An introductory level single variable calculus book, covering standard topics in differential …
An introductory level single variable calculus book, covering standard topics in differential and integral calculus, and infinite series. Late transcendentals and multivariable versions are also available.
I intend this book to be, firstly, a introduction to calculus based …
I intend this book to be, firstly, a introduction to calculus based on the hyperreal number system. In other words, I will use infinitesimal and infinite numbers freely. Just as most beginning calculus books provide no logical justification for the real number system, I will provide none for the hyperreals. The reader interested in questions of foundations should consult books such as Abraham Robinson's Non-standard Analysis or Robert Goldblatt's Lectures on the Hyperreals. Secondly, I have aimed the text primarily at readers who already have some familiarity with calculus. Although the book does not explicitly assume any prerequisites beyond basic algebra and trigonometry, in practice the pace is too fast for most of those without some acquaintance with the basic notions of calculus.
This version of YAINTT has a particular emphasis on connections to cryptology. …
This version of YAINTT has a particular emphasis on connections to cryptology. The cryptologic material appears in Chapter 4 and §§5.5 and 5.6, arising naturally (I hope) out of the ambient number theory. The main cryptologic applications – being the RSA cryptosystem, Diffie-Hellman key exchange, and the ElGamal cryptosystem – come out so naturally from considerations of Euler’s Theorem, primitive roots, and indices that it renders quite ironic G.H. Hardy’s assertion [Har05] of the purity and eternal inapplicability of number theory. Note, however, that once we broach the subject of these cryptologic algorithms, we take the time to make careful definitions for many cryptological concepts and to develop some related ideas of cryptology which have much more tenuous connections to the topic of number theory. This material therefore has something of a different flavor from the rest of the text – as is true of all scholarly work in cryptology (indeed, perhaps in all of computer science), which is clearly a discipline with a different culture from that of “pure”mathematics. Obviously, these sections could be skipped by an uninterested reader, or remixed away by an instructor for her own particular class approach.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.