Join the cryptokids as they apply basic mathematics to make and break secret codes. This book discusses coding methods such as Caesar, substitution, Vigenere, and multiplicative ciphers as well as the modern RSA...
This book provides a dual perspective on the Internet of Things and ubiquitous computing, along with their applications in healthcare and smart cities. It also covers big data, embedded Systems and wireless Sensor Networks. Detailed coverage of the underlying architecture, framework, and state-of th..
Ideal for both first-time and advanced users of Maple, The MAPLE Book offers extensive coverage of the latest version of the outstanding software package. It provides a tutorial that extends from high school algebra to advanced topics in mathematics, including special functions, multivariable calcul..
From computers to optical communication, this text explores core principles underlying those technologies that continue to revolutionize our lives. Designed for nonscientists, this book requires no higher math or prior physics. It details basic physics principles at the core of information technolog..
Trust-Worthy Cyber Physical Systems Engineering provides practitioners and researchers with a comprehensive introduction to the area of trustworthy Cyber Physical Systems (CPS) engineering. Featuring contributions from leading international experts, the book contains sixteen self-contained chapters ..
Many people know that a major part of the functionality of the MATLAB® software package is based on Java. But fewer people know how to manipulate Java to achieve improved appearance and functionality and thus heighten MATLAB software’s applicability to real world, modern situations. Organized by rel..