KIRJAHANKINNAT | ||||
Esit�n Rovaniemen teknillisen oppilaitoksen kirjastoon hankittavaksi seuraavia teoksia: Aho, A. V., Hopcroft, J. E., Ullmann, J. D.: The Design and Analysis of Computer Algorithms, Addison-Wesley, 1974. Allenby, R. B. J. T.: Rings, Fields and Groups, An Introduction to Abstract Algebra, Edward Arnold, 1983. Allenby, R. B. J. T., Redfern, E. J.: Introduction to Number Theory with Computing, Edward Arnold, 1989, (ISBN 0-7131-3661-8). Martti Apajalahti: Todenn�k�isyyslaskennan ja tilastomatematiikan alkeet, Otava, 1973 (ISBN 951-1-01075-1). Michael Artin: Algebra, Prentice Hall Engineering, Science & Math, 1995 (ISBN 0-13-004763-5). E. R. Berlekamp: Algebraic Coding Theory, Aegean Park Press, 1984. E. Biglieri, D. Divsalar, P. McLane, M. K. Simon: Introduction to Trellis-Coded Modulation with Applications, Macmillan, New York, 1991. R. E. Blahut: Theory and Practice of Error Control Codes, Addison-Wesley, 1983. R. E. Blahut: Principles and Practice of Information Theory, Addison-Wesley, 1987. Berlekamp, Elwyn R.: Key Papers in the Development of Coding Theory, IEEE Press Selected Preprint Series, New York, 1974. Albrecht Beutelspacher: Cryptology, (ISBN 0-88385-504-6). R. Codement: Algebra. Cover, T. M., Thomas, J. A.: Elements of Information Theory, Wiley-Interscience, John Wiley and sons, inc., 1991, (ISBN 0-471-06259-6). R. A. Dean: Elements of Abstract Algebra, John Wiley, 1967. C. A. Deavours, L. Kruh: Machine Cryptography and Modern Cryptanalysis, Norwood MA: Artech House, 1985. D. E. Denning: Cryptography and Data Security, Addison-Wesley, 1982. R. C. Dixon: Spread Spectrum Techniques, IEEE Press, New York, 1976. Encyclopedic Dictionary of Mathematics: MIT Press, 1977, (ISBN 0-262-09016-3), Vol I+II. Fraleigh, John B., Beauregard, Raymond A.: Linear algebra, Historical notes by Victor J. Katz. 2nd ed., Addison-Wesley Publishing Company, Inc. (ISBN 0-201-11949-8). Fraleigh, John B., Beauregard, Raymond A.: A first course in abstract algebra. Historical notes by Victor J. Katz. 4th ed., Addison-Wesley Publishing Company, Inc., 1989, (ISBN 0-201-11949-8). L. E. Franks: Signal Theory, Prentice-Hall, Englewood Cliff, 1969. W. F. Friedman: Elements of Cryptanalysis, Aegean Park Press, 1976. H. F. Gaines: Cryptanalysis, American Photographic Press, 1937. (Reprinted by Dover Publications, 1956.) R. G. Gallager: Information Theory and Reliable Communication, Wiley, New York, 1968. Golomb, S. W.: Shift Register Sequences, San Francisco, Holden-Day, 1967. (Reprinted by Aegean Park Press, 1982.) Gradshteyn, I. S., Ryzhik, I. M.: Table of Integrals, Series, and Products, Academic Press, 1980. R. M. Gray: Source Coding Theory, Kluwer Academic Publishers, Boston, 1990. R. W. Hamming: Coding and Information Theory, Prentice-Hall, 1986. G. H. Hardy, E. M. Wright: An Introduction to the Theory of Numbers, 4th ed., Oxford University Press, London, 1962. A. Hodges: Alan Turing: The Enigma of Intelligence, Simon and Schuster, 1983. Hoffman, Leonard, Lindner, Phelps, Rodger and Wall: Coding theory, the essentials (ISBN 0-8248-8611-4). E. Horowitz, S. Sahni: Fundamentals of Computer Algorithms, Computer Science Press, 1978. D. Kahn: The Codebreakers: The Story of Secret Writing, Macmillan Publishing Co., 1967. D. Kilian: Uses of Randomness in Algorithms and Protocols, MIT Press, 1990. D. E. Knuth: The Art of Computer Programming, Vol 2, Seminumerical Algorithms, 2nd ed., Addison-Wesley, 1981. A. G. Konheim: Cryptography: A Primer, John Wiley & Sons, 1981. N. M. Korobov: Exponential Sums and their Applications, Kluwer Academic Publishers, 1992 (ISBN 0-7923-1647-9). Evangelos Kranakis: Primality and Cryptography, Wiley-Teubner Series in Computer Science, 1986. Usko Lahti: Algebralliset struktuurit (lukion matematiikan erikoiskurssi), Otava, 1975, (ISBN 951-1-02118-4). P. Lancaster, M. Tismenetsky: The Theory of Matrices, Academic Press, 1985. A. Leon-Carcia: Probability and Random Processes for Electrical Engineering, Addison-Wesley, Reading, Mass., 1994. Timo Lepist�, Antti Perttula: Matriisilaskenta (lis�painos), Tampereen teknillinen korkeakoulu, Opintomoniste 68, Tampere 1985 (ISBN 951-720-533-3, ISSN 0356-472X). R. Lidl, H. Niederreiter: Finite Fields, Addison Wesley, 1983. C. H. Meyer, S. M. Matyas: Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, 1982. Robert J. McEliece: Finite Fields for Computer Scientists and Engineers, Kluwer Academic Publishers, 1987. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, 816 sivua (ISBN 0-8493-8523-7). Dragoslav S. Mitrinovic, J. Sandor, B. Crstici: Handbook of Number Theory, Kluwer Academic Publishers, 1995 (ISBN 0-7923-3823-5). L. R. Rabiner, R. W. Schafer: Digital Processing of Speech Signals, Prentice-Hall, Englewood Cliffs, 1978. Robert J. McEliece: Finite Fields for Computer Scientists and Engineers, Kluwer Acedemic Publishers, 1986 (ISBN 0-89838-191-6). Lauri Myrberg: Algebra, korkeakouluja varten, Kirjayhtym?, 1978. M�kel�, Nevanlinna, Virkkunen: Numeerinen matematiikka. F. Nevanlinna: Johdatus lukuteoriaan ja algebraan, Otava, 1943. P. Z. Peebles: Probability, Random Variables, and Random Signal Principles, McGraw-Hill, New York, 1987. W. W. Peterson, E. J. Weldon: Error-correcting codes, 2 nd. ed., Cambridge: MIT Press 1972. Pless: Introduction to the theory of error-correcting codes, John Wiley and Sons, New York etc., 1989. (ISBN 0-471-61884-5). John G. Proakis: Digital Communications, McGraw-Hill, Electrical Engineering Series, 1995 (ISBN 0-07-051726-6). J. G. Proakis, D. G. Manolakis: Introduction to Digital Processing, Macmillan, New York, 1988. L. Redei: Algebra, Vol I, Pergamon Press, 1967. Man Young Rhee: Error-correcting coding theory, McGraw-Hill Publishing Company, New York, 1989. Hans Riesel: Prime Numbers and Computer Methods for Factorization, Birkh�user, 1985, (ISBN 0-8176-3291-3, ISBN 3-7643-3291-3). Kenneth H. Rosen: Elementary Number Theory and its Applications, Addison-Wesley, Reading, Mass. 1984. Joseph J. Rotman: A First Course in Abstract Algebra: Prentice Hall Engineering, Science & Math, 1995 (ISBN 0-13-311374). Ruohonen, Keijo: Koodaus- ja informaatioteoria, Tampereen teknillinen korkeakoulu, Opintomoniste 168, Tampere, 1993, (ISSN 0356-472X; 168, ISBN 951-721-996-2). Arto Salomaa Public-Key Cryptography, EATCS Monographs on Theoretical Computer Science, Vol 23, 1990. J. Seberry, J. Pieprzyk: Cryptography: An Introduction to Computer Security, Prentice-Hall, 1989. G. J. Simmons, ed.: Contemporary Cryptology: The Science of Information Integrity, IEEE Press, 1992. M. K. Simon, J. K. Omura, R. A. Scholtz, B. K. Levitt: Spread Spectrum Communications, Vol. I, II, III, Computer Science Press, 1985. A. Sinkov: Elementary Cryptanalysis - A mathematical approach, New York: Random House 1968. D. Slepian: Key Papers in the Development of Information Theory, IEEE Press, New York, 1974. N. J. A. Sloane, A. D. Wyner: The Collected Papers of Shannon, IEEE Press, New York, 1993. Stewart and Tall: Algebraic Number Theory, (ISBN 0-470-26660-0). G. Welchman: The Hut Six Story: Breaking the Enigma Codes, McGraw-Hill, 1982. A. J. Viterbi, J. K. Omura: Principles of Digital Communication and Coding, McGraw-Hill, New York, 1979. K. V�is�l�: Lukuteorian ja korkeamman algebran alkeet, Otava, 1961. Hannu V�liaho: Lineaarialgebra, Gaudeamus, 1981, (ISBN 951-662-293-3). R. E. Ziemer, R. L. Peterson: Digital Communications and Spread Spectrum Systems, MacMillan, New York, 1985. |