David Salomon – författare
Visar alla böcker från författaren David Salomon. Handla med fri frakt och snabb leverans.
19 produkter
19 produkter
882 kr
Skickas inom 10-15 vardagar
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.Features & Benefits:* Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material* Presents information in an accessible, nonmathematical style* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.
1 101 kr
Skickas inom 10-15 vardagar
Coding is a highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding may prevent a serious and practical understanding of this important area. Coding for Data and Computer Communications avoids the complex mathematics, favoring the core concepts, principles, and methods of channel codes (for error correction), source codes (for compressing data), and secure codes (for data privacy). The most important approaches and techniques used to make the storage and transmission of information (data) fast, secure, and reliable are examined. This book is an essential resource for all security researchers and professionals who need to understand and effectively use coding employed in computers and data communications. Anchored by a clear, nonmathematical exposition, all the major topics, principles, and methods are presented in an accessible style suitable for professional specialists, nonspecialists, students, and individual self-study.
1 101 kr
Skickas inom 10-15 vardagar
Computer graphics is important in many areas including engineering design, architecture, education, and computer art and animation. This book examines a wide array of current methods used in creating real-looking objects in the computer, one of the main aims of computer graphics.Key features:* good foundational mathematical introduction to curves and surfaces; no advanced math required* Topics organized by different interpolation/approximation techniques, each technique giving useful information about curves and surfaces* Exposition motivated by numerous examples and exercises sprinkled throughout, aiding the computer science (architecture), engineer and applied math students in CAD areas* Includes a library of color images, Mathematica code listings and sections on curves & surfaces by refinement and on sweep surfaces* Web site maintained and updated by the author, providing readers with errata and auxiliary materialThis engaging text is geared to a broad and general readership of computer science/architecture engineers using computer graphics to design objects, programmers for computer gamemakers, applied mathematicians, and students majoring in computer graphics and its applications.
1 101 kr
Skickas inom 10-15 vardagar
Why is TeX so hard to use? Because it is in essence a programming language and so it is best viewed from this perspective. In this book, the author presents a complete course in TeX which will be suitable for users of TeX who want to advance beyond the basics. The initial chapters introduce the essential workings of TeX, including a detailed discussion of boxes and glue. Later chapters cover a wide range of advanced topics such as: macros, conditionals, tokens, leaders, file I/O, the line- and page-break algorithms, and output routines. Throughout, numerous examples are given and exercises (with answers) provide a means for readers to test their understanding of the material. As a result, no serious user of TeX will want to be without this text.
554 kr
Skickas inom 10-15 vardagar
The book is about compressing all types of computer data and what methods and algorithms to use. Its purpose is to describe and explain the principles behind the growing field of data compression and how to use them effectively. The discussion concentrates on general principles and methods all describes them with a minimum amount of mathematics. The book is aimed toward readers who do not have much background in computers and want to understand how data can be compressed. The reader can expect to gain a basic understanding of the important algorithms and methods used to compress data.Topics and features:- acceptable to use with only minimum computer and math background;- coverage of principles and general approaches, as well as specific methods and algorithms;- useful glossary with all basic terms for the field;- helpful appendix lists all algorithms presented in the book;- CD-ROM included with book comprising useful computer code used in the book and public-domain compression programs.
856 kr
Skickas inom 10-15 vardagar
This is a book for those interested in understanding how graphics programs work and how present-day computer graphics can generate realistic-looking curves, surfaces, and solid objects. The book emphasizes the mathematics behind computer graphics and most of the required math is included in an appendix. The main topics covered are: scan conversion methods; selecting the best pixels for generating lines, circles and other objects; geometric transformations and projections; translations, rotations, moving in 3d, perspective projections; curves and surfaces; construction, wire-frames, rendering, normals; and, CRTs, antialiasing, animation, color, perception, polygons, compression. With its numerous illustrative examples and exercises, the book makes a splendid text for a two-semester course in computer graphics for advanced undergraduates or graduate students. It also serves a fine reference for professionals in the computer graphics field.
390 kr
Skickas inom 10-15 vardagar
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors.Topics and features: examines the physical security of computer hardware, networks, and digital data; introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against malware, and describes a selection of viruses, worms and Trojans in detail; investigates the important threats to network security, and explores the subjects of authentication, spyware, and identity theft; discusses issues of privacy and trust in the online world, including children's privacy and safety; includes appendices which discuss the definition, meaning, and history of the term hacker, introduce the language of "l33t Speak", and provide a detailed virus timeline; provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book; supplies additional resources at the associated website, http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises.Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations.
1 867 kr
Skickas inom 10-15 vardagar
This book presents a broad overview of computer graphics (CG), its history, and the hardware tools it employs. examines advanced techniques in CG, including the nature and properties of light and color, graphics standards and file formats, and fractals;
882 kr
Skickas inom 10-15 vardagar
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.Features & Benefits:* Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material* Presents information in an accessible, nonmathematical style* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.
718 kr
Skickas inom 10-15 vardagar
Computer graphics is important in many areas including engineering design, architecture, education, and computer art and animation. This book examines a wide array of current methods used in creating real-looking objects in the computer, one of the main aims of computer graphics.Key features:- Good foundational mathematical introduction to curves and surfaces; no advanced math required- Topics organized by different interpolation/approximation techniques, each technique providing useful information about curves and surfaces- Exposition motivated by numerous examples and exercises sprinkled throughout, aiding the reader- Includes a gallery of color images, Mathematica code listings, and sections on curves and surfaces by refinement and on sweep surfaces- Web site maintained and updated by the author, providing readers with errata and auxiliary materialThis engaging text is geared to a broad and general readership of computer science/architecture engineers using computer graphics to design objects, programmers for computer gamemakers, applied mathematicians, and students majoring in computer graphics and its applications. It may be used in a classroom setting or as a general reference.
1 320 kr
Skickas inom 10-15 vardagar
Coding is a highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding may prevent a serious and practical understanding of this important area.Coding for Data and Computer Communications avoids the complex mathematics, favoring the core concepts, principles, and methods of channel codes (for error correction), source codes (for compressing data), and secure codes (for data privacy). The most important approaches and techniques used to make the storage and transmission of information (data) fast, secure, and reliable are examined. This book is an essential resource for all security researchers and professionals who need to understand and effectively use coding employed in computers and data communications. Anchored by a clear, nonmathematical exposition, all the major topics, principles, and methods are presented in an accessible style suitable for professional specialists, nonspecialists, students, and individual self-study.
538 kr
Skickas inom 10-15 vardagar
Joseph-Louis Lagrange (1736-1813), one of the greatest mathematicians of the 18th century, made important contributions to the theory of numbers and to analytical and celestial mechanics. His most important work is Mecanique Analytique (1788), the textbook on which all subsequent work in this field is based. A contempo rary reader is surprised to find no diagrams or figures of any kind in this book on mechanics. This reflects one extreme approach to graphics, namely considering it unimportant or even detracting as a teaching tool and not using it. Today, of course, this approach is unthinkable. Graphics, especially computer graphics, is commonly used in texts, advertisements, and movies to illustrate concepts, to emphasize points being discussed, and to entertain. Our approach to graphics has been completely reversed since the days of La grange, and it seems that much of this change is due to the use of computers. Computer graphics today is a mature, successful, and growing field. Itis used by many people for many purposes and it is enjoyed by even more people. One criterion for the maturity of a field of study is its size. When a certain discipline becomes so big that no one person can keep all of it in their head, we say that that discipline has matured (or has come of age). This is what happened to computer graphics in the last decade or so.
554 kr
Skickas inom 10-15 vardagar
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided.Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.
554 kr
Skickas inom 10-15 vardagar
It is probably a coincidence that the three main terms discussed in this book, namely transformations, projections,and perspective, are ambiguous. Here is what the dict- nary has to say about these terms. Transformation (a) The act or an instance of transforming. (b) The state of being transformed. A marked change, as in appearance or character, usually for the better. Mathematical transformation. (a) Replacing a variable in an expression by its value. (b) Mapping a mathematical space onto another or onto itself. In geometry. Moving, rotating, re?ecting, or otherwise systematically deforming a geometric ?gure (discussed in this book). In linguistics. (a) A rule to convert a syntactic form into another. (b) A sentence or sentential form derived by such a rule; a transform. In genetics. (a) The change undergone by a cell upon infection by a cancer-causing virus. (b) The alteration of a bacterial cell caused by the transfer of DNA from another bacterial cell, especially a pathogen. Projection The act of projecting or the condition of being projected. (a) An object or part thereof that extends outward. (b) Spiky projections on top of a fence. (c) A projection of land along the coast. A prediction or an estimate of a future situation, based on current data or trends. (a) The process of projecting a recorded image onto a viewing surface. (b) An image so projected.
554 kr
Skickas inom 10-15 vardagar
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties - such as those containing certain bit patterns, or which are robust - and these can be useful. This book brings this large set of codes to the attention of workers in the field and of students of computer science.David Salomon’s crystal clear style of writing and presentation, which has been familiar to readers for many years now allows easy access to the topic. Readers are only required to have a general familiarity with computer methods and essentially an understanding of the representation of data in bits and files.Computer scientists, electrical engineers and students majoring in computer science or electrical engineering will find this volume an invaluable resource, as will those readers in various physical sciences and mathematics.
445 kr
Skickas inom 10-15 vardagar
Compression is an option naturally selected when faced with problems of high costs or restricted space. This book offers readers a succinct and reader-friendly foundation to the most important topics in the field of data compression.Divided into two parts, Part I presents the basic approaches to data compression and describes a few popular techniques and methods that are commonly used to compress data. The reader discovers essential concepts, such as variable-length and prefix codes, statistical distribution and run-length codes. Part II concentrates on advanced techniques, such as arithmetic coding, orthogonal transforms, subband transforms and Burrows-Wheeler transform.Complete and clear, this book will be the perfect reference for advanced undergraduates in computer science and requires a minimum of mathematics. An author-maintained website provides readers with errata and auxiliary material.
1 967 kr
Skickas inom 7-10 vardagar
Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression. This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of "how to" use them. Detailed descriptions and explanations of the most well-known and frequently used compression methods are covered in a self-contained fashion, with an accessible style and technical level for specialists and non-specialists.
554 kr
Skickas inom 10-15 vardagar
Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security.
503 kr
Skickas inom 10-15 vardagar
Der Band untersucht die Perspektiven sozialer Demokratie in der Postdemokratie anhand zweier Leitfragen: Stellt Postdemokratie wirklich eine stabile Ordnung dar oder doch nur einen Zwischenzustand zu einer autoritären Überwindung der politischen Demokratie? Welche demokratischen Formen der Überwindung von Postdemokratie können zugleich als Verwirklichung sozialer Demokratie begriffen werden? Untersucht werden in diesem Zusammenhang sowohl Modelle, die helfen, das Postdemokratietheorem zu spezifizieren als auch die Bedeutung von Formen der Transnationalisierung für die postdemokratische Tendenz und Varianten einer sozialen Demokratie (globale soziale Rechte, Europäische Integration).