great great grandfather of the massive computers used today by the CIA and the National Security Agency.
Magical Mathematics: The Mathematical Ideas That Animate Great Magic Tricks
Persi Diaconis - 2011
Persi Diaconis and Ron Graham provide easy, step-by-step instructions for each trick, explaining how to set up the effect and offering tips on what to say and do while performing it. Each card trick introduces a new mathematical idea, and varying the tricks in turn takes readers to the very threshold of today's mathematical knowledge.Diaconis and Graham tell the stories--and reveal the best tricks--of the eccentric and brilliant inventors of mathematical magic. The book exposes old gambling secrets through the mathematics of shuffling cards, explains the classic street-gambling scam of three-card Monte, traces the history of mathematical magic back to the oldest mathematical trick--and much more.
Quantum Mechanics
Claude Cohen-Tannoudji - 1977
Nobel-Prize-winner Claude Cohen-Tannoudji and his colleagues have written this book to eliminate precisely these difficulties. Fourteen chapters provide a clarity of organization, careful attention to pedagogical details, and a wealth of topics and examples which make this work a textbook as well as a timeless reference, allowing to tailor courses to meet students' specific needs. Each chapter starts with a clear exposition of the problem which is then treated, and logically develops the physical and mathematical concept. These chapters emphasize the underlying principles of the material, undiluted by extensive references to applications and practical examples which are put into complementary sections. The book begins with a qualitative introduction to quantum mechanical ideas using simple optical analogies and continues with a systematic and thorough presentation of the mathematical tools and postulates of quantum mechanics as well as a discussion of their physical content. Applications follow, starting with the simplest ones like e.g. the harmonic oscillator, and becoming gradually more complicated (the hydrogen atom, approximation methods, etc.). The complementary sections each expand this basic knowledge, supplying a wide range of applications and related topics as well as detailed expositions of a large number of special problems and more advanced topics, integrated as an essential portion of the text.
Alice in Wonderland and the World Trade Center Disaster
David Icke - 2002
The official story of what happened on 9/11 is a fantasy of untruth, manipulation, contradiction and anomaly. David Icke has spent well over a decade uncovering the force that was really behind those attacks and has traveled to 40 countries in pursuit of the truth. He has exposed their personnel, methods and agenda in a series of books and videos.Therefore, when the attacks came, it was easy to recognise the Hidden Hand behind the cover story of "Bin Laden did it". Icke takes apart the official version of 9/11 and the "war on terrorism" and shows that those responsible are much closer to home than a cave in Afghanistan. He explains why 9/11 was planned and to what end. It is vital to maintaining our freedom, and to the memory of those who died and the loved ones left behind, that the light shines on the lies and deceit behind September 11th.Icke also places these events in their true context as part of an agenda by hidden forces working behind the puppet politicians to create a global fascist state based on total control and surveillance. But it doesn't have to be like this; it does not have to happen. We can change the world from a prison to a paradise and, as Icke explains, the power to do that is within you and within us all.
Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications
Ivan Ristic - 2014
Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.
Historians on History
John Tosh - 2000
They illuminate the political, social and personal assumptions which have governed and sustained historical practice and theory. The book also brings into focus the key historiographic trends since World War Two. Key themes which are highlighted include: - The role of sources - The nation - Marxism - Radicalism - Structural history - Gender - Race - Statistics and economics Ranging widely from the earlier traditions and schools to the wake of postmodernism, authors represented include Braudel, Zeldin, Elton Carr, Hobsbawm, Joyce and Evans. This Reader provides the core reading for all History and Theory courses and will promote further debate across cognate disciplines including philosophy and literature."
Calculus On Manifolds: A Modern Approach To Classical Theorems Of Advanced Calculus
Michael Spivak - 1965
The approach taken here uses elementary versions of modern methods found in sophisticated mathematics. The formal prerequisites include only a term of linear algebra, a nodding acquaintance with the notation of set theory, and a respectable first-year calculus course (one which at least mentions the least upper bound (sup) and greatest lower bound (inf) of a set of real numbers). Beyond this a certain (perhaps latent) rapport with abstract mathematics will be found almost essential.
Deep Learning
Ian Goodfellow - 2016
Because the computer gathers knowledge from experience, there is no need for a human computer operator to formally specify all the knowledge that the computer needs. The hierarchy of concepts allows the computer to learn complicated concepts by building them out of simpler ones; a graph of these hierarchies would be many layers deep. This book introduces a broad range of topics in deep learning.The text offers mathematical and conceptual background, covering relevant concepts in linear algebra, probability theory and information theory, numerical computation, and machine learning. It describes deep learning techniques used by practitioners in industry, including deep feedforward networks, regularization, optimization algorithms, convolutional networks, sequence modeling, and practical methodology; and it surveys such applications as natural language processing, speech recognition, computer vision, online recommendation systems, bioinformatics, and videogames. Finally, the book offers research perspectives, covering such theoretical topics as linear factor models, autoencoders, representation learning, structured probabilistic models, Monte Carlo methods, the partition function, approximate inference, and deep generative models.Deep Learning can be used by undergraduate or graduate students planning careers in either industry or research, and by software engineers who want to begin using deep learning in their products or platforms. A website offers supplementary material for both readers and instructors.
Security in Computing
Charles P. Pfleeger - 1988
In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv
What Is Mathematics?: An Elementary Approach to Ideas and Methods
Richard Courant - 1941
Today, unfortunately, the traditional place of mathematics in education is in grave danger. The teaching and learning of mathematics has degenerated into the realm of rote memorization, the outcome of which leads to satisfactory formal ability but does not lead to real understanding or to greater intellectual independence. This new edition of Richard Courant's and Herbert Robbins's classic work seeks to address this problem. Its goal is to put the meaning back into mathematics.Written for beginners and scholars, for students and teachers, for philosophers and engineers, What is Mathematics? Second Edition is a sparkling collection of mathematical gems that offers an entertaining and accessible portrait of the mathematical world. Covering everything from natural numbers and the number system to geometrical constructions and projective geometry, from topology and calculus to matters of principle and the Continuum Hypothesis, this fascinating survey allows readers to delve into mathematics as an organic whole rather than an empty drill in problem solving. With chapters largely independent of one another and sections that lead upward from basic to more advanced discussions, readers can easily pick and choose areas of particular interest without impairing their understanding of subsequent parts.Brought up to date with a new chapter by Ian Stewart, What is Mathematics? Second Edition offers new insights into recent mathematical developments and describes proofs of the Four-Color Theorem and Fermat's Last Theorem, problems that were still open when Courant and Robbins wrote this masterpiece, but ones that have since been solved.Formal mathematics is like spelling and grammar - a matter of the correct application of local rules. Meaningful mathematics is like journalism - it tells an interesting story. But unlike some journalism, the story has to be true. The best mathematics is like literature - it brings a story to life before your eyes and involves you in it, intellectually and emotionally. What is Mathematics is like a fine piece of literature - it opens a window onto the world of mathematics for anyone interested to view.
Math on Trial: How Numbers Get Used and Abused in the Courtroom
Leila Schneps - 2013
Even the simplest numbers can become powerful forces when manipulated by politicians or the media, but in the case of the law, your liberty -- and your life -- can depend on the right calculation. In Math on Trial, mathematicians Leila Schneps and Coralie Colmez describe ten trials spanning from the nineteenth century to today, in which mathematical arguments were used -- and disastrously misused -- as evidence. They tell the stories of Sally Clark, who was accused of murdering her children by a doctor with a faulty sense of calculation; of nineteenth-century tycoon Hetty Green, whose dispute over her aunt's will became a signal case in the forensic use of mathematics; and of the case of Amanda Knox, in which a judge's misunderstanding of probability led him to discount critical evidence -- which might have kept her in jail. Offering a fresh angle on cases from the nineteenth-century Dreyfus affair to the murder trial of Dutch nurse Lucia de Berk, Schneps and Colmez show how the improper application of mathematical concepts can mean the difference between walking free and life in prison. A colorful narrative of mathematical abuse, Math on Trial blends courtroom drama, history, and math to show that legal expertise isn't't always enough to prove a person innocent.
Math Through the Ages: A Gentle History for Teachers and Others
William P. Berlinghoff - 2002
Each sketch contains Questions and Projects to help you learn more about its topic and to see how its main ideas fit into the bigger picture of history. The 25 short stories are preceded by a 56-page bird's-eye overview of the entire panorama of mathematical history, a whirlwind tour of the most important people, events, and trends that shaped the mathematics we know today. Reading suggestions after each sketch provide starting points for readers who want to pursue a topic further."