Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Prime Numbers: The Most Mysterious Figures in Math
Prime Numbers: The Most Mysterious Figures in Math

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?
...

The Mechatronics Handbook (Electrical Engineering Handbook)
The Mechatronics Handbook (Electrical Engineering Handbook)
The Mechatronics Handbook is highly recommended for academic libraries supporting undergraduate or advanced programs in electronics, electrical engineering, computer science, robotics, and related subjects.
-Holly Flynn, Mathematics Librarian, Michigan State University Vernon G. Grove Research Library

…This handbook is a
...
Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Labour Women in Power: Cabinet Ministers in the Twentieth Century
Labour Women in Power: Cabinet Ministers in the Twentieth Century

This book examines the political lives and contributions of Margaret Bondfield, Ellen Wilkinson, Barbara Castle, Judith Hart and Shirley Williams, the only five women to achieve Cabinet rank in a Labour Government from the party’s creation until Blair became Prime Minister. Paula Bartley brings together newly discovered...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Cryptanalytic Attacks on RSA
Cryptanalytic Attacks on RSA
RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science....
IT Project Portfolio Management
IT Project Portfolio Management
While consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors...
Unknown Quantity: A Real and Imaginary History of Algebra
Unknown Quantity: A Real and Imaginary History of Algebra
Prime Obsession taught us not to be afraid to put the math in a math book. Unknown Quantity heeds the lesson well. So grab your graphing calculators, slip out the slide rules, and buckle up! John Derbyshire is introducing us to algebra through the ages—and it promises to be just what his die-hard fans have been waiting...
Computation and Reasoning: A Type Theory for Computer Science (International Series of Monographs on Computer Science)
Computation and Reasoning: A Type Theory for Computer Science (International Series of Monographs on Computer Science)
"The best logic of our time is to be found in computer science departments....Computer scientists (many of whom are former logicians) are developing the logic that really matters, the one that really meets the challenges of today's demands for automated reasoning. This book is a prime example of such triumph of useful logic." --The...
Testing SAP R/3: A Manager's Step-by-Step Guide
Testing SAP R/3: A Manager's Step-by-Step Guide

Destined to become your essential SAP R/3 desktop reference

Testing SAP R/3: A Manager′s Step–by–Step Guide demystifies this powerful software to enable professionals to implement a disciplined, efficient, and proven approach for testing SAP R/3. Providing much needed industry guidance for...

Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy