0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (87)
  • R500+ (1,898)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Hardcover, 4th ed. 2020): Walter Fischer Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Hardcover, 4th ed. 2020)
Walter Fischer
R4,402 Discovery Miles 44 020 Ships in 10 - 15 working days

This practical guide offers all important digital television, sound radio, and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM and ISDB-T. It provides an in-depth look at these subjects in terms of practical experience. In addition explains the basics of essential topics like analog television, digital modulation, COFDM or mathematical transformations between time and frequency domains. The fourth edition addresses many new developments and features of digital broadcasting. Especially it includes Ultra High Definition Television (UHDTV), 4K, HEVC / H.265 (High Efficiency Video Coding), DVB-T2 measurement techniques and practice, DOCSIS 3.1, DVB - S2X, and 3DTV, as well as VHF-FM radio, HDMI, terrestrial transmitters, and stations. In the center of the treatments are always measuring techniques and of measuring practice for each case consolidating the knowledge imparted with numerous practical examples. The book is directed primarily at the specialist working in the field, on transmitters and transmission equipment, network planning, studio technology, playout centers and multiplex center technology and in the development departments for entertainment electronics or TV test engineering. Since the entire field of electrical communications technology is traversed in a wide arc, those who are students in this field are not excluded either.

Discrete Mathematics with Cryptographic Applications - A Self-Teaching Introduction (Hardcover): Alexander I Kheyfits Discrete Mathematics with Cryptographic Applications - A Self-Teaching Introduction (Hardcover)
Alexander I Kheyfits
R1,852 R1,484 Discovery Miles 14 840 Save R368 (20%) Ships in 18 - 22 working days

This book covers the discrete mathematics as it has been established after its emergence since the middle of the last century and its elementary applications to cryptography. It can be used by any individual studying discrete mathematics, finite mathematics, and similar subjects. Any necessary prerequisites are explained and illustrated in the book. As a background of cryptography, the textbook gives an introduction into number theory, coding theory, information theory, that obviously have discrete nature. Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous, practical examples of cryptography. FEATURES Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous examples of cryptography Provides an introduction into number theory, game theory, coding theory, and information theory as background for the coverage of cryptography Covers cryptography topics such as CRT, affine ciphers, hashing functions, substitution ciphers, unbreakable ciphers, Discrete Logarithm Problem (DLP), and more

Guide to Pairing-Based Cryptography (Paperback): Nadia El Mrabet, Marc Joye Guide to Pairing-Based Cryptography (Paperback)
Nadia El Mrabet, Marc Joye
R1,576 Discovery Miles 15 760 Ships in 9 - 17 working days

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.

Brute Force - Cracking the Data Encryption Standard (Hardcover, 2005 ed.): Matt Curtin Brute Force - Cracking the Data Encryption Standard (Hardcover, 2005 ed.)
Matt Curtin
R845 R774 Discovery Miles 7 740 Save R71 (8%) Ships in 18 - 22 working days

In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing book, Matt Curtin charts the rise and fall of DES and chronicles the efforts of those who were determined to master it.

Arithmetic and Algebraic Circuits (Hardcover, 1st ed. 2021): Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla... Arithmetic and Algebraic Circuits (Hardcover, 1st ed. 2021)
Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla Roure, Antonio Garcia Rios, Maria Jose Lloris Meseguer
R4,827 Discovery Miles 48 270 Ships in 18 - 22 working days

This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.

Exercises in Programming Style (Paperback, 2nd edition): Cristina Videira Lopes Exercises in Programming Style (Paperback, 2nd edition)
Cristina Videira Lopes
R1,209 Discovery Miles 12 090 Ships in 9 - 17 working days

The first edition of Exercises in Programming Style was honored as an ACM Notable Book and praised as "The best programming book of the decade." This new edition retains the same presentation but has been upgraded to Python 3, and there is a new section on neural network styles. Using a simple computational task (term frequency) to illustrate different programming styles, Exercises in Programming Style helps readers understand the various ways of writing programs and designing systems. It is designed to be used in conjunction with code provided on an online repository. The book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. The book can also be used in advanced programming courses in computer science and software engineering programs. The book contains 40 different styles for writing the term frequency task. The styles are grouped into ten categories: historical, basic, function composition, objects and object interactions, reflection and metaprogramming, adversity, data-centric, concurrency, interactivity, and neural networks. The author states the constraints in each style and explains the example programs. Each chapter first presents the constraints of the style, next shows an example program, and then gives a detailed explanation of the code. Most chapters also have sections focusing on the use of the style in systems design as well as sections describing the historical context in which the programming style emerged.

Quantum Computing Environments (Hardcover, 1st ed. 2022): Sitharama S. Iyengar, Mario Mastriani, KJ Latesh Kumar Quantum Computing Environments (Hardcover, 1st ed. 2022)
Sitharama S. Iyengar, Mario Mastriani, KJ Latesh Kumar
R3,343 Discovery Miles 33 430 Ships in 18 - 22 working days

This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors. The book provides a comprehensive insight into the quantum mechanics and quantum computing techniques and tools and how they have evolved and the impacted in supporting and flourishing business during the quantum computing era. This book includes chapters that discuss the most primitive quantum schemes to the most recent use of Internet, finance and radar technology, thus leveraging greater use of new technologies like security and Internet and others. The content is relevant for an audience that is involved in the research and development of advanced quantum systems. It gives the industry, researchers, and students interested in learning the various quantum computing sectors with the necessary information and tools that can be used to research, design and develop advanced quantum computing systems and techniques.

Digital Media Steganography - Principles, Algorithms, and Advances (Paperback): Mahmoud Hassaballah Digital Media Steganography - Principles, Algorithms, and Advances (Paperback)
Mahmoud Hassaballah
R2,548 Discovery Miles 25 480 Ships in 10 - 15 working days

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography.

Autonomic Computing in Cloud Resource Management in Industry 4.0 (Hardcover, 1st ed. 2021): Tanupriya Choudhury, Bhupesh Kumar... Autonomic Computing in Cloud Resource Management in Industry 4.0 (Hardcover, 1st ed. 2021)
Tanupriya Choudhury, Bhupesh Kumar Dewangan, Ravi Tomar, Bhupesh Kumar Singh, Teoh Teik Toe, …
R4,754 Discovery Miles 47 540 Ships in 18 - 22 working days

This book describes the next generation of industry-Industry 4.0-and how it holds the promise of increased flexibility in manufacturing, along with automation, better quality, and improved productivity. The authors discuss how it thus enables companies to cope with the challenges of producing increasingly individualized products with a short lead-time to market and higher quality. The authors posit that intelligent cloud services and resource sharing play an important role in Industry 4.0 anticipated Fourth Industrial Revolution. This book serves the different issues and challenges in cloud resource management CRM techniques with proper propped solution for IT organizations. The book features chapters based on the characteristics of autonomic computing with its applicability in CRM. Each chapter features the techniques and analysis of each mechanism to make better resource management in cloud.

Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6... Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2020, Tiruchirappalli, India, December 18-19, 2020, Proceedings, Part II (Hardcover, 1st ed. 2020)
Sujeet K. Sharma, Yogesh K. Dwivedi, Bhimaraya Metri, Nripendra P. Rana
R4,157 Discovery Miles 41 570 Ships in 18 - 22 working days

This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020.The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: diffusion of information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems

Finite Fields and Applications - Proceedings of The Fifth International Conference on Finite Fields and Applications Fq 5, held... Finite Fields and Applications - Proceedings of The Fifth International Conference on Finite Fields and Applications Fq 5, held at the University of Augsburg, Germany, August 2-6, 1999 (Hardcover, 2001 ed.)
Dieter Jungnickel, H. Niederreiter
R4,094 Discovery Miles 40 940 Ships in 18 - 22 working days

This volume represents the refereed proceedings of the Fifth International Conference on Finite Fields and Applications (F q5) held at the University of Augsburg (Germany) from August 2-6, 1999, and hosted by the Department of Mathematics. The conference continued a series of biennial international conferences on finite fields, following earlier conferences at the University of Nevada at Las Vegas (USA) in August 1991 and August 1993, the University ofGlasgow (Scotland) in July 1995, and the University ofWaterloo (Canada) in August 1997. The Organizing Committee of F q5 comprised Thomas Beth (University ofKarlsruhe), Stephen D. Cohen (University of Glasgow), Dieter Jungnickel (University of Augsburg, Chairman), Alfred Menezes (University of Waterloo), Gary L. Mullen (Pennsylvania State University), Ronald C. Mullin (University of Waterloo), Harald Niederreiter (Austrian Academy of Sciences), and Alexander Pott (University of Magdeburg). The program ofthe conference consisted offour full days and one halfday ofsessions, with 11 invited plenary talks andover80contributedtalks that re- quired three parallel sessions. This documents the steadily increasing interest in finite fields and their applications. Finite fields have an inherently fasci- nating structure and they are important tools in discrete mathematics. Their applications range from combinatorial design theory, finite geometries, and algebraic geometry to coding theory, cryptology, and scientific computing. A particularly fruitful aspect is the interplay between theory and applications which has led to many new perspectives in research on finite fields.

Computer Systems - Digital Design, Fundamentals of Computer Architecture and ARM Assembly Language (Hardcover, 2nd ed. 2022):... Computer Systems - Digital Design, Fundamentals of Computer Architecture and ARM Assembly Language (Hardcover, 2nd ed. 2022)
Ata Elahi
R2,223 Discovery Miles 22 230 Ships in 10 - 15 working days

This updated textbook covers digital design, fundamentals of computer architecture, and ARM assembly language. The book starts by introducing computer abstraction, basic number systems, character coding, basic knowledge in digital design, and components of a computer. The book goes on to discuss information representation in computing, Boolean algebra and logic gates, and sequential logic. The book also presents introduction to computer architecture, Cache mapping methods, and virtual memory. The author also covers ARM architecture, ARM instructions, ARM assembly language using Keil development tools, and bitwise control structure using C and ARM assembly language. The book includes a set of laboratory experiments related to digital design using Logisim software and ARM assembly language programming using Keil development tools. In addition, each chapter features objectives, summaries, key terms, review questions, and problems.

Z2Z4-Linear Codes (Hardcover, 1st ed. 2022): Joaquim Borges, Cristina Fernandez-Cordoba, Jaume Pujol, Josep Rifa, Merce... Z2Z4-Linear Codes (Hardcover, 1st ed. 2022)
Joaquim Borges, Cristina Fernandez-Cordoba, Jaume Pujol, Josep Rifa, Merce Villanueva
R3,669 Discovery Miles 36 690 Ships in 10 - 15 working days

The theory developed for 2 4-additive codes is the starting point for much generalization about codes over mixed alphabets. They have opened a new, emergent area of research. The techniques used for 2 4-linear codes are being generalized and applied to more general codes. By example, these codes have contributed to the classification of many nonlinear codes. Moreover, they can be considered as the starting point of many different generalizations given over mixed alphabets, thereby representing a useful area of research. Since 2010, more than 30 papers have been published about the codes considered in the book, which includes important classes of binary codes (1-perfect, Hadamard, etc.) that are not linear in general. For example, much recent research has shown the application of the techniques described for the family of cyclic 2 4-linear codes. Topics and Features: Examines everything from the basic definitions to very advanced results Provides numerous examples, succinctly and comprehensively gathering and using the relevant information Includes examples using commands from a new Magma package, developed mostly by the same authors Proposes algorithms, for instance to describe coding and decoding strategies This unique volume will be eminently suitable for researchers working on coding theory over rings, especially over mixed alphabets. Experts will find commands and algorithms that will be useful in the generalization to codes over mixed alphabets. Additionally, by outlining the basic theory of codes over mixed alphabets and providing numerous examples, the book will be useful to researchers wanting to be introduced to the topic. The authors are all affiliated with the Dept. of Information and Communications Engineering at the Universitat Autonoma de Barcelona, Spain. Joaquim Borges and Cristina Fernandez-Cordoba are Associate Professors, Jaume Pujol is a now retired Associate Professor, Josep Rifa is Professor Emeritus, and Merce Villanueva is Associate Professor.

Fading and Shadowing in Wireless Systems (Hardcover, 2nd ed. 2017): P.Mohana Shankar Fading and Shadowing in Wireless Systems (Hardcover, 2nd ed. 2017)
P.Mohana Shankar
R6,066 Discovery Miles 60 660 Ships in 18 - 22 working days

This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before and after the implementation of diversity are also analyzed. To facilitate easy understanding of the models and the analysis, the background on probability and random variables is presented with relevant derivations of densities of the sums, products, ratios as well as order statistics of random variables. The book also provides material on digital modems of interest in wireless systems. The updated edition expands the background materials on probability by offering sections on Laplace and Mellin transforms, parameter estimation, statistical testing and receiver operating characteristics. Newer models for fading, shadowing and shadowed fading are included along with the analysis of diversity combining algorithms. In addition, this edition contains a new chapter on Cognitive Radio. Based on the response from readers of the First Edition, detailed Matlab scripts used in the preparation of this edition are provided. Wherever necessary, Maple scripts used are also provided.

Internet of Things, Artificial Intelligence and Blockchain Technology (Hardcover, 1st ed. 2021): R. Lakshmana Kumar, Yichuan... Internet of Things, Artificial Intelligence and Blockchain Technology (Hardcover, 1st ed. 2021)
R. Lakshmana Kumar, Yichuan Wang, T Poongodi, Agbotiname Lucky Imoize
R4,735 Discovery Miles 47 350 Ships in 18 - 22 working days

This book explores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain for providing security in various domains. The specific highlight of this book is focused on the application of integrated technologies in enhancing data models, better insights and discovery, intelligent predictions, smarter finance, smart retail, global verification, transparent governance, and innovative audit systems. The book allows both practitioners and researchers to share their opinions and recent research in the convergence of these technologies among academicians and industry people. The contributors present their technical evaluation and compare it with existing technologies. Theoretical explanation and experimental case studies related to real-time scenarios are also included. This book pertains to IT professionals, researchers and academicians working on fourth revolution technologies.

Blockchain Gaps - From Myth to Real Life (Hardcover, 1st ed. 2021): Shin'ichiro Matsuo, Nat Sakimura Blockchain Gaps - From Myth to Real Life (Hardcover, 1st ed. 2021)
Shin'ichiro Matsuo, Nat Sakimura
R2,200 Discovery Miles 22 000 Ships in 18 - 22 working days

This book analyzes the fundamental issues faced when blockchain technology is applied to real-life applications. These concerns, not only in the realm of computer science, are caused by the nature of technological design. Blockchain is considered the foundation of a wide range of flexible ecosystems; its technology is an excellent mixture of mathematics, cryptography, incentive mechanisms, economics, and pertinent regulations. The book provides an essential understanding of why such fundamental issues arise, by revising the underlying theories. Blockchain theory is thus presented in an easy-to-understand, useful manner. Also explained is the reason why blockchain is hard to adopt for real-life problems but is valuable as a foundation for flexible ecosystems. Included are directions for solving those problems and finding suitable areas for blockchain applications in the future. The authors of this work are experts from a wide range of backgrounds such as cryptography, distributed computing, computer science, trust, identity, regulation, and standardization. Their contributions collected here will appeal to all who are interested in blockchain and the elements surrounding it.

Advanced Cybersecurity Technologies (Paperback): Ralph Moseley Advanced Cybersecurity Technologies (Paperback)
Ralph Moseley
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure... Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers (Hardcover, 2010 Ed.)
Tyler Moore, Sujeet Shenoi
R1,432 Discovery Miles 14 320 Ships in 18 - 22 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection IV, is the fourth volume in the annual series produced by IFIP Working Group 11.10 on Critical Infr- tructure Protection, an active international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Fourth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at the National Defense University, Washington, DC, March 15- 17, 2010. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure prot- tion.

An In-Depth Guide to Mobile Device Forensics (Hardcover): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Hardcover)
Chuck Easttom
R3,795 Discovery Miles 37 950 Ships in 10 - 15 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Understanding Information - From the Big Bang to Big Data (Hardcover, 1st ed. 2017): Alfons Josef Schuster Understanding Information - From the Big Bang to Big Data (Hardcover, 1st ed. 2017)
Alfons Josef Schuster
R4,322 Discovery Miles 43 220 Ships in 10 - 15 working days

The motivation of this edited book is to generate an understanding about information, related concepts and the roles they play in the modern, technology permeated world. In order to achieve our goal, we observe how information is understood in domains, such as cosmology, physics, biology, neuroscience, computer science, artificial intelligence, the Internet, big data, information society, or philosophy. Together, these observations form an integrated view so that readers can better understand this exciting building-block of modern-day society. On the surface, information is a relatively straightforward and intuitive concept. Underneath, however, information is a relatively versatile and mysterious entity. For instance, the way a physicist looks at information is not necessarily the same way as that of a biologist, a neuroscientist, a computer scientist, or a philosopher. Actually, when it comes to information, it is common that each field has its domain specific views, motivations, interpretations, definitions, methods, technologies, and challenges. With contributions by authors from a wide range of backgrounds, Understanding Information: From the Big Bang to Big Data will appeal to readers interested in the impact of 'information' on modern-day life from a variety of perspectives.

Tribe of Hackers Security Leaders - Tribal Knowledge from the best in Cybersecurity Leadership (Paperback): M. J. Carey Tribe of Hackers Security Leaders - Tribal Knowledge from the best in Cybersecurity Leadership (Paperback)
M. J. Carey
R544 R492 Discovery Miles 4 920 Save R52 (10%) Ships in 9 - 17 working days

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.

Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023): Tuomo Sipola, Tero Kokkonen,... Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023)
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
R4,271 Discovery Miles 42 710 Ships in 18 - 22 working days

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.

High-Speed Decoders for Polar Codes (Hardcover, 1st ed. 2017): Pascal Giard, Claude Thibeault, Warren J. Gross High-Speed Decoders for Polar Codes (Hardcover, 1st ed. 2017)
Pascal Giard, Claude Thibeault, Warren J. Gross
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

A new class of provably capacity achieving error-correction codes, polar codes are suitable for many problems, such as lossless and lossy source coding, problems with side information, multiple access channel, etc. The first comprehensive book on the implementation of decoders for polar codes, the authors take a tutorial approach to explain the practical decoder implementation challenges and trade-offs in either software or hardware. They also demonstrate new trade-offs in latency, throughput, and complexity in software implementations for high-performance computing and GPGPUs, and hardware implementations using custom processing elements, full-custom application-specific integrated circuits (ASICs), and field-programmable-gate arrays (FPGAs). Presenting a good overview of this research area and future directions, High-Speed Decoders for Polar Codes is perfect for any researcher or SDR practitioner looking into implementing efficient decoders for polar codes, as well as students and professors in a modern error correction class. As polar codes have been accepted to protect the control channel in the next-generation mobile communication standard (5G) developed by the 3GPP, the audience includes engineers who will have to implement decoders for such codes and hardware engineers designing the backbone of communication networks.

Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6... Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2020, Tiruchirappalli, India, December 18-19, 2020, Proceedings, Part I (Hardcover, 1st ed. 2020)
Sujeet K. Sharma, Yogesh K. Dwivedi, Bhimaraya Metri, Nripendra P. Rana
R4,388 Discovery Miles 43 880 Ships in 18 - 22 working days

This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020.The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems

Statistical Trend Analysis of Physically Unclonable Functions - An Approach via Text Mining (Hardcover): Behrouz Zolfaghari,... Statistical Trend Analysis of Physically Unclonable Functions - An Approach via Text Mining (Hardcover)
Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba, Hamid R. Nemati, Pinaki Mitra
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book). This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Designs From Linear Codes
Cunsheng Ding Hardcover R3,986 Discovery Miles 39 860
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, … Hardcover R4,490 Discovery Miles 44 900
Improving Image Quality in Visual…
Bin Yan, Yong Xiang, … Hardcover R2,653 Discovery Miles 26 530
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520

 

Partners