From the original hard cover edition:In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large numbers into their primes. Thus an ancient number-theory concept now plays a crucial role in communication among millions of people who may have little or no knowledge of even elementary mathematics. Hans Riesel's highly successful first edition of this book has now been enlarged and updated with the goal of satisfying the needs of researchers, students, practitioners of cryptography, and non-scientific readers with a mathematical inclination. It includes important advances in computational prime number theory and in factorization as well as re-computed and enlarged tables, accompanied by new tables reflecting current research by both the author and his coworkers and by independent researchers. The book treats four fundamental problems: the number of primes below a given limit, the approximate number of primes, the recognition of primes and the factorization of large numbers. The author provides explicit algorithms and computer programs, and has attempted to discuss as many of the classically important results as possible, as well as the most recent discoveries. The programs include are written in PASCAL to allow readers to translate the programs into the language of their own computers. The independent structure of each chapter of the book makes it highly readable for a wide variety of mathematicians, students of applied number theory, and others interested in both study and research in number theory and cryptography.
R for SAS and SPSS Users (Statistics and Computing)
While SAS and SPSS have many things in common, R is very different. My
goal in writing this book is to help you translate what you know about SAS or
SPSS into a working knowledge of R as quickly and easily as possible. I point
out how they differ using terminology with which you are familiar, and show
you which add-on packages will...
Oracle Fusion Middleware Patterns
Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.
The Design of Approximation Algorithms
Discrete optimization problems are everywhere, from traditional operations research planning problems, such as scheduling, facility location, and network design; to computer science problems in databases; to advertising issues in viral marketing. Yet most such problems are NP-hard. Thus unless P = NP, there are no efficient algorithms to find...
This seventh edition of Malvino's classic "Electronic Principles" offers students a definitive overview of electronic circuits and devices. Expert knowledge of electronic devices is presented in a stimulating, clearly written, conversational style. The new, streamlined book design is full-color throughout, with ample, clear...
Biologic Therapy of Leukemia (Contemporary Hematology)
In the latter part of the 20th century, hematologists and medical oncologists
were trained to treat leukemia with systemic therapy that was cytotoxic to both
normal and malignant cells. Some of these therapies, such as methotrexate and
L-asparaginase, were developed within the context of known biologic pathophysiology,