𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Introduction to Maple || Differentiation

✍ Scribed by Heck, André


Book ID
120713989
Publisher
Springer New York
Year
2003
Tongue
English
Weight
999 KB
Edition
3
Category
Article
ISBN
1461300231

No coin nor oath required. For personal study only.

✦ Synopsis


The fully revised edition of this best-selling title presents the modern computer algebra system Maple. It teaches the reader not only what can be done by Maple but also how and why it can be done. It provides the necessary background for those who want the most of Maple or want to extend its built-in knowledge, and it includes both elementary and more sophisticated examples as well as many exercises.


📜 SIMILAR VOLUMES


Differential Equations with Maple || Int
✍ Davis, Jon H. 📂 Article 📅 2001 🏛 Birkhäuser Boston 🌐 English ⚖ 408 KB

Differential equations is a subject of wide applicability, and knowledge of dif­ Differential equations is a subject of wide applicability, and knowledge of dif­ ferential ferential equations equations topics topics permeates permeates all all areas areas of of study study in in engineering engineer

Introduction to Maple.by Andre Heck
✍ Review by: Wolfram Koepf 📂 Article 📅 1995 🏛 Society for Industrial and Applied Mathematics 🌐 English ⚖ 532 KB
Introduction to Cryptography with Maple
✍ Gómez Pardo, José Luis 📂 Article 📅 2012 🏛 Springer Berlin Heidelberg 🌐 German ⚖ 728 KB

This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools su

Introduction to Cryptography with Maple
✍ Gómez Pardo, José Luis 📂 Article 📅 2012 🏛 Springer Berlin Heidelberg 🌐 German ⚖ 438 KB

This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools su