0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (87)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August... Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers (Paperback, 2003 ed.)
Kaisa Nyberg, Howard Heys
R1,690 Discovery Miles 16 900 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002. The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.

Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings (Paperback, 2002 ed.)
Yuliang Zheng
R1,790 Discovery Miles 17 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.

Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques,... Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings (Paperback, 2002 ed.)
Lars Knudsen
R3,122 Discovery Miles 31 220 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002.The 33 revised full papers presented were carefully reviewed and selected from a total of 122 submissions. The papers are organized in topical sections on cryptanalysis, public-key encryption, information theory and new models, implementational analysis, stream ciphers, digital signatures, key exchange, modes of operation, traitor tracing and id-based encryption, multiparty and multicast, and symmetric cryptology.

Wavelet Analysis and Its Applications - Second International Conference, WAA 2001, Hong Kong, China, December 18-20, 2001.... Wavelet Analysis and Its Applications - Second International Conference, WAA 2001, Hong Kong, China, December 18-20, 2001. Proceedings (Paperback, 2001 ed.)
Yuan Y. Tang, Victor Wickerhauser, Pong C Yuen, Chun-Hung Li
R1,717 Discovery Miles 17 170 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Wavelet Analysis and Its Applications, WAA 2001, held in Hong Kong, China in December 2001. The 24 revised full papers and 27 revised short papers presented were carefully reviewed and selected from a total of 67 full paper submissions. The book offers topical sections on image compression and coding, video coding and processing, theory, image processing, signal processing, and systems and applications.

Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9-13, 2001. Proceedings (Paperback, 2001 ed.)
Colin Boyd
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001, held in Gold Coast, Australia in December 2001.The 33 revised full papers presented together with an invited paper were carefully reviewed and selected from 153 submissions. The papers are organized in topical sections on lattice based cryptography, human identification, practical public key cryptography, cryptography based on coding theory, block ciphers, provable security, threshold cryptography, two-party protocols, zero knowledge, cryptographic building blocks, elliptic curve cryptography, and anonymity.

Advances in Cryptology - CRYPTO 2001 - 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August... Advances in Cryptology - CRYPTO 2001 - 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings (Paperback, 2001 ed.)
Joe Kilian
R3,156 Discovery Miles 31 560 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st Annual International Cryptology Conference, CRYPTO 2001, held in Santa Barbara, CA, USA in August 2001. The 33 revised full papers presented were carefully reviewed and selected from a total of 156 submissions. The papers are organized in topical sections on foundations, traitor tracing, multi-party computation, two-party computation, elliptic curves, OAEP, encryption and authentication, signature schemes, protocols, cryptanalysis, applications of group theory and coding theory, broadcast and secret sharing, and soundness and zero-knowledge.

Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback): RA... Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback)
RA Grimes
R719 R661 Discovery Miles 6 610 Save R58 (8%) Ships in 12 - 19 working days

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized 'crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques... Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6-10, 2001, Proceedings (Paperback, 2001 ed.)
Birgit Pfitzmann
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

EUROCRYPT 2001, the 20th annual Eurocrypt conference, was sponsored by the IACR, the International Association for Cryptologic Research, see http://www. iacr. org/, this year in cooperation with the Austrian Computer - ciety (OCG). The General Chair, Reinhard Posch, was responsible for local or- nization, and registration was handled by the IACR Secretariat at the University of California, Santa Barbara. In addition to the papers contained in these proceedings, we were pleased that the conference program also included a presentation by the 2001 IACR d- tinguished lecturer, Andrew Odlyzko, on "Economics and Cryptography" and an invited talk by Silvio Micali, "Zero Knowledge Has Come of Age. " Furthermore, there was the rump session for presentations of recent results and other (p- sibly satirical) topics of interest to the crypto community, which Jean-Jacques Quisquater kindly agreed to run. The Program Committee received 155 submissions and selected 33 papers for presentation; one of them was withdrawn by the authors. The review process was therefore a delicate and challenging task for the committee members, and I wish to thank them for all the e?ort they spent on it. Each committee member was responsible for the review of at least 20 submissions, so each paper was carefully evaluated by at least three reviewers, and submissions with a program committee member as a (co-)author by at least six.

Fundamentals of Information Theory and Coding Design (Hardcover): Roberto Togneri, Christopher J. S. Desilva Fundamentals of Information Theory and Coding Design (Hardcover)
Roberto Togneri, Christopher J. S. Desilva
R3,903 Discovery Miles 39 030 Ships in 12 - 19 working days

Books on information theory and coding have proliferated over the last few years, but few succeed in covering the fundamentals without losing students in mathematical abstraction. Even fewer build the essential theoretical framework when presenting algorithms and implementation details of modern coding systems.

Without abandoning the theoretical foundations, Fundamentals of Information Theory and Coding Design presents working algorithms and implementations that can be used to design and create real systems. The emphasis is on the underlying concepts governing information theory and the mathematical basis for modern coding systems, but the authors also provide the practical details of important codes like Reed-Solomon, BCH, and Turbo codes. Also setting this text apart are discussions on the cascading of information channels and the additivity of information, the details of arithmetic coding, and the connection between coding of extensions and Markov modelling.

Complete, balanced coverage, an outstanding format, and a wealth of examples and exercises make this an outstanding text for upper-level students in computer science, mathematics, and engineering and a valuable reference for telecommunications engineers and coding theory researchers.

Inside Blockchain, Bitcoin, and Cryptocurrencies (Hardcover): Niaz Chowdhury Inside Blockchain, Bitcoin, and Cryptocurrencies (Hardcover)
Niaz Chowdhury
R1,546 Discovery Miles 15 460 Ships in 12 - 19 working days

This book covers blockchain from the underlying principles to how it enables applications to survive and surf on its shoulder. Having covered the fundamentals of blockchain, the book turns to cryptocurrency. It thoroughly examines Bitcoin before presenting six other major currencies in a rounded discussion. The book then bridges between technology and finance, concentrating on how blockchain-based applications, including cryptocurrencies, have pushed hard against mainstream industries in a bid to cement their positions permanent. It discusses blockchain as underlying banking technology, crypto mining and offering, cryptocurrency as investment instruments, crypto regulations, and markets.

Selected Areas in Cryptography - 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999... Selected Areas in Cryptography - 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings (Paperback, 2000 ed.)
Howard Heys, Carlisle Adams
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

SAC'99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen's University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC'99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet Security The timing of the workshop was particularly fortuitous as the announcement by NIST of the v e nalists for AES coincided with the rst morning of the workshop, precipitating lively discussion on the merits of the selection! A total of 29 papers were submitted to SAC'99 and, after a review process that had all papers reviewed by at least 3 referees, 17 were accepted and p- sented. As well, two invited presentations were given: one by Miles Smid from NIST entitled \From DES to AES: Twenty Years of Government Initiatives in Cryptography"and the other by Mike Reiter from Bell Labs entitled \Password Hardening with Applications to VPN Security". The program committee for SAC'99 consisted of the following members: Carlisle Adams, Tom Cusick, Howard Heys, Lars Knudsen, Henk Meijer, Luke O'Connor, Doug Stinson, Stao rd Tavares, and Serge Vaudenay.

Coding Theory and Cryptography - From Enigma and Geheimschreiber to Quantum Theory (Paperback, illustrated edition): David... Coding Theory and Cryptography - From Enigma and Geheimschreiber to Quantum Theory (Paperback, illustrated edition)
David Joyner
R2,865 Discovery Miles 28 650 Ships in 10 - 15 working days

The National Security Agency funded a conference on Coding theory, Cryp- tography, and Number Theory (nick-named Cryptoday) at the United States Naval Academy, on October 25-27, 1998. We were very fortunate to have been able to attract talented mathematicians and cryptographers to the meeting. Unfortunately, some people couldn't make it for either scheduling or funding reasons. Some of these have been invited to contribute a paper anyway. In addition, Prof. William Tutte and Frode Weierud have been kind enough to allow the inclusion of some very interesting unpublished papers of theirs. The papers basically fall into three catagories. Historical papers on cryp- tography done during World War II (Hatch, Hilton, Tutte, Ulfving, and Weierud), mathematical papers on more recent methods in cryptography (Cosgrave, Lomonoco, Wardlaw), and mathematical papers in coding theory (Gao, Joyner, Michael, Shokranian, Shokrollahi). A brief biography of the authors follows. - Peter Hilton is a Distinguished Professor of Mathematics Emeritus at the State University of New York at Binghamton. He worked from 1941 to 1945 in the British cryptanalytic headquarters at Bletchley Park. Profes- sor Hilton has done extensive research in algebraic topology and group theory. - William Tutte is a Distinguished Professor Emeritus and an Adjunct Pro- fessor in the Combinatorics and Optimization Department at the Univer- sity of Waterloo. He worked from 1941 to 1945 in the British cryptana- lytic headquarters at Bletchley Park. Professor Tutte has done extensive research in the field of combinatorics.

Coding Theory, Cryptography and Related Areas - Proceedings of an International Conference on Coding Theory, Cryptography and... Coding Theory, Cryptography and Related Areas - Proceedings of an International Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico, in April 1998 (Paperback, 2000 ed.)
Johannes Buchmann, Tom Hoeholdt, Henning Stichtenoth, Horacio Tapia-Recillas
R2,953 Discovery Miles 29 530 Ships in 10 - 15 working days

Leading researchers in the field of coding theory and cryptography present their newest findings, published here for the first time following a presentation at the International Conference on Coding Theory, Cryptography and Related Areas. The authors include Tom Hoeholdt, Henning Stichtenoth, and Horacio Tapia-Recillas.

Cryptology - Classical and Modern (Hardcover, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Hardcover, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R3,601 Discovery Miles 36 010 Ships in 12 - 19 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

Data Analysis - Scientific Modeling and Practical Application (Paperback, 2000 ed.): Wolfgang A. Gaul Data Analysis - Scientific Modeling and Practical Application (Paperback, 2000 ed.)
Wolfgang A. Gaul; Foreword by R.R. Sokal; Edited by Otto Opitz, Martin Schader
R3,114 Discovery Miles 31 140 Ships in 10 - 15 working days

"Data Analysis" in the broadest sense is the general term for a field of activities of ever-increasing importance in a time called the information age. It covers new areas with such trendy labels as, e.g., data mining or web mining as well as traditional directions emphazising, e.g., classification or knowledge organization. Leading researchers in data analysis have contributed to this volume and delivered papers on aspects ranging from scientific modeling to practical application. They have devoted their latest contributions to a book edited to honor a colleague and friend, Hans-Hermann Bock, who has been active in this field for nearly thirty years.

Advances in Cryptology - CRYPTO '99 - 19th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '99 - 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings (Paperback, 1999 ed.)
Michael Wiener
R1,827 Discovery Miles 18 270 Ships in 10 - 15 working days

Crypto '99, the Nineteenth Annual Crypto Conference, was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department, University of California, Santa Barbara (UCSB). The General Chair, Donald Beaver, was responsible for local organization and registration. The Program Committee considered 167 papers and selected 38 for presentation. This year's conference program also included two invited lectures. I was pleased to include in the program UeliM aurer's presentation "Information Theoretic Cryptography" and Martin Hellman's presentation "The Evolution of Public Key Cryptography." The program also incorporated the traditional Rump Session for informal short presentations of new results, run by Stuart Haber. These proceedings include the revised versions of the 38 papers accepted by the Program Committee. These papers were selected from all the submissions to the conference based on originality, quality, and relevance to the field of cryptology. Revisions were not checked, and the authors bear full responsibility for the contents of their papers.

Quantum Computing and Quantum Communications - First NASA International Conference, QCQC '98, Palm Springs, California,... Quantum Computing and Quantum Communications - First NASA International Conference, QCQC '98, Palm Springs, California, USA, February 17-20, 1998, Selected Papers (Paperback, 1999 ed.)
Colin P. Williams
R1,733 Discovery Miles 17 330 Ships in 10 - 15 working days

This book contains selected papers presented at the First NASA International Conference on Quantum Computing and Quantum Communications, QCQC'98, held in Palm Springs, California, USA in February 1998.As the record of the first large-scale meeting entirely devoted to quantum computing and communications, this book is a unique survey of the state-of-the-art in the area. The 43 carefully reviewed papers are organized in topical sections on entanglement and quantum algorithms, quantum cryptography, quantum copying and quantum information theory, quantum error correction and fault-tolerant quantum computing, and embodiments of quantum computers.

Lectures on Data Security - Modern Cryptology in Theory and Practice (Paperback, 1999 ed.): Ivan Damgard Lectures on Data Security - Modern Cryptology in Theory and Practice (Paperback, 1999 ed.)
Ivan Damgard
R1,593 Discovery Miles 15 930 Ships in 10 - 15 working days

In July 1998, a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity, Denmark.Thistook place as a part of a series of summer schools organized by the European Edu- tional Forum, an organizationconsisting of the researchcenters TUCS (Finland), IPA(Holland)andBRICS(Denmark, Aarhus).Thelocalorganizingcommittee consisted of Jan Camenisch, Janne Christensen, Ivan Damga? ard (chair), Karen Moller, andLouisSalvail.ThesummerschoolwassupportedbytheEuropean Union. Modern cryptology is an extremely fast growing ?eld and is of fundamental importance in very diverse areas, from theoretical complexity theory to practical electroniccommerceontheInternet.Wethereforesetouttoorganizeaschool that would enable young researchers and students to obtain an overview of some mainareas, coveringboththeoreticalandpracticaltopics.Itisfairtosaythat the school was a success, both in terms of attendance (136 participants from over20countries)andintermsofcontents.Itisapleasuretothankallofthe speakers for their cooperation and the high quality of their presentations. A total of 13 speakers gave talks: Mihir Bellare, University of California, San Diego; Gilles Brassard, University of Montreal; David Chaum, DigiCash; Ronald Cramer, ETH Zur ] ich; Ivan Damg? ard, BRICS; Burt Kaliski, RSA Inc.; Lars Knudsen, Bergen University; Peter Landrock, Cryptomathic; Kevin Mc- Curley, IBM Research, Almaden; Torben Pedersen, Cryptomathic; Bart Preneel, Leuven University; Louis Salvail, BRICS; Stefan Wolf, ETH Zur ] ich.

Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover): Jian Gong, Wei Xu Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover)
Jian Gong, Wei Xu
R1,981 Discovery Miles 19 810 Ships in 12 - 19 working days

"A systematic review of the structure and context of the blockchain-derived economic model... (the book) describes cryptoeconomics in connection with the game theory, behavioral economics and others in simple understandable language."-Wang Feng, founder of Linekong Interactive Group and Mars Finance, partner in Geekbang Venture Capital Blockchain technology has subverted existing perceptions and is the start of an economic revolution, called, cryptoeconomics. Blockchain is a key component of cryptoeconomics. Vlad Zamfir, a developer of Ethereum, defines this term as "a formal discipline that studies protocols that governs the production, distribution, and consumption of goods and services in a decentralized digital economy. Cryptoeconomics is a practical science that focuses on the design and characterization of these protocols". This book explains the structures of blockchain-derived economic models, their history, and their application. It uses real-world cases to illustrate the relationship between cryptoeconomics and blockchain. Blockchain technology solves trust issues. A blockchain application can restrict behavior on the blockchain through a reward and punishment system that enables consensus in an innovative way. The greatest significance of cryptoeconomics lies in guaranteeing safety, stability, activity, and order in a decentralized consensus system. Security and stability are achieved mainly by cryptographical mechanisms. Activity and order are achieved through economic mechanisms. Cryptoeconomics and Blockchain: Ignighting a New Era of Blockchain discusses the most popular consensus algorithms and optimization mechanisms. With examples explained in clear and simple terms that are easy to understand, the book also explores economic mechanisms of blockchain such as game theory and behavioral economics.

Computer Architecture and Organization - Fundamentals and Architecture Security (Paperback, 1st ed. 2021): Shuangbao Paul Wang Computer Architecture and Organization - Fundamentals and Architecture Security (Paperback, 1st ed. 2021)
Shuangbao Paul Wang
R1,516 Discovery Miles 15 160 Ships in 12 - 19 working days

In today's workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks. Studying computer architecture and organization from a security perspective is a new area. There are many books on computer architectures and many others on computer security. However, books introducing computer architecture and organization with security as the main focus are still rare. This book addresses not only how to secure computer components (CPU, Memory, I/O, and network) but also how to secure data and the computer system as a whole. It also incorporates experiences from the author's recent award-winning teaching and research. The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU, cache security, virtualization, cloud computing, IoT, and quantum computing, as well as other advanced computing topics into the classroom in order to close the gap in workforce development. The book is chiefly intended for undergraduate and graduate students in computer architecture and computer organization, as well as engineers, researchers, cybersecurity professionals, and middleware designers.

International Power and International Communication (Paperback, 1995 ed.): Mark D Alleyne International Power and International Communication (Paperback, 1995 ed.)
Mark D Alleyne
R1,581 Discovery Miles 15 810 Ships in 10 - 15 working days

Over seven chapters the book shows how international communication has been shaped by the structure of international political power and how these means of global communication have in turn been strategic tools for the exercise of international political power. There are separate chapters on global news flows, the international trade in cultural products (films, books, advertising, recorded music, periodicals and books), and government propaganda activities. The politics of the International Telecommunication Union (ITU), the Universal Postal Union (UPU) and the World Intellectual Property Organisation (WIPO) are analysed.

A Comprehensive Course in Number Theory (Hardcover, New): Alan Baker A Comprehensive Course in Number Theory (Hardcover, New)
Alan Baker
R3,286 Discovery Miles 32 860 Ships in 12 - 19 working days

Developed from the author's popular text, A Concise Introduction to the Theory of Numbers, this book provides a comprehensive initiation to all the major branches of number theory. Beginning with the rudiments of the subject, the author proceeds to more advanced topics, including elements of cryptography and primality testing, an account of number fields in the classical vein including properties of their units, ideals and ideal classes, aspects of analytic number theory including studies of the Riemann zeta-function, the prime-number theorem and primes in arithmetical progressions, a description of the Hardy-Littlewood and sieve methods from respectively additive and multiplicative number theory and an exposition of the arithmetic of elliptic curves. The book includes many worked examples, exercises and further reading. Its wider coverage and versatility make this book suitable for courses extending from the elementary to beginning graduate studies.

Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992): Dennis Longley, Michael Shain,... Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992)
Dennis Longley, Michael Shain, William Caelli
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The dictionary contains extended essays on risk analysis, personal computing, key management, pin management and authentication.

Handbook of Personal Data Protection (Paperback, 1st ed. 1992): Wayne Madsen Handbook of Personal Data Protection (Paperback, 1st ed. 1992)
Wayne Madsen
R5,161 Discovery Miles 51 610 Ships in 10 - 15 working days

Although the concept of personal data protection began in Europe in the early 1970s, data protection legislation has been adopted in many countries. In Europe there is a wide divergence of policies between members of the EC, non-EC members and the new democracies of Eastern Europe. This volume explains these differences and also, uniquely, focuses on the abuses of personal data in the developing nations of Latin America, Asia and Africa. It also includes the latest national and international laws, initiatives and guidelines on personal data protection. It is the first reference work to combine these various documents in a single volume source.

Information Security in Financial Services (Paperback, 1st ed. 1991): Ken Slater Information Security in Financial Services (Paperback, 1st ed. 1991)
Ken Slater
R3,172 Discovery Miles 31 720 Ships in 10 - 15 working days

Introduction - Risk and Vulnerability in the Financial Sector - The Security Policy - Personnel Security - Physical Security - Security of Computer Operations - Communications Security - Controlling the System - Secure System Development and Maintenance - Logical Access Security - Securing the Customer's Cash - If the Worst Happens: Disaster Recovery and Insurance - Microcomputer Security - Risk Analysis - Managing Security - The Auditor - Security Aspects of Compliance Reviews - Appendices - Glossary: The Language of Security

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Quantum Computing for High School…
Yuly Billig Hardcover R848 R732 Discovery Miles 7 320
New Research on the Voynich Manuscript…
National Security Agency Hardcover R568 Discovery Miles 5 680
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
The Economics of Blockchain and…
James L. Caton Hardcover R3,044 Discovery Miles 30 440
Introduction to Bitcoin
David Ricardo Hardcover R799 Discovery Miles 7 990
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,551 Discovery Miles 25 510
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R913 Discovery Miles 9 130
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R967 Discovery Miles 9 670
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340

 

Partners