Introduction - If you have any usage issues, please Google them yourself
Computational theory leads the second edition, approximation algorithms (polynomial time optimization problems, minimal vertex covering (VERTEX-COVER) approximation algorithms), cryptography (key and public key cryptography)