0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (84)
  • R500+ (1,894)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Big Data - BigData 2021 - 10th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual... Big Data - BigData 2021 - 10th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10-14, 2021, Proceedings (Paperback, 1st ed. 2022)
Jinpeng Wei, Liang-Jie Zhang
R1,366 Discovery Miles 13 660 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Big Data, BigData 2021, held online as part of SCF 2021, during December 10-14, 2021.The 6 full and 2 short papers presented were carefully reviewed and selected from 53 submissions. The topics covered are Big Data Architecture, Big Data Modeling, Big Data As A Service, Big Data for Vertical Industries (Government, Healthcare, etc.), Big Data Analytics, Big Data Toolkits, Big Data Open Platforms, Economic Analysis, Big Data for Enterprise Transformation, Big Data in Business Performance Management, Big Data for Business Model Innovations and Analytics, Big Data in Enterprise Management Models and Practices, Big Data in Government Management Models and Practices, and Big Data in Smart Planet Solutions.

Services - SERVICES 2021 - 17th World Congress, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event,... Services - SERVICES 2021 - 17th World Congress, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10-14, 2021, Proceedings (Paperback, 1st ed. 2022)
Mohamed Adel Serhani, Liang-Jie Zhang
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th World Congress on Services, SERVICES 2021, held as part of the Services Conference Federation, SCF 2021, in December 2021. The conference was held virtually due to the COVID-19 pandemic. The 7 full papers and 2 short papers presented were carefully reviewed and selected from 43 submissions. The papers cover topics in the field of Advertising Services, Banking Services, Broadcasting & Cable TV Service, Business Services, Communications Services, Government Services, Real Estate Operations Services, Schools and Education Services, Healthcare Services, and much more.

Progress in Information Geometry - Theory and Applications (Paperback, 1st ed. 2021): Frank Nielsen Progress in Information Geometry - Theory and Applications (Paperback, 1st ed. 2021)
Frank Nielsen
R3,783 Discovery Miles 37 830 Ships in 18 - 22 working days

This book focuses on information-geometric manifolds of structured data and models and related applied mathematics. It features new and fruitful interactions between several branches of science: Advanced Signal/Image/Video Processing, Complex Data Modeling and Analysis, Statistics on Manifolds, Topology/Machine/Deep Learning and Artificial Intelligence. The selection of applications makes the book a substantial information source, not only for academic scientist but it is also highly relevant for industry. The book project was initiated following discussions at the international conference GSI'2019 - Geometric Science of Information that was held at ENAC, Toulouse (France).

Concurrent Crash-Prone Shared Memory Systems - A Few Theoretical Notions (Paperback): Raynal Michel Concurrent Crash-Prone Shared Memory Systems - A Few Theoretical Notions (Paperback)
Raynal Michel
R1,602 Discovery Miles 16 020 Ships in 18 - 22 working days

Theory is what remains true when technology is changing. So, it is important to know and master the basic concepts and the theoretical tools that underlie the design of the systems we are using today and the systems we will use tomorrow. This means that, given a computing model, we need to know what can be done and what cannot be done in that model. Considering systems built on top of an asynchronous read/write shared memory prone to process crashes, this monograph presents and develops the fundamental notions that are universal constructions, consensus numbers, distributed recursivity, power of the BG simulation, and what can be done when one has to cope with process anonymity and/or memory anonymity. Numerous distributed algorithms are presented, the aim of which is being to help the reader better understand the power and the subtleties of the notions that are presented. In addition, the reader can appreciate the simplicity and beauty of some of these algorithms.

Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE,... Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Sokratis Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, …
R2,053 Discovery Miles 20 530 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021. The conference was initially planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic.The 32 papers included in these proceedings stem from the following workshops: the 7th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, which accepted 7 papers from 16 submissions; the 5th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, which accepted 5 papers from 8 submissions; the 4th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, which accepted 6 full and 1 short paper out of 15 submissions; the 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2021, which accepted 5 full and 1 short paper out of 13 submissions. the 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021, which accepted 3 full and 1 short paper out of 6 submissions; and the 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2021, which accepted 3 papers out of 7 submissions. The following papers are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com:Why IT Security Needs Therapy by Uta Menges, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen Verret Transferring Update Behavior from Smartphones to Smart Consumer Devices by Matthias Fassl, Michaela Neumayr, Oliver Schedler, and Katharina Krombholz Organisational Contexts of Energy Cybersecurity by Tania Wallis, Greig Paul, and James Irvine SMILE - Smart eMaIl Link domain Extractor by Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things by Salatiel Ezennaya-Gomez, Claus Vielhauer, and Jana Dittmann Data Protection Impact Assessments in Practice - Experiences from Case Studies by Michael Friedewald, Ina Schiering, Nicholas Martin, and Dara Hallinan

Code-Based Cryptography - 9th International Workshop, CBCrypto 2021 Munich, Germany, June 21-22, 2021 Revised Selected Papers... Code-Based Cryptography - 9th International Workshop, CBCrypto 2021 Munich, Germany, June 21-22, 2021 Revised Selected Papers (Paperback, 1st ed. 2022)
Antonia Wachter-Zeh, Hannes Bartz, Gianluigi Liva
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021. The workshop was initially planned to take place in Munich, Germany, but changed to an online event due to the COVID-19 pandemic. The 6 papers presented in this volume were carefully reviewed and selected from 14 submissions. These contributions span all aspects of code-based cryptography, from design to implementation, and including studies of security, new systems, and improved decoding algorithms.

Complexity and Cryptography - An Introduction (Paperback): John Talbot, Dominic Welsh Complexity and Cryptography - An Introduction (Paperback)
John Talbot, Dominic Welsh
R1,531 Discovery Miles 15 310 Ships in 10 - 15 working days

Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with rigorous proofs of the key results to give an accessible introduction. It comes with plenty of examples and exercises (many with hints and solutions), and is based on a highly successful course developed and taught over many years to undergraduate and graduate students in mathematics and computer science.

Quantum Communication Networks (Paperback, 1st ed. 2021): Riccardo Bassoli, Holger Boche, Christian Deppe, Roberto Ferrara,... Quantum Communication Networks (Paperback, 1st ed. 2021)
Riccardo Bassoli, Holger Boche, Christian Deppe, Roberto Ferrara, Frank H. P. Fitzek, …
R2,074 Discovery Miles 20 740 Ships in 18 - 22 working days

This book provides a tutorial on quantum communication networks. The authors discuss current paradigm shifts in communication networks that are needed to add computing and storage to the simple transport ideas of prevailing networks. They show how these 'softwarized' solutions break new grounds to reduce latency and increase resilience. The authors discuss how even though these solutions have inherent problems due to introduced computing latency and energy consumption, the problems can be solved by hybrid classical-quantum communication networks. The book brings together quantum networking, quantum information theory, quantum computing, and quantum simulation.

Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022,... Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings (Paperback, 1st ed. 2022)
Steven D. Galbraith
R2,971 Discovery Miles 29 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2022, CT-RSA 2022, held in San Francisco, CA, USA, in February 2022.* The 24 full papers presented in this volume were carefully reviewed and selected from 87 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security. *The conference was held as a hybrid event.

Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, San Antonio, TX, USA,... Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings (Paperback, 1st ed. 2022)
Ramkrishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani, Ziming Zhao
R1,727 Discovery Miles 17 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021. Due to the COVID-19 pandemic the conference was held online. The 11 papers presented were carefully reviewed and selected from 30 submissions. They were organized according to the following topical sections: intrusion and malware detection; secure knowledge management; deep learning for security; web and social network.

Quantum Codes for Topological Quantum Computation (Paperback, 1st ed. 2022): Clarice Dias de Albuquerque, Eduardo Brandani da... Quantum Codes for Topological Quantum Computation (Paperback, 1st ed. 2022)
Clarice Dias de Albuquerque, Eduardo Brandani da Silva, Waldir Silva Soares Jr.
R1,589 Discovery Miles 15 890 Ships in 18 - 22 working days

This book offers a structured algebraic and geometric approach to the classification and construction of quantum codes for topological quantum computation. It combines key concepts in linear algebra, algebraic topology, hyperbolic geometry, group theory, quantum mechanics, and classical and quantum coding theory to help readers understand and develop quantum codes for topological quantum computation. One possible approach to building a quantum computer is based on surface codes, operated as stabilizer codes. The surface codes evolved from Kitaev's toric codes, as a means to developing models for topological order by using qubits distributed on the surface of a toroid. A significant advantage of surface codes is their relative tolerance to local errors. A second approach is based on color codes, which are topological stabilizer codes defined on a tessellation with geometrically local stabilizer generators. This book provides basic geometric concepts, like surface geometry, hyperbolic geometry and tessellation, as well as basic algebraic concepts, like stabilizer formalism, for the construction of the most promising classes of quantum error-correcting codes such as surfaces codes and color codes. The book is intended for senior undergraduate and graduate students in Electrical Engineering and Mathematics with an understanding of the basic concepts of linear algebra and quantum mechanics.

Advanced Hybrid Information Processing - 5th EAI International Conference, ADHIP 2021, Virtual Event, October 22-24, 2021,... Advanced Hybrid Information Processing - 5th EAI International Conference, ADHIP 2021, Virtual Event, October 22-24, 2021, Proceedings, Part II (Paperback, 1st ed. 2022)
Shuai Liu, Xuefei Ma
R3,169 Discovery Miles 31 690 Ships in 18 - 22 working days

This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021. Due to COVID-19 the conference was held virtually. The 94 papers presented were selected from 254 submissions and focus on theory and application of hybrid information processing technology for smarter and more effective research and application. The theme of ADHIP 2020 was "Social hybrid data processing". The papers are named in topical sections as follows: Intelligent algorithms in complex environment; AI system research and model design; Method research on Internet of Things technology; Research and analysis with intelligent education.

Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020,... Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers (Paperback, 1st ed. 2022)
Steven Furnell, Paolo Mori, Edgar Weippl, Olivier Camp
R2,078 Discovery Miles 20 780 Ships in 18 - 22 working days

This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.

Digital Forensics and Watermarking - 20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised... Digital Forensics and Watermarking - 20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Xianfeng Zhao, Alessandro Piva, Pedro Comesana-Alfaro
R1,745 Discovery Miles 17 450 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology.

Ad Hoc Networks and Tools for IT - 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6-7, 2021, and... Ad Hoc Networks and Tools for IT - 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6-7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings (Paperback, 1st ed. 2022)
Wei Bao, Xingliang Yuan, Longxiang Gao, Tom H. Luan, David Bong Jun Choi
R2,213 Discovery Miles 22 130 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021. Both conferences were held virtually due to COVID 19 pandemic. The 15 full papers of ADHOCNETS 2021 were selected from 29 submissions and cover a variety of network paradigms including ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (Vanets), airborne networks, underwater networks, underground networks, personal area networks, and home networks, etc. It promises a wide range of applications in civilian, commercial, and military areas. The 18 full papers were selected from 47 submissions and deal the emerging technologies such as Industry 4.0, blockchain, deep learning, cloud/edge/fog computing, cyber physical systems, cybersecurity and computer communications.

Number Theory Meets Wireless Communications (Paperback, 1st ed. 2020): Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju... Number Theory Meets Wireless Communications (Paperback, 1st ed. 2020)
Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju Velani
R4,688 Discovery Miles 46 880 Ships in 18 - 22 working days

This volume explores the rich interplay between number theory and wireless communications, reviewing the surprisingly deep connections between these fields and presenting new research directions to inspire future research. The contributions of this volume stem from the Workshop on Interactions between Number Theory and Wireless Communication held at the University of York in 2016. The chapters, written by leading experts in their respective fields, provide direct overviews of highly exciting current research developments. The topics discussed include metric Diophantine approximation, geometry of numbers, homogeneous dynamics, algebraic lattices and codes, network and channel coding, and interference alignment. The book is edited by experts working in number theory and communication theory. It thus provides unique insight into key concepts, cutting-edge results, and modern techniques that play an essential role in contemporary research. Great effort has been made to present the material in a manner that is accessible to new researchers, including PhD students. The book will also be essential reading for established researchers working in number theory or wireless communications looking to broaden their outlook and contribute to this emerging interdisciplinary area.

Emerging Technologies for Authorization and Authentication - 4th International Workshop, ETAA 2021, Darmstadt, Germany, October... Emerging Technologies for Authorization and Authentication - 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Andrea Saracino, Paolo Mori
R1,490 Discovery Miles 14 900 Ships in 18 - 22 working days

This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021. The workshop was co-located with ESORICS 2021. The 11 full papers presented in this volume were carefully reviewed and selected from 14 submissions. The workshop presents new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including smart home environment.

Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November... Emerging Information Security and Applications - Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Weizhi Meng, Sokratis K. Katsikas
R1,725 Discovery Miles 17 250 Ships in 18 - 22 working days

This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online.

Building Decentralized Trust - Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers (Paperback,... Building Decentralized Trust - Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers (Paperback, 1st ed. 2021)
Victoria L. Lemieux, Chen Feng
R3,300 Discovery Miles 33 000 Ships in 18 - 22 working days

This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different "layers" in designing the use of blockchain/Distributed Ledger Technology (DLT) for social trust, trust in data and records, and trust in systems. Blockchain technology has emerged as a solution to the problem of trust in data and records, as well as trust in social, political and economic institutions, due to its profound potential as a digital trust infrastructure. Blockchain is a DLT in which confirmed and validated sets of transactions are stored in blocks that are chained together to make tampering more difficult and render records immutable. This book is dedicated to exploring and disseminating the latest findings on the relationships between socio-political and economic data, record-keeping, and technical aspects of blockchain.

Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings... Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings (Paperback, 1st ed. 2021)
Min Yang, Chao Chen, Yang Liu
R2,115 Discovery Miles 21 150 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Network and System Security, NSS 2021, held in Tianjin, China, on October 23, 2021. The 16 full and 8 short papers presented in this book were carefully reviewed and selected from 62 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Arithmetic and Algebraic Circuits (Paperback, 1st ed. 2021): Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla... Arithmetic and Algebraic Circuits (Paperback, 1st ed. 2021)
Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla Roure, Antonio Garcia Rios, Maria Jose Lloris Meseguer
R4,800 Discovery Miles 48 000 Ships in 18 - 22 working days

This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.

Information Theory - Poincare Seminar 2018 (Paperback, 1st ed. 2021): Bertrand Duplantier, Vincent Rivasseau Information Theory - Poincare Seminar 2018 (Paperback, 1st ed. 2021)
Bertrand Duplantier, Vincent Rivasseau
R3,313 Discovery Miles 33 130 Ships in 18 - 22 working days

This eighteenth volume in the Poincare Seminar Series provides a thorough description of Information Theory and some of its most active areas, in particular, its relation to thermodynamics at the nanoscale and the Maxwell Demon, and the emergence of quantum computation and of its counterpart, quantum verification. It also includes two introductory tutorials, one on the fundamental relation between thermodynamics and information theory, and a primer on Shannon's entropy and information theory. The book offers a unique and manifold perspective on recent mathematical and physical developments in this field.

Advances in Elliptic Curve Cryptography (Paperback, 2Rev ed): Ian F. Blake, Gadiel Seroussi, Nigel P. Smart Advances in Elliptic Curve Cryptography (Paperback, 2Rev ed)
Ian F. Blake, Gadiel Seroussi, Nigel P. Smart
R2,154 Discovery Miles 21 540 Ships in 18 - 22 working days

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.

Unsolved! - The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies... Unsolved! - The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies (Paperback)
Craig P. Bauer
R615 R579 Discovery Miles 5 790 Save R36 (6%) Ships in 18 - 22 working days

A mathematical tour of some of the greatest unsolved ciphers of all time In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet and an enciphered message taped to his abdomen. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging to Emperor Rudolf II, who was obsessed with alchemy and the occult. Wartime codebreakers tried-and failed-to unlock the book's secrets, and it remains an enigma to this day. In this lively and entertaining book, Craig Bauer examines these and other vexing ciphers yet to be cracked. Some may reveal the identity of a spy or serial killer, provide the location of buried treasure, or expose a secret society-while others may be elaborate hoaxes. He lays out the evidence surrounding each cipher, describes the efforts to decipher it, and invites readers to try their hand at puzzles that have stymied so many others.

Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6... Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2020, Tiruchirappalli, India, December 18-19, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Sujeet K. Sharma, Yogesh K. Dwivedi, Bhimaraya Metri, Nripendra P. Rana
R4,129 Discovery Miles 41 290 Ships in 18 - 22 working days

This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020.The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: diffusion of information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ask a Suffragist - Stories and Wisdom…
April Young Bennett Hardcover R886 R790 Discovery Miles 7 900
Entitled - How Male Privilege Hurts…
Kate Manne Paperback R313 R284 Discovery Miles 2 840
Categories We Live By - The Construction…
Asta Hardcover R2,683 Discovery Miles 26 830
Finding Me - A Memoir
Viola Davis Hardcover  (1)
R706 R524 Discovery Miles 5 240
The Subjection of Women
John Stuart Mill Hardcover R740 Discovery Miles 7 400
The home - its work and influence
Charlotte Perkins Gilman Hardcover R747 Discovery Miles 7 470
Good Slut - How Money, Sex And Power Set…
Zoe Strimpel Hardcover R602 R529 Discovery Miles 5 290
Flush - A Biography
Virginia Woolf Hardcover R715 Discovery Miles 7 150
Suffragists in an Imperial Age - U.S…
Allison L. Sneider Hardcover R2,147 Discovery Miles 21 470
Daughters of Anoma - African Women and…
Mercy Amba Oduyoye Paperback R656 R585 Discovery Miles 5 850

 

Partners