0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022,... Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings (Paperback, 1st ed. 2022)
Steven D. Galbraith
R3,219 Discovery Miles 32 190 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2022, CT-RSA 2022, held in San Francisco, CA, USA, in February 2022.* The 24 full papers presented in this volume were carefully reviewed and selected from 87 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security. *The conference was held as a hybrid event.

Human Centered Computing - 6th International Conference, HCC 2020, Virtual Event, December 14-15, 2020, Revised Selected Papers... Human Centered Computing - 6th International Conference, HCC 2020, Virtual Event, December 14-15, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Qiaohong Zu, Yong Tang, Vladimir Mladenovic
R2,931 Discovery Miles 29 310 Ships in 10 - 15 working days

This book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020. The 28 full and 20 short papers presented in this volume were carefully reviewed and selected from a total of 133 submissions.The conference focuses on the following three main themes as follows: Data such as Data Visualization, Big Data, Data Security, Hyper connectivity such as Internet of Things, Cloud Computing, Mobile Network and Collaboration such as Collective Intelligence, Peer Production, Context Awareness and much more.

Fundamentals of Cryptography - Introducing Mathematical and Algorithmic Foundations (Paperback, 1st ed. 2021): Duncan Buell Fundamentals of Cryptography - Introducing Mathematical and Algorithmic Foundations (Paperback, 1st ed. 2021)
Duncan Buell
R1,276 Discovery Miles 12 760 Ships in 10 - 15 working days

Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible. This unique textbook text balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually "does", not a mathematical game one proves theorems about. There is deep math; there are some theorems that must be proved; and there is a need to recognize the brilliant work done by those who focus on theory. But at the level of an undergraduate course, the emphasis should be first on knowing and understanding the algorithms and how to implement them, and also to be aware that the algorithms must be implemented carefully to avoid the "easy" ways to break the cryptography. This text covers the algorithmic foundations and is complemented by core mathematics and arithmetic.

Space Information Network - 5th International Conference SINC 2020, Shenzhen, China, December 19-20, 2020, Revised Selected... Space Information Network - 5th International Conference SINC 2020, Shenzhen, China, December 19-20, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Quan Yu
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes selected and revised papers of the 5th International Conference on Space Information Networks, SINC 2020, held in Shenzhen, China, in December 2020.The 11 full and 2 short papers presented in this volume were carefully reviewed and selected from 104 submissions. The papers present the latest research in the fields of space information networks.

Strongly Regular Graphs (Hardcover, New Ed): Andries E. Brouwer, H. van Maldeghem Strongly Regular Graphs (Hardcover, New Ed)
Andries E. Brouwer, H. van Maldeghem
R3,836 Discovery Miles 38 360 Ships in 12 - 19 working days

Strongly regular graphs lie at the intersection of statistical design, group theory, finite geometry, information and coding theory, and extremal combinatorics. This monograph collects all the major known results together for the first time in book form, creating an invaluable text that researchers in algebraic combinatorics and related areas will refer to for years to come. The book covers the theory of strongly regular graphs, polar graphs, rank 3 graphs associated to buildings and Fischer groups, cyclotomic graphs, two-weight codes and graphs related to combinatorial configurations such as Latin squares, quasi-symmetric designs and spherical designs. It gives the complete classification of rank 3 graphs, including some new constructions. More than 100 graphs are treated individually. Some unified and streamlined proofs are featured, along with original material including a new approach to the (affine) half spin graphs of rank 5 hyperbolic polar spaces.

Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK,... Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, …
R1,276 Discovery Miles 12 760 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis. The book contains 6 chapters which are available open access under a CC-BY license.

Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021,... Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Zhe Liu, Fan Wu, Sajal K. Das
R2,980 Discovery Miles 29 800 Ships in 10 - 15 working days

The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021. The conference took place in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. The contributions in Part II of the set are subdivided into the following topical sections: Scheduling & Optimization II; Security; Data Center Networks and Cloud Computing; Privacy-Aware Computing; Internet of Vehicles; Visual Computing for IoT; Mobile Ad-Hoc Networks.

Broadband Communications, Networks, and Systems - 11th EAI International Conference, BROADNETS 2020, Qingdao, China, December... Broadband Communications, Networks, and Systems - 11th EAI International Conference, BROADNETS 2020, Qingdao, China, December 11-12, 2020, Proceedings (Paperback, 1st ed. 2021)
Honghao Gao, Ramon J. Duran Barroso, Pang Shanchen, Rui Li
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 11th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2020, which took place in Qingdao, China, in December 2020. The 13 full papers presented were carefully reviewed and selected from 32 submissions. The papers are thematically grouped as a session on wireless network and security and a session on communication quality.

Information Security and Cryptology -  ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020,... Information Security and Cryptology - ICISC 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings (Paperback, 1st ed. 2021)
Deukjo Hong
R1,523 Discovery Miles 15 230 Ships in 10 - 15 working days

This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online.The total of 15 papers presented in this volume were carefully reviewed and selected from 51 submissions. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.

Intelligent Human Computer Interaction - 12th International Conference, IHCI 2020, Daegu, South Korea, November 24-26, 2020,... Intelligent Human Computer Interaction - 12th International Conference, IHCI 2020, Daegu, South Korea, November 24-26, 2020, Proceedings, Part II (Paperback, 1st ed. 2021)
Madhusudan Singh, Dae-Ki Kang, Jong-Ha Lee, Uma Shanker Tiwary, Dhananjay Singh, …
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

The two-volume set LNCS 12615 + 12616 constitutes the refereed proceedings of the 12th International Conference on Intelligent Human Computer Interaction, IHCI 2020, which took place in Daegu, South Korea, during November 24-26, 2020.The 75 full and 18 short papers included in these proceedings were carefully reviewed and selected from a total of 185 submissions. The papers were organized in topical sections named: cognitive modeling and systems; biomedical signal processing and complex problem solving; natural language, speech, voice and study; algorithms and related applications; crowd sourcing and information analysis; intelligent usability and test system; assistive living; image processing and deep learning; and human-centered AI applications.

Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Michael Friedewald, Melek OEnen, Eva Lievens, Stephan Krenn, Samuel Fricker
R1,825 Discovery Miles 18 250 Ships in 10 - 15 working days

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Computational Cryptography - Algorithmic Aspects of Cryptology (Paperback): Joppe Bos, Martijn Stam Computational Cryptography - Algorithmic Aspects of Cryptology (Paperback)
Joppe Bos, Martijn Stam
R2,482 Discovery Miles 24 820 Ships in 12 - 19 working days

The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovasz lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.

Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings... Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings (Paperback, 1st ed. 2021)
Mauro Conti, Marc Stevens, Stephan Krenn
R2,953 Discovery Miles 29 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic.The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification.

Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers... Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, …
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.

Cybersecurity in Emerging Digital Era - First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020,... Cybersecurity in Emerging Digital Era - First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Rajeev Agrawal, Goutam Sanyal, Kevin Curran, Valentina Emilia Balas, Madhu Sharma Gaur
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 9 full papers and 2 short papers presented in this volume were thoroughly reviewed and selected from 193 submissions. The papers are organized in topical sections on cyber security issues and challenges in emerging digital era; security resilience in contemporary applications.

Responsible AI and Analytics for an Ethical and Inclusive Digitized Society - 20th IFIP WG 6.11 Conference on e-Business,... Responsible AI and Analytics for an Ethical and Inclusive Digitized Society - 20th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2021, Galway, Ireland, September 1-3, 2021, Proceedings (Paperback, 1st ed. 2021)
Denis Dennehy, Anastasia Griva, Nancy Pouloudi, Yogesh K. Dwivedi, Ilias Pappas, …
R4,745 Discovery Miles 47 450 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 20th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2021, held in Galway, Ireland, in September 2021.* The total of 57 full and 8 short papers presented in these volumes were carefully reviewed and selected from 141 submissions. The papers are organized in the following topical sections: AI for Digital Transformation and Public Good; AI & Analytics Decision Making; AI Philosophy, Ethics & Governance; Privacy & Transparency in a Digitized Society; Digital Enabled Sustainable Organizations and Societies; Digital Technologies and Organizational Capabilities; Digitized Supply Chains; Customer Behavior and E-business; Blockchain; Information Systems Development; Social Media & Analytics; and Teaching & Learning. *The conference was held virtually due to the COVID-19 pandemic.

Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020): Tuan D. Pham Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Paperback, 1st ed. 2020)
Tuan D. Pham
R2,628 Discovery Miles 26 280 Ships in 10 - 15 working days

This book presents an original combination of three well-known methodological approaches for nonlinear data analysis: recurrence, networks, and fuzzy logic. After basic concepts of these three approaches are introduced, this book presents recently developed methods known as fuzzy recurrence plots and fuzzy recurrence networks. Computer programs written in MATLAB, which implement the basic algorithms, are included to facilitate the understanding of the developed ideas. Several applications of these techniques to biomedical problems, ranging from cancer and neurodegenerative disease to depression, are illustrated to show the potential of fuzzy recurrence methods. This book opens a new door to theorists in complex systems science as well as specialists in medicine, biology, engineering, physics, computer science, geosciences, and social economics to address issues in experimental nonlinear signal and data processing.

Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (Paperback, 1st ed.... Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (Paperback, 1st ed. 2021)
Daniel Dougherty, Jose Meseguer, Sebastian Alexander Moedersheim, Paul Rowe
R2,177 Discovery Miles 21 770 Ships in 10 - 15 working days

This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua's most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several "symbolic approaches" to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.

Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18,... Distributed Computing for Emerging Smart Networks - Second International Workshop, DiCES-N 2020, Bizerte, Tunisia, December 18, 2020, Proceedings (Paperback, 1st ed. 2020)
Imen Jemili, Mohamed Mosbah
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2020, held in Bizerte, Tunisia, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers included in this volume were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: intelligent transportation systems; emerging networking technologies; artificial intelligence and internet of things.

Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020,... Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Xianfeng Zhao, Yun Qing Shi, Alessandro Piva, Hyoung Joong Kim
R1,522 Discovery Miles 15 220 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and Watermarking, IWDW 2020, held in Melbourne, VIC, Australia, in November 2020.The 20 full papers in this volume were carefully reviewed and selected from 43 submissions. They cover topics such as: novel research, development and application of digital watermarking and forensics techniques for multimedia security.

Arithmetic of Finite Fields - 8th International Workshop, WAIFI 2020, Rennes, France, July 6-8, 2020, Revised Selected and... Arithmetic of Finite Fields - 8th International Workshop, WAIFI 2020, Rennes, France, July 6-8, 2020, Revised Selected and Invited Papers (Paperback, 1st ed. 2021)
Jean Claude Bajard, Alev Topuzoglu
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2020, held in Rennes, France in July 2020. Due to the COVID-19, the workshop was held online. The 12 revised full papers and 3 invited talks presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on invited talks, Finite Field Arithmetic, Coding Theory, Network Security and much more.

PRIMA 2020: Principles and Practice of Multi-Agent Systems - 23rd International Conference, Nagoya, Japan, November 18-20,... PRIMA 2020: Principles and Practice of Multi-Agent Systems - 23rd International Conference, Nagoya, Japan, November 18-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Takahiro Uchiya, Quan Bai, Ivan Marsa-Maestre
R1,565 Discovery Miles 15 650 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 23rd International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2020, held in Nagoya, Japan, in November 2020. The 19 full papers presented and 13 short papers were carefully reviewed and selected from 50 submissions.Due to COVID-19, the conference was held online. The conference covers a wide range of ranging from foundations of agent theory and engineering aspects of agent systems, to emerging interdisciplinary areas of agent-based research.

Cryptography Arithmetic - Algorithms and Hardware Architectures (Paperback, 1st ed. 2020): Amos R. Omondi Cryptography Arithmetic - Algorithms and Hardware Architectures (Paperback, 1st ed. 2020)
Amos R. Omondi
R2,890 Discovery Miles 28 900 Ships in 10 - 15 working days

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.

Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II... Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Kobbi NIssim, Brent Waters
R3,257 Discovery Miles 32 570 Ships in 10 - 15 working days

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.

Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December... Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings (Paperback, 1st ed. 2020)
Lejla Batina, Stjepan Picek, Mainack Mondal
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Research on the IoT, Cloud…
Surjit Singh, Rajeev Mohan Sharma Hardcover R6,930 Discovery Miles 69 300
AWS Billing and Cost Management User…
Documentation Team Hardcover R1,903 R1,546 Discovery Miles 15 460
Advanced Technologies for Intelligent…
Aleksander Nawrat, Krzysztof Simek, … Hardcover R2,905 Discovery Miles 29 050
How To Do Virtualization - Your Step By…
Howexpert Hardcover R774 Discovery Miles 7 740
Computer Vision Using Local Binary…
Matti Pietikainen, Abdenour Hadid, … Hardcover R1,533 Discovery Miles 15 330
The Gathering Cloud
J. R. Carpenter Paperback R421 Discovery Miles 4 210
Augmented Reality in Tourism, Museums…
Vladimir Geroimenko Hardcover R4,594 Discovery Miles 45 940
3D Future Internet Media
Ahmet Kondoz, Tasos Dagiuklas Hardcover R4,389 Discovery Miles 43 890
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,539 Discovery Miles 15 390
AWS Lambda Developer Guide
Documentation Team Hardcover R2,977 Discovery Miles 29 770

 

Partners