0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,922)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Blockchain Technology - From Theory to Practice (Hardcover, 1st ed. 2022): Sudeep Tanwar Blockchain Technology - From Theory to Practice (Hardcover, 1st ed. 2022)
Sudeep Tanwar
R2,723 Discovery Miles 27 230 Ships in 12 - 17 working days

Blockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies. The basic tenet of this platform is that it allows one to create a distributed and replicated ledger of events, transactions, and data generated through various IT processes with strong cryptographic guarantees of tamper resistance, immutability, and verifiability. Public blockchain platforms allow us to guarantee these properties with overwhelming probabilities even when untrusted users are participants of distributed applications with the ability to transact on the platform. Even though, blockchain technology has become popularly known because of its use in the implementation of cryptocurrencies such as BitCoin, Ethereum, etc.; the technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. It introduces theoretical and practical aspects of blockchain technology. The book includes an in-depth insight into the need for decentralization, smart contracts, consensus both permissioned and permissionless, and various blockchain development frameworks, tools, and platforms. It can be used as a learning resource for various examinations and certifications related to cryptocurrency and blockchain technology. This book explained the nuts and bolts of blockchain technology in lucid language to make students more familiar with the implementation perspective of this much-needed technology.

Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983... Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983 ed.)
T. Beth
R1,631 Discovery Miles 16 310 Ships in 10 - 15 working days

T. Beth (Ed.): Cryptography - EUROCRYPT '82, LNCS 149, pp. 1-28, 1983. 0 Springer-Verlag Berlin Heidelberg 1983 3 Having all of a sudden left the shady corner of semi-military art, modern cryptography has become a central topic of research in all areas of communication science. Definitions (cf. Bauer pp. 31 - 48) Cryptographic measures are applied to p- tect valuable data during transmission against unwanted interception INTERCEPTOR Fig. A: passive violation and (possibly undectable) forgery . Fig. 2: acti-se violation In accordance with the subsequent paper of Bauer (pp. 31 - 481, the technique applied to meet these requirements is called en- tion. In this process the transmitter enciphers (or encrypts) a plaintext message into a ciphertext. 4 ciphertexc ciphering Fig. 3: The Wire-tap-channel This transformation is called a cipher(function) which the au- rized receiver deciphers (decrypts). An enemy is a person or institution who wants illegal access to the messages. Assuming that the enemy can only get hold of the ciph- texts, he has to perform a cryptanalysis in order to reconstitute the plaintexts. To add to the difficulties for a cryptanalyst, the cipher functions are chosen to a varying parameter, called the key. A generator cryptosystem consists of a class of injective cipher functions ES: M-C, mapping plaintext messages(EM) into ciphertexts(EC) . The parameter s runs through the set K of keys. These formulations are best demonstrated by the basic, classical examples.

Alan Turing: The Enigma - The Book That Inspired the Film The Imitation Game (Paperback, Media tie-in): Andrew Hodges Alan Turing: The Enigma - The Book That Inspired the Film The Imitation Game (Paperback, Media tie-in)
Andrew Hodges 1
R354 R295 Discovery Miles 2 950 Save R59 (17%) Ships in 9 - 15 working days

The official book behind the Academy Award-winning film The Imitation Game, starring Benedict Cumberbatch and Keira Knightley Alan Turing was the mathematician whose cipher-cracking transformed the Second World War. Taken on by British Intelligence in 1938, as a shy young Cambridge don, he combined brilliant logic with a flair for engineering. In 1940 his machines were breaking the Enigma-enciphered messages of Nazi Germany's air force. He then headed the penetration of the super-secure U-boat communications. But his vision went far beyond this achievement. Before the war he had invented the concept of the universal machine, and in 1945 he turned this into the first design for a digital computer. Turing's far-sighted plans for the digital era forged ahead into a vision for Artificial Intelligence. However, in 1952 his homosexuality rendered him a criminal and he was subjected to humiliating treatment. In 1954, aged 41, Alan Turing took his own life.

Algebraic Coding Theory and Applications (Paperback, 1979 ed.): Carlos R. P. Hartmann, Giuseppe Longo Algebraic Coding Theory and Applications (Paperback, 1979 ed.)
Carlos R. P. Hartmann, Giuseppe Longo
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days
Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.): I.... Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.)
I. Csiszar
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days
New Directions of Modern Cryptography (Hardcover): Zhenfu Cao New Directions of Modern Cryptography (Hardcover)
Zhenfu Cao
R3,071 Discovery Miles 30 710 Ships in 12 - 17 working days

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography. This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.

Data Science - 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan,... Data Science - 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021, Taiyuan, China, September 17-20, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Jianchao Zeng, Pinle Qin, Weipeng Jing, Xianhua Song, Zeguang Lu
R2,464 Discovery Miles 24 640 Ships in 12 - 17 working days

This two volume set (CCIS 1451 and 1452) constitutes the refereed proceedings of the 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021 held in Taiyuan, China, in September 2021.The 81 papers presented in these two volumes were carefully reviewed and selected from 256 submissions. The papers are organized in topical sections on big data management and applications; social media and recommendation systems; infrastructure for data science; basic theory and techniques for data science; machine learning for data science; multimedia data management and analysis; social media and recommendation systems; data security and privacy; applications of data science; education research, methods and materials for data science and engineering; research demo.

Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.): P. Herbig Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.)
P. Herbig; Bernd Friedrichs
R3,102 Discovery Miles 31 020 Ships in 10 - 15 working days

Seit der Begriindung der Informations- und Codierungstheorie durch die Ar beiten von Claude E. Shannon sind fast fiinf Jahrzehnte vergangen. In diesem Zeitraum hat sich die Kanalcodierung von einer rein theoretischen Disziplin zu einer ausgedehnten anwendungsorientierten Wissenschaft entwickelt. In fast allen modernen und leistungsfahigen Systemen zur Nachrichteniibertragung oder Nachrichtenspeicherung stellt die Kanalcodierung heute einen zentralen und pragenden Baustein dar. Mit der Compact Disc und mit Modems zur Dateniibertragung dringen Codierungsverfahren inzwischen auch in die privat genutzte Elektronik vor. Durch Kanalcodierung kann die Ubertragungsqualitat enorm gesteigert werden und gleichzeitig kommen die Ubertragungsverfahren mit weniger Sen deleistung und teilweise auch mit weniger Bandbreite aus. Diese Vorteile miissen nicht mit einer Reduktion der Datenrate bezahlt werden, sondern nur mit einem erh6hten Aufwand an digitaler Signalverarbeitung in Sender und Empfanger. Die Codierungstheorie liefert Resultate zur Struktur und zu den Eigenschaften von Codes sowie effiziente und aufwandsgiinstige Verfahren zur Decodierung. Zusammen mit der hochintegrierten Schaltungstechnik, die im mer leistungsfahiger und kostengiinstiger wird, fiihren die Fortschritte in der Kanalcodierung zu einer standigen Weiterentwicklung der Ubertragungsver fahren sowie zu einer effizienteren Nutzung der UbertragungskanaIe."

The Bitcoin Standard - The Essential Guide to Bitcoin for Beginners, Discover How Strategies and Tips on How You Can Master... The Bitcoin Standard - The Essential Guide to Bitcoin for Beginners, Discover How Strategies and Tips on How You Can Master Bitcoin and Earn Huge Profits (Paperback)
J H Damp
R457 R373 Discovery Miles 3 730 Save R84 (18%) Ships in 10 - 15 working days
Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022):... Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022)
Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De
R5,312 Discovery Miles 53 120 Ships in 12 - 17 working days

The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback): Ken May The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback)
Ken May
R494 R414 Discovery Miles 4 140 Save R80 (16%) Ships in 10 - 15 working days
Computer Systems - Digital Design, Fundamentals of Computer Architecture and ARM Assembly Language (Hardcover, 2nd ed. 2022):... Computer Systems - Digital Design, Fundamentals of Computer Architecture and ARM Assembly Language (Hardcover, 2nd ed. 2022)
Ata Elahi
R1,930 Discovery Miles 19 300 Ships in 12 - 17 working days

This updated textbook covers digital design, fundamentals of computer architecture, and ARM assembly language. The book starts by introducing computer abstraction, basic number systems, character coding, basic knowledge in digital design, and components of a computer. The book goes on to discuss information representation in computing, Boolean algebra and logic gates, and sequential logic. The book also presents introduction to computer architecture, Cache mapping methods, and virtual memory. The author also covers ARM architecture, ARM instructions, ARM assembly language using Keil development tools, and bitwise control structure using C and ARM assembly language. The book includes a set of laboratory experiments related to digital design using Logisim software and ARM assembly language programming using Keil development tools. In addition, each chapter features objectives, summaries, key terms, review questions, and problems.

Codeless Data Structures and Algorithms - Learn DSA Without Writing a Single Line of Code (Paperback, 1st ed.): Armstrong Subero Codeless Data Structures and Algorithms - Learn DSA Without Writing a Single Line of Code (Paperback, 1st ed.)
Armstrong Subero
R1,073 R869 Discovery Miles 8 690 Save R204 (19%) Ships in 10 - 15 working days

In the era of self-taught developers and programmers, essential topics in the industry are frequently learned without a formal academic foundation. A solid grasp of data structures and algorithms (DSA) is imperative for anyone looking to do professional software development and engineering, but classes in the subject can be dry or spend too much time on theory and unnecessary readings. Regardless of your programming language background, Codeless Data Structures and Algorithms has you covered. In this book, author Armstrong Subero will help you learn DSAs without writing a single line of code. Straightforward explanations and diagrams give you a confident handle on the topic while ensuring you never have to open your code editor, use a compiler, or look at an integrated development environment. Subero introduces you to linear, tree, and hash data structures and gives you important insights behind the most common algorithms that you can directly apply to your own programs. Codeless Data Structures and Algorithms provides you with the knowledge about DSAs that you will need in the professional programming world, without using any complex mathematics or irrelevant information. Whether you are a new developer seeking a basic understanding of the subject or a decision-maker wanting a grasp of algorithms to apply to your projects, this book belongs on your shelf. Quite often, a new, refreshing, and unpretentious approach to a topic is all you need to get inspired. What You'll Learn Understand tree data structures without delving into unnecessary details or going into too much theory Get started learning linear data structures with a basic discussion on computer memory Study an overview of arrays, linked lists, stacks and queues Who This Book Is ForThis book is for beginners, self-taught developers and programmers, and anyone who wants to understand data structures and algorithms but don't want to wade through unnecessary details about quirks of a programming language or don't have time to sit and read a massive book on the subject. This book is also useful for non-technical decision-makers who are curious about how algorithms work.

RC4 Stream Cipher and Its Variants (Paperback): Goutam Paul, Subhamoy Maitra RC4 Stream Cipher and Its Variants (Paperback)
Goutam Paul, Subhamoy Maitra
R1,841 Discovery Miles 18 410 Ships in 12 - 17 working days

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,507 Discovery Miles 15 070 Ships in 12 - 17 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl.... Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl. 1995)
Hans Marko
R3,688 Discovery Miles 36 880 Ships in 12 - 17 working days

Dieser Klassiker der Systemtheorie wurde auf den neuesten Stand gebracht und um ein Kapitel uber mehrdimensionale Systeme erweitert. Zentrales Thema ist die grundlegende und umfassende Darstellung der Behandlung linearer Systeme mittels Spektraltransformationen. Diese mussen nicht nachrichten-, informations-, oder regelungstechnischer, sondern konnen z.B. auch biologischer Natur sein.
Auf eine kompakte Darstellung wurde besonderer Wert gelegt, die Anspruche an die Mathematikkenntnisse des Lesers sind gering. Das Buch ist somit sowohl als Nachschlagewerk als auch zum Lernen geeignet."

Boolean Functions for Cryptography and Coding Theory (Hardcover): Claude Carlet Boolean Functions for Cryptography and Coding Theory (Hardcover)
Claude Carlet
R2,082 Discovery Miles 20 820 Ships in 12 - 17 working days

Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and all important results, building on the author's influential articles with additional topics and recent results. A useful resource for researchers and graduate students, the book balances detailed discussions of properties and parameters with examples of various types of cryptographic attacks that motivate the consideration of these parameters. It provides all the necessary background on mathematics, cryptography, and coding, and an overview on recent applications, such as side channel attacks on smart cards, cloud computing through fully homomorphic encryption, and local pseudo-random generators. The result is a complete and accessible text on the state of the art in single and multiple output Boolean functions that illustrates the interaction between mathematics, computer science, and telecommunications.

Network Coding and Subspace Designs (Hardcover, 1st ed. 2018): Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein,... Network Coding and Subspace Designs (Hardcover, 1st ed. 2018)
Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein, Maria Angeles Vazquez-Castro
R3,785 R2,481 Discovery Miles 24 810 Save R1,304 (34%) Ships in 12 - 17 working days

This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.

Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised... Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun I. Fan
R1,268 Discovery Miles 12 680 Ships in 12 - 17 working days

This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.

Cryptographic Boolean Functions and Applications (Paperback, 2nd edition): Thomas W Cusick, Pantelimon Stanica Cryptographic Boolean Functions and Applications (Paperback, 2nd edition)
Thomas W Cusick, Pantelimon Stanica
R2,005 R1,889 Discovery Miles 18 890 Save R116 (6%) Ships in 12 - 17 working days

Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While the vast majority of research on cryptographic Boolean functions has been achieved since the 1970s, when cryptography began to be widely used in everyday transactions, in particular banking, relevant material is scattered over hundreds of journal articles, conference proceedings, books, reports and notes, some of them only available online. This book follows the previous edition in sifting through this compendium and gathering the most significant information in one concise reference book. The work therefore encompasses over 600 citations, covering every aspect of the applications of cryptographic Boolean functions. Since 2008, the subject has seen a very large number of new results, and in response, the authors have prepared a new chapter on special functions. The new edition brings 100 completely new references and an expansion of 50 new pages, along with heavy revision throughout the text.

Codes And Modular Forms: A Dictionary (Hardcover): Minjia Shi, Youngju Choie, Anuradha Sharma, Patrick Sole Codes And Modular Forms: A Dictionary (Hardcover)
Minjia Shi, Youngju Choie, Anuradha Sharma, Patrick Sole
R2,267 Discovery Miles 22 670 Ships in 10 - 15 working days

There are connections between invariant theory and modular forms since the times of Felix Klein, in the 19th century, connections between codes and lattices since the 1960's. The aim of the book is to explore the interplay between codes and modular forms. Here modular form is understood in a wide sense (Jacobi forms, Siegel forms, Hilbert forms). Codes comprises not only linear spaces over finite fields but modules over some commutative rings. The connection between codes over finite fields and lattices has been well documented since the 1970s. Due to an avalanche of results on codes over rings since the 1990's there is a need for an update at book level.

Multidisciplinary Perspectives in Cryptology and Information Security (Hardcover): Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas Multidisciplinary Perspectives in Cryptology and Information Security (Hardcover)
Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas
R6,439 Discovery Miles 64 390 Ships in 12 - 17 working days

With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.

Coding Interviews - Questions, Analysis & Solutions (Paperback, 1st ed.): Harry He Coding Interviews - Questions, Analysis & Solutions (Paperback, 1st ed.)
Harry He
R2,091 Discovery Miles 20 910 Ships in 10 - 15 working days

This book is about coding interview question of software and Internet companies. It covers five key factors which determine performance of candidates: (1) the basics of programming languages, data structures and algorithms, (2) approaches to writing code with high quality, (3) tips to solve difficult problems, (4) methods to optimize code, (5) soft skills required in interviews. The basics of languages, algorithms and data structures are discussed as well as questions that explore how to write robust solutions after breaking down problems into manageable pieces. It also includes examples to focus on modeling and creative problem solving. Interview questions from the most popular companies in the IT industry are taken as examples to illustrate the five factors above. Besides solutions, it contains detailed analysis, how interviewers evaluate solutions, as well as why they like or dislike them. Readers will improve their interview performance after reading this book. It will be beneficial for them even after they get offers, because its topics, such as approaches to analyzing difficult problems, writing robust code and optimizing, are all essential for high-performing coders.What you'll learn * Necessary knowledge for coding interviews, including programming languages, algorithms and data structures * Tips to write complete and robust code * Approaches to simplifying and solving difficult problems, with examples, figures and discussion * Methods to optimizing memory and space efficiency * Tips to demonstrate communication skills and learning skills during interviews * Standards in interviewers' minds to evaluate candidates' performance Who this book is for Targeted audiences of this book include students who are interested in programming-related careers, as well as developers with less-than-three-year experience who are looking for more career opportunities. Table of Contents1. Interview Process 2. Programming Languages 3. Data Structures 4. Algorithms 5. High Quality Code 6. Approaches to Solutions 7. Optimization 8. Skills for Interviews 9. Interview Cases

Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover): Maryann Simmons Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover)
Maryann Simmons
R3,611 Discovery Miles 36 110 Ships in 12 - 17 working days

In this book, new developments in network coding and data compression are examined. The first chapter proposes a new multipath transmission scheme that employs network coding at the source for rate-delay adaptation. The second chapter presents the theory, applications and challenges of a physical-layer network coding technique that promises significant improvement to the spectral efficiency and interference mitigation challenges in future heterogenous cellular and wireless networks. In this third chapter, network and distributed turbo coding based HARQ protocol are examined for wireless broadcasting systems. The last three chapters included in this book present three models that are based on Data Envelopment Analysis (DEA) methodology to appropriately evaluate the efficiency of multicast energy and further minimizes energy transmission in wireless networks without affecting the overall network performance; the development of methods of experimental statistical modeling of physical laws and the cascade scheme of data compression in multimode fibre systems.

Blockchain and the Law - The Rule of Code (Paperback): Primavera de Filippi, Aaron Wright Blockchain and the Law - The Rule of Code (Paperback)
Primavera de Filippi, Aaron Wright
R543 R489 Discovery Miles 4 890 Save R54 (10%) Ships in 12 - 17 working days

"Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how." -Lawrence Lessig "Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace-explain how a new technology will upend the current legal and social order... Blockchain and the Law is not just a theoretical guide. It's also a moral one." -Fortune Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you "mine" money from ones and zeros? The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create "smart contracts," to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities' ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking. "If you...don't 'get' crypto, this is the book-length treatment for you." -Tyler Cowen, Marginal Revolution "De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address." -James Ryerson, New York Times Book Review

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ransomware Revolution: The Rise of a…
Matthew Ryan Hardcover R4,897 Discovery Miles 48 970
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,473 Discovery Miles 24 730
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R928 Discovery Miles 9 280
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R1,968 R1,559 Discovery Miles 15 590

 

Partners