The Baconian Keys


Book Description




Playful Letters


Book Description

Alphabetic letters are ubiquitous, multivalent, and largely ignored. Playful Letters reveals their important cultural contributions through Alphabetics—a new interpretive model for understanding artistic production that attends to the signifying interplay of the graphemic, phonemic, lexical, and material capacities of letters. A key period for examining this interplay is the century and a half after the invention of printing, with its unique media ecology of print, manuscript, sound, and image. Drawing on Shakespeare, anthropomorphic typography, figured letters, and Cyrillic pedagogy and politics, this book explores the ways in which alphabetic thinking and writing inform literature and the visual arts, and it develops reading strategies for the “letterature” that underwrites such cultural production. Playful Letters begins with early modern engagements with the alphabet and the human body—an intersection where letterature emerges with startling force. The linking of letters and typography with bodies produced a new kind of literacy. In turn, educational habits that shaped letter learning and writing permeated the interrelated practices of typography, orthography, and poetry. These mutually informing processes render visible the persistent crumbling of words into letters and their reconstitution into narrative, poetry, and image. In addition to providing a rich history of literary and artistic alphabetic interrogation in early modern Western Europe and Russia, Playful Letters contributes to the continuous story of how people use new technologies and media to reflect on older forms, including the alphabet itself.




Junior Typewriting Studies


Book Description










Essential Algorithms


Book Description

A friendly introduction to the most useful algorithms written in simple, intuitive English The revised and updated second edition of Essential Algorithms, offers an accessible introduction to computer algorithms. The book contains a description of important classical algorithms and explains when each is appropriate. The author shows how to analyze algorithms in order to understand their behavior and teaches techniques that the can be used to create new algorithms to meet future needs. The text includes useful algorithms such as: methods for manipulating common data structures, advanced data structures, network algorithms, and numerical algorithms. It also offers a variety of general problem-solving techniques. In addition to describing algorithms and approaches, the author offers details on how to analyze the performance of algorithms. The book is filled with exercises that can be used to explore ways to modify the algorithms in order to apply them to new situations. This updated edition of Essential Algorithms: Contains explanations of algorithms in simple terms, rather than complicated math Steps through powerful algorithms that can be used to solve difficult programming problems Helps prepare for programming job interviews that typically include algorithmic questions Offers methods can be applied to any programming language Includes exercises and solutions useful to both professionals and students Provides code examples updated and written in Python and C# Essential Algorithms has been updated and revised and offers professionals and students a hands-on guide to analyzing algorithms as well as the techniques and applications. The book also includes a collection of questions that may appear in a job interview. The book’s website will include reference implementations in Python and C# (which can be easily applied to Java and C++).




Python Programming in Context


Book Description

Python Programming in Context, Third Edition provides a comprehensive and accessible introduction to Python fundamentals. Updated with the latest version of Python, the new Third Edition offers a thorough overview of multiple applied areas, including image processing, cryptography, astronomy, the Internet, and bioinformatics. Taking an active learning approach, each chapter starts with a comprehensive real-world project that teaches core design techniques and Python programming while engaging students. An ideal first language for learners entering the rapidly expanding field of computer science, Python gives students a solid platform of key problem-solving skills that translate easily across programming languages.







Security in Wireless Communication Networks


Book Description

Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field Security in Wireless Communication Networksdelivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks,encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems. The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast nature of the system, with all of its inherent harshness and interference. Readers will learn: A comprehensive introduction to the background of wireless communication network security, including a broad overview of wireless communication networks, security services, the mathematics crucial to the subject, and cryptographic techniques An exploration of wireless local area network security, including Bluetooth security, Wi-Fi security, and body area network security An examination of wide area wireless network security, including treatments of 2G, 3G, and 4G Discussions of future development in wireless security, including 5G, and vehicular ad-hoc network security Perfect for undergraduate and graduate students in programs related to wireless communication, Security in Wireless Communication Networks will also earn a place in the libraries of professors, researchers, scientists, engineers, industry managers, consultants, and members of government security agencies who seek to improve their understanding of wireless security protocols and practices.