Cryptography: A Very Short Introduction
We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.
In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...
Fundamentals of Predictive Text Mining (Texts in Computer Science)
Five years ago, we authored “Text Mining: Predictive Methods for Analyzing Unstructured Information.” That book was geared mostly to professional practitioners, but was adaptable to course work with some effort by the instructor. Many topics were evolving, and this was one of the earliest efforts to collect material for predictive...
|Result Page: 18 17 16 15 14 13 12 11 10 9 |