Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Math Puzzles and Games, Grades 6-8: Over 300 Reproducible Puzzles that Teach Math and Problem Solving
Math Puzzles and Games, Grades 6-8: Over 300 Reproducible Puzzles that Teach Math and Problem Solving
In the 1950s we punished misbehaving students in middle school or junior high school by making them stay after school to do 100 multiplication or long-division math problems. Mathematics was taught in a highly ordered and mechanically repetitive manner with the objective being to master basic arithmetic skills. A decade later New Math emerged as a...
Bash Pocket Reference: Help for Power Users and Sys Admins
Bash Pocket Reference: Help for Power Users and Sys Admins

It’s simple: if you want to interact deeply with Mac OS X, Linux, and other Unix-like systems, you need to know how to work with the Bash shell. This concise little book puts all of the essential information about Bash right at your fingertips.

You’ll quickly find answers to the annoying questions that...

An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition...
Unknown Quantity: A Real and Imaginary History of Algebra
Unknown Quantity: A Real and Imaginary History of Algebra
Prime Obsession taught us not to be afraid to put the math in a math book. Unknown Quantity heeds the lesson well. So grab your graphing calculators, slip out the slide rules, and buckle up! John Derbyshire is introducing us to algebra through the ages—and it promises to be just what his die-hard fans have been waiting...
A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a renowned expert in the field, this book offers readers a succinct, reader-friendly foundation to the chief approaches, methods and techniques currently employed in the field of data compression.

Part I presents the basic...

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
Aha! Solutions (MAA Problem Book Series)
Aha! Solutions (MAA Problem Book Series)

Every mathematician (beginner, amateur, and professional alike) thrills to find simple, elegant solutions to seemingly difficult problems. Such happy resolutions are called ``aha! solutions,'' a phrase popularized by mathematics and science writer Martin Gardner. Aha! solutions are surprising, stunning, and scintillating: they reveal the beauty...

All-Digital Frequency Synthesizer in Deep-Submicron CMOS
All-Digital Frequency Synthesizer in Deep-Submicron CMOS

Design flow and circuit techniques of contemporary transceivers for multigigahertz mobile radio-frequency (RF) wireless applications are typically quite analog intensive and utilize process technologies that are incompatible with a digital baseband (DBB) and application processor (AP). Nowadays, the DBB and AP designs constantly migrate to...

BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
The origins of this book are part of an interesting period of my life. A period that
saw me move from a shy and disorganized young adult, into a software developer
who has toured various parts of the world, and met countless new friends and
colleagues. It all began in December of 2001, nearly five years ago. I started a
project
...
Computer Arithmetic: Algorithms and Hardware Designs
Computer Arithmetic: Algorithms and Hardware Designs

Ideal for graduate and senior undergraduate level courses in computer arithmetic and advanced digital design, Computer Arithmetic: Algorithms and Hardware Designs provides a balanced, comprehensive treatment of computer arithmetic, covering topics in arithmetic unit design and circuit implementation that complement the architectural...

Microchip Mathematics: Number Theory for Computer Users
Microchip Mathematics: Number Theory for Computer Users

In the Autumn of 1983, in the face of the phenomenal growth of home computer sales in the U.K., the national British newspaper The Guardian decided to produce, each week, a 'Computer Page'. Noone was quite sure exactly what should go into the page on a regular basis, but it was thought that a fortnightly column on computer mathematics...

Result Page: 13 12 11 10 9 8 7 6 5 4 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy