0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (7)
  • R100 - R250 (399)
  • R250 - R500 (1,680)
  • R500+ (50,217)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing

Handbook of Network and System Administration (Hardcover, New): Jan Bergstra, Mark Burgess Handbook of Network and System Administration (Hardcover, New)
Jan Bergstra, Mark Burgess
R4,654 Discovery Miles 46 540 Ships in 10 - 15 working days

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.
This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,146 Discovery Miles 11 460 Ships in 10 - 15 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Computer Systems and Software Engineering - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information... Computer Systems and Software Engineering - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R8,935 Discovery Miles 89 350 Ships in 18 - 22 working days
Demystifying Federated Learning for Blockchain and Industrial Internet of Things (Hardcover): Sandeep Kautish, Gaurav Dhiman Demystifying Federated Learning for Blockchain and Industrial Internet of Things (Hardcover)
Sandeep Kautish, Gaurav Dhiman
R6,648 Discovery Miles 66 480 Ships in 18 - 22 working days

In recent years, mobile technology and the internet of objects have been used in mobile networks to meet new technical demands. Emerging needs have centered on data storage, computation, and low latency management in potentially smart cities, transport, smart grids, and a wide number of sustainable environments. Federated learning's contributions include an effective framework to improve network security in heterogeneous industrial internet of things (IIoT) environments. Demystifying Federated Learning for Blockchain and Industrial Internet of Things rediscovers, redefines, and reestablishes the most recent applications of federated learning using blockchain and IIoT to optimize data for next-generation networks. It provides insights to readers in a way of inculcating the theme that shapes the next generation of secure communication. Covering topics such as smart agriculture, object identification, and educational big data, this premier reference source is an essential resource for computer scientists, programmers, government officials, business leaders and managers, students and faculty of higher education, researchers, and academicians.

Architects of Intelligence - The truth about AI from the people building it (Paperback): Martin Ford Architects of Intelligence - The truth about AI from the people building it (Paperback)
Martin Ford
R1,041 Discovery Miles 10 410 Ships in 18 - 22 working days

Book DescriptionHow will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level machine intelligence? What should we be concerned about as artificial intelligence advances? Architects of Intelligence contains a series of in-depth, one-to-one interviews where New York Times bestselling author, Martin Ford, uncovers the truth behind these questions from some of the brightest minds in the Artificial Intelligence community. Martin has wide-ranging conversations with twenty-three of the world's foremost researchers and entrepreneurs working in AI and robotics: Demis Hassabis (DeepMind), Ray Kurzweil (Google), Geoffrey Hinton (Univ. of Toronto and Google), Rodney Brooks (Rethink Robotics), Yann LeCun (Facebook) , Fei-Fei Li (Stanford and Google), Yoshua Bengio (Univ. of Montreal), Andrew Ng (AI Fund), Daphne Koller (Stanford), Stuart Russell (UC Berkeley), Nick Bostrom (Univ. of Oxford), Barbara Grosz (Harvard), David Ferrucci (Elemental Cognition), James Manyika (McKinsey), Judea Pearl (UCLA), Josh Tenenbaum (MIT), Rana el Kaliouby (Affectiva), Daniela Rus (MIT), Jeff Dean (Google), Cynthia Breazeal (MIT), Oren Etzioni (Allen Institute for AI), Gary Marcus (NYU), and Bryan Johnson (Kernel). Martin Ford is a prominent futurist, and author of Financial Times Business Book of the Year, Rise of the Robots. He speaks at conferences and companies around the world on what AI and automation might mean for the future.

Olympiad Online Test Package Class 9 - Theories with Examples, MCQS & Solutions, Previous Questions, Model Test Papers... Olympiad Online Test Package Class 9 - Theories with Examples, MCQS & Solutions, Previous Questions, Model Test Papers (Paperback)
Atul Bhardwaj, Mohd. Arif
R422 Discovery Miles 4 220 Ships in 18 - 22 working days

Developed by Professionals and Experienced Teachers from top schools across the country, the book has been divided into five sections namely Word Structure and Knowledge, Reading Comprehension, Spoken and Written Expressions, Achievers section, Model Papers. The concepts have been explained in brief through solved examples and Illustrations. To enhance the problem solving skills of candidates, Multiple Choice Questions (MCQs) with detailed solutions have been provided at the end of each chapter. Two Mock Test Papers have been provided for practice purpose. A CD containing Study Chart for systematic preparation, Tips & Tricks to crack English Olympiad, Pattern of exam, and links of Previous Years Papers is accompanied with this book. The book is recommended for various school level and competitive exams. #v&spublishers

Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover): Omowunmi E. Isafiade, Antoine B. Bagula Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover)
Omowunmi E. Isafiade, Antoine B. Bagula
R5,267 Discovery Miles 52 670 Ships in 18 - 22 working days

The field of data mining is receiving significant attention in today's information-rich society, where data is available from different sources and formats, in large volumes, and no longer constitutes a bottleneck for knowledge acquisition. This rich information has paved the way for novel areas of research, particularly in the crime data analysis realm. Data Mining Trends and Applications in Criminal Science and Investigations presents scientific concepts and frameworks of data mining and analytics implementation and uses across various domains, such as public safety, criminal investigations, intrusion detection, crime scene analysis, and suspect modeling. Exploring the diverse ways that data is revolutionizing the field of criminal science, this publication meets the research needs of law enforcement professionals, data analysts, investigators, researchers, and graduate-level students.

Codes and Ciphers - A History Of Cryptography (Hardcover): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Hardcover)
Alexander d'Agapeyeff
R952 Discovery Miles 9 520 Ships in 10 - 15 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography

The History of Information Security - A Comprehensive Handbook (Hardcover): Karl Maria Michael De Leeuw, Jan Bergstra The History of Information Security - A Comprehensive Handbook (Hardcover)
Karl Maria Michael De Leeuw, Jan Bergstra
R4,752 Discovery Miles 47 520 Ships in 10 - 15 working days

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.
These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
- Interdisciplinary coverage of the history Information Security
- Written by top experts in law, history, computer and information science
- First comprehensive work in Information Security

Co-Clustering (Hardcover): G Govaert Co-Clustering (Hardcover)
G Govaert
R3,767 Discovery Miles 37 670 Ships in 18 - 22 working days

Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.

Human, Social, and Organizational Aspects of Health Information Systems (Hardcover): A. W. Kushniruk, E. M. Borycki Human, Social, and Organizational Aspects of Health Information Systems (Hardcover)
A. W. Kushniruk, E. M. Borycki
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

Human, Social, and Organizational Aspects of Health Information Systems offers an evidence-based management approach to issues associated with the human and social aspects of designing, developing, implementing, and maintaining health information systems across a healthcare organization - specific to an individual, team, organizational, system, and international perspective. Integrating knowledge from multiple levels, this book will benefit scholars and practitioners from the medical information, health service management, information technology arenas.

Data Science Applications using Python and R - Text Analytics (Hardcover): Jeffrey Strickland Data Science Applications using Python and R - Text Analytics (Hardcover)
Jeffrey Strickland
R1,358 Discovery Miles 13 580 Ships in 18 - 22 working days
Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies... Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R606 R545 Discovery Miles 5 450 Save R61 (10%) Ships in 18 - 22 working days
Cultural Commonalities in the Digital Ecosystem (Hardcover): M. Pelissier Cultural Commonalities in the Digital Ecosystem (Hardcover)
M. Pelissier
R3,750 Discovery Miles 37 500 Ships in 18 - 22 working days

INTELLECTUAL TECHNOLOGIES SET Coordinated by Jean-Max Noyer and Maryse Carmes The dynamics of production, circulation and dissemination of knowledge that are currently developing in the digital ecosystem testify to a profound change in capitalism. On the margins of the traditional duo of knowledge markets and exclusive property rights, the emerging notion of cultural commons is opening the door to new modes of production based on hybrid market arrangements and an inclusive understanding of property. This book studies the political economy of cultural commons in the digital ecosystem, outlining the contexts and areas of thought in which this concept has emerged and identifying the socio-economic, technical and political issues associated with it. It also analyzes the specific physical conditions that enable the implementation of the economy of cultural commons in a specific digital ecosystem, that of books, by studying the effects of digital libraries and self-publishing platforms.

Osculant - A Self-organizing Scheduling and Resource Management Scheme in a Network Computing Environment (Hardcover): Hsin-Ho... Osculant - A Self-organizing Scheduling and Resource Management Scheme in a Network Computing Environment (Hardcover)
Hsin-Ho Wu
R2,057 Discovery Miles 20 570 Ships in 18 - 22 working days
Virtually Sacred - Myth and Meaning in World of Warcraft and Second Life (Hardcover): Robert M. Geraci Virtually Sacred - Myth and Meaning in World of Warcraft and Second Life (Hardcover)
Robert M. Geraci
R1,396 Discovery Miles 13 960 Ships in 10 - 15 working days

Millions of users have taken up residence in virtual worlds, and in those worlds they find opportunities to revisit and rewrite their religious lives. Robert Geraci argues that virtual worlds and video games have become a locus for the satisfaction of religious needs, providing many users with communities, a meaningful experience of history and human activity, and a sense of transcendence. Using interviews, surveys, and his own first-hand experience within the games, Geraci shows how World of Warcraft and Second Life provide participants with the opportunity to rethink what it means to be religious in the contemporary world. Not all participants use virtual worlds for religious purposes, but many online residents use them to rearrange or replace religious practice as designers and users collaborate in the production of a new spiritual marketplace. Using World of Warcraft and Second Life as case studies, this book shows that many residents now use virtual worlds to re-imagine their traditions and work to restore them to authentic sanctity, or else replace religious institutions with virtual communities that provide meaning and purpose to human life. For some online residents, virtual worlds are even keys to a post-human future where technology can help us transcend mortal life. Geraci argues that World of Warcraft and Second Life are virtually sacred because they do religious work. They often do such work without regard for and frequently in conflict with traditional religious institutions and practices; ultimately they participate in our sacred landscape as outsiders, competitors, and collaborators.

Healthcare Information Systems and Informatics - Research and Practices (Hardcover): Joseph Tan Healthcare Information Systems and Informatics - Research and Practices (Hardcover)
Joseph Tan
R4,921 Discovery Miles 49 210 Ships in 18 - 22 working days

Healthcare Information Systems and Informatics: Research and Practices compiles estimable knowledge on the research of information systems and informatics applications in the healthcare industry. This book addresses organizational issues, including technology adoption, diffusion, and acceptance, as well as cost benefits and cost effectiveness, of advancing health information systems and informatics applications as innovative forms of investment in healthcare. Rapidly changing technology and the complexity of its applications make this book an invaluable resource to researchers and practitioners in the healthcare fields.

Introduction to the Theory of Radiopolarimetric Navigation Systems (Hardcover, 1st ed. 2020): Kozlov A.I., Logvin A.I.,... Introduction to the Theory of Radiopolarimetric Navigation Systems (Hardcover, 1st ed. 2020)
Kozlov A.I., Logvin A.I., Sarychev V.A., Shatrakov Y.G., Zavalishin O.I.
R4,064 Discovery Miles 40 640 Ships in 18 - 22 working days

The book highlights three types of technologies being developed for autonomous solution of navigation problems. These technologies are based on the polarization structure, ultra-broadband and the fluctuation characteristics (slow and fast) of the radiolocation signals. The book presents the problems of intrinsic thermal radio emission polarization and change in radio waves polarization when they are reflected from objects with non-linear properties. The purpose of this book is to develop the foundations for creating autonomous radionavigation systems to provide aviation with navigation systems that will substantially increase its capabilities, specifically acting where satellite technologies do not work. The book is intended for specialists involved in the development and operation of aviation-technical complexes, as well as for specialists of national aviation regulators and ICAO experts dealing with the problems of improving flight safety.

Fast Fourier Transforms (Hardcover): C. Sidney Burrus, Matteo Frigo, G Steven Johnson Fast Fourier Transforms (Hardcover)
C. Sidney Burrus, Matteo Frigo, G Steven Johnson
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days
Imaging and Sensing for Unmanned Aircraft Systems, Volume 2 - Deployment and Applications (Hardcover): Vania V. Estrela, Jude... Imaging and Sensing for Unmanned Aircraft Systems, Volume 2 - Deployment and Applications (Hardcover)
Vania V. Estrela, Jude Hemanth, Osamu Saotome, George Nikolakopoulos, Roberto Sabatini
R3,101 R2,804 Discovery Miles 28 040 Save R297 (10%) Ships in 18 - 22 working days

This two-volume book set explores how sensors and computer vision technologies are used for the navigation, control, stability, reliability, guidance, fault detection, self-maintenance, strategic re-planning and reconfiguration of unmanned aircraft systems (UAS). Volume 1 concentrates on UAS control and performance methodologies including Computer Vision and Data Storage, Integrated Optical Flow for Detection and Avoidance Systems, Navigation and Intelligence, Modeling and Simulation, Multisensor Data Fusion, Vision in Micro-Aerial Vehicles (MAVs), Computer Vision in UAV using ROS, Security Aspects of UAV and Robot Operating System, Vision in Indoor and Outdoor Drones, Sensors and Computer Vision, and Small UAV for Persistent Surveillance. Volume 2 focuses on UAS deployment and applications including UAV-CPSs as a Testbed for New Technologies and a Primer to Industry 5.0, Human-Machine Interface Design, Open Source Software (OSS) and Hardware (OSH), Image Transmission in MIMO-OSTBC System, Image Database, Communications Requirements, Video Streaming, and Communications Links, Multispectral vs Hyperspectral Imaging, Aerial Imaging and Reconstruction of Infrastructures, Deep Learning as an Alternative to Super Resolution Imaging, and Quality of Experience (QoE) and Quality of Service (QoS).

Handbook of Evaluation Methods for Health Informatics (Paperback): Jytte Brender McNair Handbook of Evaluation Methods for Health Informatics (Paperback)
Jytte Brender McNair
R2,701 Discovery Miles 27 010 Ships in 10 - 15 working days

This Handbook provides a complete compendium of methods for evaluation of IT-based systems and solutions within healthcare. Emphasis is entirely on assessment of the IT-system within its organizational environment. The author provides a coherent and complete assessment of methods addressing interactions with and effects of technology at the organizational, psychological, and social levels.
It offers an explanation of the terminology and theoretical foundations underlying the methodological analysis presented here. The author carefully guides the reader through the process of identifying relevant methods corresponding to specific information needs and conditions for carrying out the evaluation study. The Handbook takes a critical view by focusing on assumptions for application, tacit built-in perspectives of the methods as well as their perils and pitfalls.
*Collects a number of evaluation methods of medical informatics
*Addresses metrics and measures
*Includes an extensive list of anotated references, case studies, and a list of useful Web sites

Design Solutions for Improving Website Quality and Effectiveness (Hardcover): G Sreedhar Design Solutions for Improving Website Quality and Effectiveness (Hardcover)
G Sreedhar
R5,576 Discovery Miles 55 760 Ships in 18 - 22 working days

As the Internet has evolved to become an integral part of modern society, the need for better quality assurance practices in web engineering has heightened. Adherence to and improvement of current standards ensures that overall web usability and accessibility are at optimum efficiency. Design Solutions for Improving Website Quality and Effectiveness is an authoritative reference source for the latest breakthroughs, techniques, and research-based solutions for the overall improvement of the web designing process. Featuring relevant coverage on the analytics, metrics, usage, and security aspects of web environments, this publication is ideally designed for reference use by engineers, researchers, graduate students, and web designers interested in the enhancement of various types of websites.

3D Future Internet Media (Hardcover, 2014 ed.): Ahmet Kondoz, Tasos Dagiuklas 3D Future Internet Media (Hardcover, 2014 ed.)
Ahmet Kondoz, Tasos Dagiuklas
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The main contributions are based on the results of the FP7 European Projects ROMEO, which focus on new methods for the compression and delivery of 3D multi-view video and spatial audio, as well as the optimization of networking and compression jointly across the Future Internet (www.ict-romeo.eu).

The delivery of 3D media to individual users remains a highly challenging problem due to the large amount of data involved, diverse network characteristics and user terminal requirements, as well as the user s context such as their preferences and location. As the number of visual views increases, current systems will struggle to meet the demanding requirements in terms of delivery of constant video quality to both fixed and mobile users.

ROMEO will design and develop hybrid-networking solutions that combine the DVB-T2 and DVB-NGH broadcast access network technologies together with a QoE aware Peer-to-Peer (P2P) distribution system that operates over wired and wireless links. Live streaming 3D media needs to be received by collaborating users at the same time or with imperceptible delay to enable them to watch together while exchanging comments as if they were all in the same location.

The volume provides state-of-the-art information on 3D multi-view video, spatial audio networking protocols for 3D media, P2P 3D media streaming, and 3D Media delivery across heterogeneous wireless networks among other topics. Graduate students and professionals in electrical engineering and computer science with an interest in 3D Future Internet Media will find this volume to be essential reading."

Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New): Hamid R. Nemati,... Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New)
Hamid R. Nemati, Yang Li
R4,605 Discovery Miles 46 050 Ships in 18 - 22 working days

In today s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R1,854 Discovery Miles 18 540 Ships in 18 - 22 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Recent Progress in General Topology
M. Husek, J Van Mill Hardcover R6,187 Discovery Miles 61 870
Boris Johnson - The Rise And Fall Of A…
Andrew Gimson Hardcover R775 R681 Discovery Miles 6 810
Pfeil Arkansas Sharpening Stone - #3
R456 R417 Discovery Miles 4 170
Hardy Type Inequalities on Time Scales
Ravi P. Agarwal, Donal O'Regan, … Hardcover R3,741 Discovery Miles 37 410
Caligo Safe Wash Etching Ink Tin…
R1,264 R1,143 Discovery Miles 11 430
The Structure of Functions
Hans Triebel Hardcover R2,991 Discovery Miles 29 910
Natural Fingering - A Topographical…
Jon Verbalis Hardcover R1,941 Discovery Miles 19 410
Explaining Post-Conflict Reconstruction
Desha Girod Hardcover R3,566 Discovery Miles 35 660
Musical Form
Ebenezer Prout Paperback R500 Discovery Miles 5 000
Sleeper
Mike Nicol Paperback R300 R277 Discovery Miles 2 770

 

Partners