KIRJAHANKINNAT
Esit�n Rovaniemen teknillisen oppilaitoksen kirjastoon hankittavaksi seuraavia teoksia: 

Aho, A. V., Hopcroft, J. E., Ullmann, J. D.:
The Design and Analysis of Computer Algorithms, Addison-Wesley, 1974. 

Allenby, R. B. J. T.:
Rings, Fields and Groups, An Introduction to Abstract Algebra, Edward Arnold, 1983. 

Allenby, R. B. J. T., Redfern, E. J.:
Introduction to Number Theory with Computing, Edward Arnold, 1989, (ISBN 0-7131-3661-8). 

Martti Apajalahti:
Todenn�k�isyyslaskennan ja tilastomatematiikan alkeet, Otava, 1973 (ISBN 951-1-01075-1). 

Michael Artin:
Algebra, Prentice Hall Engineering, Science & Math, 1995 (ISBN 0-13-004763-5). 

E. R. Berlekamp:
Algebraic Coding Theory, Aegean Park Press, 1984. 

E. Biglieri, D. Divsalar, P. McLane, M. K. Simon:
Introduction to Trellis-Coded Modulation with Applications, Macmillan, New York, 1991. 

R. E. Blahut:
Theory and Practice of Error Control Codes, Addison-Wesley, 1983. 

R. E. Blahut:
Principles and Practice of Information Theory, Addison-Wesley, 1987. 

Berlekamp, Elwyn R.:
Key Papers in the Development of Coding Theory, IEEE Press Selected Preprint Series, New York, 1974. 

Albrecht Beutelspacher:
Cryptology, (ISBN 0-88385-504-6). 

R. Codement:
Algebra. 

Cover, T. M., Thomas, J. A.:
Elements of Information Theory, Wiley-Interscience, John Wiley and sons, inc., 1991, (ISBN 0-471-06259-6). 

R. A. Dean:
Elements of Abstract Algebra, John Wiley, 1967. 

C. A. Deavours, L. Kruh:
Machine Cryptography and Modern Cryptanalysis, Norwood MA: Artech House, 1985. 

D. E. Denning:
Cryptography and Data Security, Addison-Wesley, 1982. 

R. C. Dixon:
Spread Spectrum Techniques, IEEE Press, New York, 1976. 

Encyclopedic Dictionary of Mathematics:
MIT Press, 1977, (ISBN 0-262-09016-3), Vol I+II. 

Fraleigh, John B., Beauregard, Raymond A.:
Linear algebra, Historical notes by Victor J. Katz. 2nd ed., Addison-Wesley Publishing Company, Inc. (ISBN 0-201-11949-8). 

Fraleigh, John B., Beauregard, Raymond A.:
A first course in abstract algebra. Historical notes by Victor J. Katz. 4th ed., Addison-Wesley Publishing Company, Inc., 1989, (ISBN 0-201-11949-8). 

L. E. Franks:
Signal Theory, Prentice-Hall, Englewood Cliff, 1969. 

W. F. Friedman:
Elements of Cryptanalysis, Aegean Park Press, 1976. 

H. F. Gaines:
Cryptanalysis, American Photographic Press, 1937. (Reprinted by Dover Publications, 1956.) 

R. G. Gallager:
Information Theory and Reliable Communication, Wiley, New York, 1968. 

Golomb, S. W.:
Shift Register Sequences, San Francisco, Holden-Day, 1967. (Reprinted by Aegean Park Press, 1982.) 

Gradshteyn, I. S., Ryzhik, I. M.:
Table of Integrals, Series, and Products, Academic Press, 1980. 

R. M. Gray:
Source Coding Theory, Kluwer Academic Publishers, Boston, 1990. 

R. W. Hamming:
Coding and Information Theory, Prentice-Hall, 1986. 

G. H. Hardy, E. M. Wright:
An Introduction to the Theory of Numbers, 4th ed., Oxford University Press, London, 1962. 

A. Hodges:
Alan Turing: The Enigma of Intelligence, Simon and Schuster, 1983. 

Hoffman, Leonard, Lindner, Phelps, Rodger and Wall:
Coding theory, the essentials (ISBN 0-8248-8611-4). 

E. Horowitz, S. Sahni:
Fundamentals of Computer Algorithms, Computer Science Press, 1978. 

D. Kahn:
The Codebreakers: The Story of Secret Writing, Macmillan Publishing Co., 1967. 

D. Kilian:
Uses of Randomness in Algorithms and Protocols, MIT Press, 1990. 

D. E. Knuth:
The Art of Computer Programming, Vol 2, Seminumerical Algorithms, 2nd ed., Addison-Wesley, 1981. 

A. G. Konheim:
Cryptography: A Primer, John Wiley & Sons, 1981. 

N. M. Korobov:
Exponential Sums and their Applications, Kluwer Academic Publishers, 1992 (ISBN 0-7923-1647-9). 

Evangelos Kranakis:
Primality and Cryptography, Wiley-Teubner Series in Computer Science, 1986. 

Usko Lahti:
Algebralliset struktuurit (lukion matematiikan erikoiskurssi), Otava, 1975, (ISBN 951-1-02118-4). 

P. Lancaster, M. Tismenetsky:
The Theory of Matrices, Academic Press, 1985. 

A. Leon-Carcia:
Probability and Random Processes for Electrical Engineering, Addison-Wesley, Reading, Mass., 1994. 

Timo Lepist�, Antti Perttula:
Matriisilaskenta (lis�painos), Tampereen teknillinen korkeakoulu, Opintomoniste 68, Tampere 1985 (ISBN 951-720-533-3, ISSN 0356-472X). 

R. Lidl, H. Niederreiter:
Finite Fields, Addison Wesley, 1983. 

C. H. Meyer, S. M. Matyas:
Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, 1982. 

Robert J. McEliece:
Finite Fields for Computer Scientists and Engineers, Kluwer Academic Publishers, 1987. 

Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone:
Handbook of Applied Cryptography, CRC Press, 816 sivua (ISBN 0-8493-8523-7). 

Dragoslav S. Mitrinovic, J. Sandor, B. Crstici:
Handbook of Number Theory, Kluwer Academic Publishers, 1995 (ISBN 0-7923-3823-5). 

L. R. Rabiner, R. W. Schafer:
Digital Processing of Speech Signals, Prentice-Hall, Englewood Cliffs, 1978. 

Robert J. McEliece:
Finite Fields for Computer Scientists and Engineers, Kluwer Acedemic Publishers, 1986 (ISBN 0-89838-191-6). 

Lauri Myrberg:
Algebra, korkeakouluja varten, Kirjayhtym?, 1978. 

M�kel�, Nevanlinna, Virkkunen:
Numeerinen matematiikka. 

F. Nevanlinna:
Johdatus lukuteoriaan ja algebraan, Otava, 1943. 

P. Z. Peebles:
Probability, Random Variables, and Random Signal Principles, McGraw-Hill, New York, 1987. 

W. W. Peterson, E. J. Weldon:
Error-correcting codes, 2 nd. ed., Cambridge: MIT Press 1972. 

Pless:
Introduction to the theory of error-correcting codes, John Wiley and Sons, New York etc., 1989. (ISBN 0-471-61884-5). 

John G. Proakis:
Digital Communications, McGraw-Hill, Electrical Engineering Series, 1995 (ISBN 0-07-051726-6). 

J. G. Proakis, D. G. Manolakis:
Introduction to Digital Processing, Macmillan, New York, 1988. 

L. Redei:
Algebra, Vol I, Pergamon Press, 1967. 

Man Young Rhee:
Error-correcting coding theory, McGraw-Hill Publishing Company, New York, 1989. 

Hans Riesel:
Prime Numbers and Computer Methods for Factorization, Birkh�user, 1985, (ISBN 0-8176-3291-3, ISBN 3-7643-3291-3). 

Kenneth H. Rosen:
Elementary Number Theory and its Applications, Addison-Wesley, Reading, Mass. 1984. 

Joseph J. Rotman:
A First Course in Abstract Algebra: Prentice Hall Engineering, Science & Math, 1995 (ISBN 0-13-311374). 

Ruohonen, Keijo:
Koodaus- ja informaatioteoria, Tampereen teknillinen korkeakoulu, Opintomoniste 168, Tampere, 1993, (ISSN 0356-472X; 168, ISBN 951-721-996-2). 

Arto Salomaa
Public-Key Cryptography, EATCS Monographs on Theoretical Computer Science, Vol 23, 1990. 

J. Seberry, J. Pieprzyk:
Cryptography: An Introduction to Computer Security, Prentice-Hall, 1989. 

G. J. Simmons, ed.:
Contemporary Cryptology: The Science of Information Integrity, IEEE Press, 1992. 

M. K. Simon, J. K. Omura, R. A. Scholtz, B. K. Levitt:
Spread Spectrum Communications, Vol. I, II, III, Computer Science Press, 1985. 

A. Sinkov:
Elementary Cryptanalysis - A mathematical approach, New York: Random House 1968. 

D. Slepian:
Key Papers in the Development of Information Theory, IEEE Press, New York, 1974. 

N. J. A. Sloane, A. D. Wyner:
The Collected Papers of Shannon, IEEE Press, New York, 1993. 

Stewart and Tall:
Algebraic Number Theory, (ISBN 0-470-26660-0). 

G. Welchman:
The Hut Six Story: Breaking the Enigma Codes, McGraw-Hill, 1982. 

A. J. Viterbi, J. K. Omura:
Principles of Digital Communication and Coding, McGraw-Hill, New York, 1979. 

K. V�is�l�:
Lukuteorian ja korkeamman algebran alkeet, Otava, 1961. 

Hannu V�liaho:
Lineaarialgebra, Gaudeamus, 1981, (ISBN 951-662-293-3). 

R. E. Ziemer, R. L. Peterson:
Digital Communications and Spread Spectrum Systems, MacMillan, New York, 1985.
1