This textbook is an introduction to Scientific Computing, in which several numerical methods for the computer-based solution of certain classes of mathematical problems are illustrated.
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key.
Graph algorithms are easy to visualize and indeed there already exists a variety of packages to animate the dynamics when solving problems from graph theory.
Computational logic is a fast-growing field with applications in artificial intelligence, constraint solving, and the design and verification of software and hardware systems.
Just as in its 1st edition, this book starts with illustrations of the ubiquitous character of optimization, and describes numerical algorithms in a tutorial way.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
This textbook offers a comprehensive introduction to data science and financial technology, with a focus on advanced tools, data modeling, and their applications in FinTech.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
In the current age of automation, there is a growing opportunity to connect design and manufacturing into a single workflow that harnesses industrial tools such as robots and brings their efficiencies to vulnerable building sites within the conservation of cultural heritage.
This textbook offers a comprehensive introduction to data science and financial technology, with a focus on advanced tools, data modeling, and their applications in FinTech.
For the first time in history, the most powerful artificial intelligence (AI) works through language itself: The same medium humans use to think and communicate.
This book examines and develops digital control techniques for wind power systems and their integration into the grid, with the goal of addressing issues related to the efficiency and quality of energy injected into the electrical network.
The book covers the strategies and frameworks for designing and developing intelligent systems to solve real-life problems related to digital health, telemedicine, and smart-cities applications.
This book explores the essential concepts and practical implementation of IPv6, the next-generation Internet Protocol designed to address the limitations of IPv4 and support the exponential growth of Internet-connected devices.
The Roland x0x Series: A History of Early Roland Synthesizers and Drum Machines from SH-101 to TR-909 offers an authoritative but accessible investigation of how the design of these most influential musical instruments is shaped by technological factors, institutional contexts, market forces and imagined users and uses.
This book examines and develops digital control techniques for wind power systems and their integration into the grid, with the goal of addressing issues related to the efficiency and quality of energy injected into the electrical network.
In the current age of automation, there is a growing opportunity to connect design and manufacturing into a single workflow that harnesses industrial tools such as robots and brings their efficiencies to vulnerable building sites within the conservation of cultural heritage.
The book covers the strategies and frameworks for designing and developing intelligent systems to solve real-life problems related to digital health, telemedicine, and smart-cities applications.
The Roland x0x Series: A History of Early Roland Synthesizers and Drum Machines from SH-101 to TR-909 offers an authoritative but accessible investigation of how the design of these most influential musical instruments is shaped by technological factors, institutional contexts, market forces and imagined users and uses.
Unlocking Business Insights provides a practical framework for extracting meaningful business insights from data, guiding leaders through fundamental principles that transform overwhelming datasets into actionable business value.
Unlocking Business Insights provides a practical framework for extracting meaningful business insights from data, guiding leaders through fundamental principles that transform overwhelming datasets into actionable business value.
This book explores the essential concepts and practical implementation of IPv6, the next-generation Internet Protocol designed to address the limitations of IPv4 and support the exponential growth of Internet-connected devices.
For the first time in history, the most powerful artificial intelligence (AI) works through language itself: The same medium humans use to think and communicate.
Storage, the computer s second function, has become progressively more complex to meet growing needs in terms of capacity, speed, security and energy efficiency.
Enterprise Metaverse: Crafting Competitive Advantage in Virtual Realities offers a critical guide to navigating the rapidly advancing landscape of the metaverse, diving into the strategic and operational implications of virtual worlds that are reshaping business, entertainment, and interpersonal interaction.
Computer Architecture: A Quantitative Approach, has been considered essential reading by instructors, students and practitioners of computer design for nearly 30 years.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
This two-volume set constitutes the refereed proceedings of the 18th International Conference on Interactive Digital Storytelling, ICIDS 2025, held in Saint Julian, Malta, during December 1–5, 2025.