第十七章
FIGURE 17.1 The overlap ofcybersecurity and information security
FIGURE17.2TheCIAtriadofinformationsecurity
FIGURE17.3ACAPTCHAformverification
FIGURE17.4Afingerprintscanner

第十八章
FIGURE 18.1 Representing very large numbers




Now let’s see what happens when we add x to the sum of y and z:





FIGURE 18.2 Equally valid solutions to the same problem
FIGURE 18.3 The price of a goldfish pales in comparison to the price of an elephant

FIGURE 18.4 Orders ofcomplexity
© Pictorial Press Ltd/Alamy Stock Photo
FIGURE 18.5 Turing machine processing
FIGURE 18.6 Proposed program forsolving the halting problem
FIGURE 18.7 Proposed program forsolving the halting problem
FIGURE 18.8 Construction of NewProgram
FIGURE 18.9 A reorganization of algorithm classifications
FIGURE 18.10 Adding Class NP

posted on 2021-10-07 11:16  20201310寸头  阅读(16)  评论(0编辑  收藏  举报