 Encyclopedia of Cryptology
Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that... |  |  Web2py Enterprise Web Framework, 2nd Ed
I am guilty! After publicly complaining about the existence of too many
Python based web frameworks, after praising the merits of Django, Pylons,
TurboGears, CherryPy, and web.py, after having used them professionally
and taught them in University level courses, I could not resist and created one
more: web2py.
Why did I... |  |  Fuzzy Logic with Engineering Applications, Third Edition
The first edition of Fuzzy Logic with Engineering Applications (1995) was the first classroom text for undergraduates in the field. Now updated for the second time, this new edition features the latest advances in the field including material on expansion of the MLFE method using genetic algorithms, cognitive mapping, fuzzy agent-based... |