Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
An engaging introduction to vectors and matrices and the algorithms
that operate on them, intended for the student who knows how to
program. Mathematical concepts and computational problems are
motivated by applications in computer science. The reader learns by
"doing," writing programs to implement the mathematical concepts
and using them to carry out tasks and explore the applications.
Examples include: error-correcting codes, transformations in
graphics, face detection, encryption and secret-sharing, integer
factoring, removing perspective from an image, PageRank (Google's
ranking algorithm), and cancer detection from cell features. A
companion web site, codingthematrix.com provides data and support
code. Most of the assignments can be auto-graded online. Over two
hundred illustrations, including a selection of relevant "xkcd"
comics.
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.
|
You may like...
Heart Of A Strong Woman - From Daveyton…
Xoliswa Nduneni-Ngema, Fred Khumalo
Paperback
Every Day Is An Opening Night - Our…
Des & Dawn Lindberg
Paperback
(1)
|