This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of "how to" use them. Detailed descriptions and explanations of the most well-known and frequently used compression methods are covered in a self-contained fashion, with an accessible style and technical level for specialists and nonspecialists. Comments and suggestions of many readers have been included as a benefit to future readers, and a website is maintained and updated by the author.
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.
This book presents a broad overview of computer graphics (CG), its history, and the hardware tools it employs. Covering a substantial number of concepts and algorithms, the text describes the techniques, approaches, and algorithms at the core of this field. Emphasis is placed on practical design and implementation, highlighting how graphics software works, and explaining how current CG can generate and display realistic-looking objects. The mathematics is non-rigorous, with the necessary mathematical background introduced in the Appendixes. Features: includes numerous figures, examples and solved exercises; discusses the key 2D and 3D transformations, and the main types of projections; presents an extensive selection of methods, algorithms, and techniques; examines advanced techniques in CG, including the nature and properties of light and color, graphics standards and file formats, and fractals; explores the principles of image compression; describes the important input/output graphics devices.
Drawing on the work of a diverse group of young international architects and forged from the intellectual and cultural milieus of fashion, ecology, cybernetics, evolutionary biology, chemistry, and consumer behavior, this polemical book examines the potential of a new generation of information-rich and formally complex patterns in contemporary architecture.
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties and these can be useful. This book brings this large set of codes to the attention of workers in the field and for students of computer science. The author’s crystal clear style of writing and presentation allows easy access to the topic.
This comprehensive reference for professionals and students in the computer graphics field clearly explains how graphics programs work and how they generate realistic objects and animations. Topics include scan conversion methods, translations, rotations, moving in 3D, and perspective projections. The mathematics and geometry behind the computer graphics are also presented.
A complete course in TeX that will be suitable for users of TeX who want to advance beyond the basics. The initial chapters introduce the essential workings of TeX and the later chapters cover a wide range of advanced topics such as macros, conditionals, tokens, leaders, file I/O, the line- and page-break algorithms, and output routines.