Learn programming with Python by creating a text adventure. This book will teach you the fundamentals of programming, how to organize code, and some coding best practices. By the end of the book, you will have a working game that you can play or show off to friends. You will also be able to change the game and make it your...

Success in your calculus course starts here! James Stewart's CALCULUS texts are world-wide best-sellers for a reason: they are clear, accurate, and filled with relevant, real-world examples. With CALCULUS, Sixth Edition, Stewart conveys not only the utility of calculus to help you develop technical competence, but also gives you an...

Over the last two or three decades, elliptic curves have been playing an increasingly
important role both in number theory and in related fields such as
cryptography. For example, in the 1980s, elliptic curves started being used
in cryptography and elliptic curve techniques were developed for factorization
and primality...

Mathematics plays a key role in computer science, some researchers would consider computers as nothing but the physical embodiment of mathematical systems. And whether you are designing a digital circuit, a computer program or a new programming language, you need mathematics to be able to reason about the design -- its correctness,...

The art of teaching, Mark Van Doren said, is the art of assisting discovery. I have tried to
write a book that assists students in discovering calculus—both for its practical power and
its surprising beauty. In this edition, as in the first six editions, I aim to convey to the student
a sense of the utility of calculus and...

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

This festschrift volume, published in honor of Manfred Nagl on the occasion of his 65th birthday, contains 30 refereed contributions, edited by five of his academic descendants. The types of papers vary significantly, including classic research papers in the style of journal articles, surveys of focused research areas, essays reflecting on...

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

"The best introduction to Haskell available. There are many paths towards becoming comfortable and competent with the language but I think studying this book is the quickest path. I urge readers of this magazine to recommend Programming in Haskell to anyone who has been thinking about learning the language. Duncan Coutts, Monad Reader ...

In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...

This book is intended to be accessible to undergraduate students with two
years of typical mathematics experience, most likely meaning calculus with a little
linear algebra and differential equations. Thus, specifically, there is no assumption
oLa background inabstr&;t algebra or number theory, nor of probability, nor of
linear...