eBooks-it.org Logo
eBooks-IT.org Inner Image

CRC Press eBooks Page 33

Download free CRC Press eBooks Page 33

Luck, Logic and White Lies

The Mathematics of Games
Luck, Logic and White Lies Image
The mathematical underpinnings of games, whether they are strategic or games of chance, have been known for centuries, but are usually only understood by players and aficionados who have a background in mathematics. The author has succeeded in making that knowledge accessible, entertaining, and useful to everyone who likes to play and win. The information applies to such diverse and popular games as Roulette, Monopoly, Chess, Go, numerous card games, and many more. He reviews the mathematical foundations, probability, combinatorics, and mathematical game theory, the field that won John Nash of A Beautiful Mind the Nobel Prize, and emphasizes the implementation of these techniques so that players can put them to work immediately. An extensive bibliogr...

Quantum Computing

From Linear Algebra to Physical Realizations
Quantum Computing Image
Covering both theory and progressive experiments, Quantum Computing: From Linear Algebra to Physical Realizations explains how and why superposition and entanglement provide the enormous computational power in quantum computing. This self-contained, classroom-tested book is divided into two sections, with the first devoted to the theoretical aspects of quantum computing and the second focused on several candidates of a working quantum computer, evaluating them according to the DiVincenzo criteria. Topics in Part I Linear algebra Principles of quantum mechanics Qubit and the first application of quantum information processingquantum key distribution Quantum gates Simple yet elucidating examples of quantum algorithms Quantum circuits that impleme...

Practical Hacking Techniques and Countermeasures

Practical Hacking Techniques and Countermeasures Image
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques...

Codes

The Guide to Secrecy From Ancient to Modern Times
Codes Image
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist.The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and ...

Quantum Communications and Cryptography

Quantum Communications and Cryptography Image
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect secrecy. Quantum Communications and Cryptography is the first comprehensive review of the past, present, and potential developments in this dynamic field. Leading ex...



2007 - 2017 © eBooks-IT.org