 |
|
|
|
 E: The Story of a NumberMaor attempts to give the irrational number e its rightful standing alongside pi as a fundamental constant in science and nature; he succeeds very well.... Maor writes so that both mathematical newcomers and long-time professionals alike can thoroughly enjoy his book, learn something new, and witness the ubiquity of mathematical ideas in... |  |  |  |  |
|
 Understanding Sleep and Dreaming (Springerlink Behavioral Science)
As I am writing this, I am anticipating the 50th anniversary o f tlie discovery o f
RELMS. For it was in 1951 that Aserinsky and Kleitman, who, while electronically
recording a person's sleep in a University o f Chicago lab, were surprised to notice that
eye movements occurred periodically even when their s~tbjectw as, by all... |  |  PossibilityPossibility offers a new analysis of the metaphysical concepts of possibility and necessity, one that does not rely on any sort of "possible worlds." The analysis proceeds from an account of the notion of a physical object and from the positing of properties and relations. It is motivated by considerations about how we actually speak of... |  |  |
|
 Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... |  |  Python Essential Reference (3rd Edition) (Developer's Library)Python Essential Reference, Second Edition, is the definitive guide to the Python programming language. Designed for programmers, it covers the core language, more than 100 modules in the standard library, and the techniques used to extend Python with compiled procedures in C or C++. Coverage expands upon and clarifies existing Python... |  |  The Cryptoclub: Using Mathematics to Make and Break Secret CodesJoin the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings. Classic coding methods are discussed, such as Caesar, substitution, Vigenère, and multiplicative ciphers as well as the modern RSA. Math topics covered... |
|
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 |