0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.)
Wenliang Du
R1,954 Discovery Miles 19 540 Ships in 9 - 17 working days
AI and Deep Learning in Biometric Security - Trends, Potential, and Challenges (Hardcover): Gaurav Jaswal, Vivek Kanhangad,... AI and Deep Learning in Biometric Security - Trends, Potential, and Challenges (Hardcover)
Gaurav Jaswal, Vivek Kanhangad, Raghavendra Ramachandra
R4,936 Discovery Miles 49 360 Ships in 12 - 19 working days

This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. This text highlights a showcase of cutting-edge research on the use of convolution neural networks, autoencoders, recurrent convolutional neural networks in face, hand, iris, gait, fingerprint, vein, and medical biometric traits. It also provides a step-by-step guide to understanding deep learning concepts for biometrics authentication approaches and presents an analysis of biometric images under various environmental conditions. This book is sure to catch the attention of scholars, researchers, practitioners, and technology aspirants who are willing to research in the field of AI and biometric security.

Cryptographic Engineering (Hardcover, 2009 ed.): Cetin Kaya Koc Cryptographic Engineering (Hardcover, 2009 ed.)
Cetin Kaya Koc
R7,011 Discovery Miles 70 110 Ships in 12 - 19 working days

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.

This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.

Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book."

Tribe of Hackers Security Leaders - Tribal Knowledge from the best in Cybersecurity Leadership (Paperback): M. J. Carey Tribe of Hackers Security Leaders - Tribal Knowledge from the best in Cybersecurity Leadership (Paperback)
M. J. Carey
R537 R496 Discovery Miles 4 960 Save R41 (8%) Ships in 12 - 19 working days

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.

Co-creating for Context in the Transfer and Diffusion of IT - IFIP WG 8.6 International Working Conference on Transfer and... Co-creating for Context in the Transfer and Diffusion of IT - IFIP WG 8.6 International Working Conference on Transfer and Diffusion of IT, TDIT 2022, Maynooth, Ireland, June 15-16, 2022, Proceedings (Hardcover, 1st ed. 2022)
Amany Elbanna, Shane McLoughlin, Yogesh K. Dwivedi, Brian Donnellan, David Wastell
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This volume, IFIP AICT 660, constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Co-creating for Context in Prospective Transfer and Diffusion of IT" on Transfer and Diffusion of IT, TDIT 2022, held in Maynooth, Ireland, during June 15-16, 2022. The 19 full papers and 10 short papers presented were carefully reviewed and selected from 60 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts:

ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June... ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings (Hardcover, 1st ed. 2022)
Weizhi Meng, Simone Fischer-Hubner, Christian D. Jensen
R3,220 Discovery Miles 32 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks (Hardcover, 1st ed. 2022): Ikram Ali, Yong Chen, Mohammad... Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks (Hardcover, 1st ed. 2022)
Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li
R4,239 Discovery Miles 42 390 Ships in 12 - 19 working days

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.

Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings (Hardcover, 1st ed. 2020)
Nathan Clarke, Steven Furnell
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Interference Cancellation Using Space-Time Processing and Precoding Design (Hardcover, 2013 ed.): Feng Li Interference Cancellation Using Space-Time Processing and Precoding Design (Hardcover, 2013 ed.)
Feng Li
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to achieve interference cancellation, low-complexity decoding and full diversity for a series of multi-user systems. In multi-user environments, co-channel interference will diminish the performance of wireless communications systems. In this book, we investigate how to design robust space-time codes and pre-coders to suppress the co-channel interference when multiple antennas are available. This book offers a valuable reference work for graduate students, academic researchers and engineers who are interested in interference cancellation in wireless communications. Rigorous performance analysis and various simulation illustrations are included for each design method. Dr. Feng Li is a scientific researcher at Cornell University.

Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback)
Rebecca Slayton
R2,010 Discovery Miles 20 100 Ships in 12 - 19 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Information Technology in Disaster Risk Reduction - 6th IFIP WG 5.15 International Conference, ITDRR 2021, Morioka, Japan,... Information Technology in Disaster Risk Reduction - 6th IFIP WG 5.15 International Conference, ITDRR 2021, Morioka, Japan, October 25-27, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Jun Sasaki, Yuko Murayama, Dimiter Velev, Plamena Zlateva
R2,627 Discovery Miles 26 270 Ships in 10 - 15 working days

This volume constitutes the refereed and revised post-conference proceedings of the 6th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2021, in Morioka, Japan, in October 2021. The 11 full papers presented were carefully reviewed and selected from 18 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The papers are categorized in the following topical subheadings: Information Analysis for Situation Awareness; Evacuation and Rescue; COVID-19 Issues; and IT Use for Risk and Disaster Management.

Number Theory Meets Wireless Communications (Hardcover, 1st ed. 2020): Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju... Number Theory Meets Wireless Communications (Hardcover, 1st ed. 2020)
Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju Velani
R5,113 Discovery Miles 51 130 Ships in 10 - 15 working days

This volume explores the rich interplay between number theory and wireless communications, reviewing the surprisingly deep connections between these fields and presenting new research directions to inspire future research. The contributions of this volume stem from the Workshop on Interactions between Number Theory and Wireless Communication held at the University of York in 2016. The chapters, written by leading experts in their respective fields, provide direct overviews of highly exciting current research developments. The topics discussed include metric Diophantine approximation, geometry of numbers, homogeneous dynamics, algebraic lattices and codes, network and channel coding, and interference alignment. The book is edited by experts working in number theory and communication theory. It thus provides unique insight into key concepts, cutting-edge results, and modern techniques that play an essential role in contemporary research. Great effort has been made to present the material in a manner that is accessible to new researchers, including PhD students. The book will also be essential reading for established researchers working in number theory or wireless communications looking to broaden their outlook and contribute to this emerging interdisciplinary area.

Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,505 Discovery Miles 35 050 Ships in 9 - 17 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover): Amit Kumar Tyagi, Ajith Abraham Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover)
Amit Kumar Tyagi, Ajith Abraham
R3,237 Discovery Miles 32 370 Ships in 9 - 17 working days

Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.

Multivariate Public Key Cryptosystems (Hardcover, 2nd ed. 2020): Jintai Ding, Albrecht Petzoldt, Dieter S Schmidt Multivariate Public Key Cryptosystems (Hardcover, 2nd ed. 2020)
Jintai Ding, Albrecht Petzoldt, Dieter S Schmidt
R4,586 Discovery Miles 45 860 Ships in 12 - 19 working days

This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key schemes, including the four multivariate signature schemes participating as second round candidates in the NIST standardization process for post-quantum cryptosystems. Furthermore, this book covers the Simple Matrix encryption scheme, which is currently the most promising multivariate public key encryption scheme. This book also covers the current state of security analysis methods for Multivariate Public Key Cryptosystems including the algorithms and theory of solving systems of multivariate polynomial equations over finite fields. Through the book's website, interested readers can find source code to the algorithms handled in this book. In 1994, Dr. Peter Shor from Bell Laboratories proposed a quantum algorithm solving the Integer Factorization and the Discrete Logarithm problem in polynomial time, thus making all of the currently used public key cryptosystems, such as RSA and ECC insecure. Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge. One of the most promising candidates for this are Multivariate Public Key Cryptosystems (MPKCs). The public key of an MPKC is a set of multivariate polynomials over a small finite field. Especially for digital signatures, numerous well-studied multivariate schemes offering very short signatures and high efficiency exist. The fact that these schemes work over small finite fields, makes them suitable not only for interconnected computer systems, but also for small devices with limited resources, which are used in ubiquitous computing. This book gives a systematic introduction into the field of Multivariate Public Key Cryptosystems (MPKC), and presents the most promising multivariate schemes for digital signatures and encryption. Although, this book was written more from a computational perspective, the authors try to provide the necessary mathematical background. Therefore, this book is suitable for a broad audience. This would include researchers working in either computer science or mathematics interested in this exciting new field, or as a secondary textbook for a course in MPKC suitable for beginning graduate students in mathematics or computer science. Information security experts in industry, computer scientists and mathematicians would also find this book valuable as a guide for understanding the basic mathematical structures necessary to implement multivariate cryptosystems for practical applications.

Information Dynamics - In Classical and Quantum Systems (Hardcover, 1st ed. 2022): Thomas Dittrich Information Dynamics - In Classical and Quantum Systems (Hardcover, 1st ed. 2022)
Thomas Dittrich
R2,218 Discovery Miles 22 180 Ships in 12 - 19 working days

This wide-ranging book introduces information as a key concept not only in physics, from quantum mechanics to thermodynamics, but also in the neighboring sciences and in the humanities. The central part analyzes dynamical processes as manifestations of information flows between microscopic and macroscopic scales and between systems and their environment. Quantum mechanics is interpreted as a reconstruction of mechanics based on fundamental limitations of information processing on the smallest scales. These become particularly manifest in quantum chaos and in quantum computing. Covering subjects such as causality, prediction, undecidability, chaos, and quantum randomness, the book also provides an information-theoretical view of predictability. More than 180 illustrations visualize the concepts and arguments. The book takes inspiration from the author's graduate-level topical lecture but is also well suited for undergraduate studies and is a valuable resource for researchers and professionals.

European Axis Signal Intelligence in World War II (Hardcover): National Security Agency, Army Security Agency European Axis Signal Intelligence in World War II (Hardcover)
National Security Agency, Army Security Agency
R2,552 Discovery Miles 25 520 Ships in 12 - 19 working days

An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army Security Agency relying on captured documents and interviews with prisoners. This is an absolutely essential primary reference for anyone interested in cryptography as a vital aspect of World War II.

The volumes include:

Volume I: Synopsis

Volume 2: Notes on German High Level Cryptography and Cryptanalysis

Volume 3: The Signal Intelligence Agency of the Supreme Command, Armed Forces

Volume 4: The Signal Intelligence Service of the Army High Command

Volume 5: The German Air Force Signal Intelligence Service

Volume 6: The Foreign Office Cryptanalytic Section

Volume 7: Goering's "Research" Bureau

Volume 8: Miscellaneous

Volume 9: German Traffic Analysis of Russian Communications

Arithmetic, Geometry, and Coding Theory - Proceedings of the International Conference held at Centre International de... Arithmetic, Geometry, and Coding Theory - Proceedings of the International Conference held at Centre International de Rencontres de Mathematiques (CIRM), Luminy, France, June 28 - July 2, 1993 (Hardcover, Reprint 2011)
R. Pellikaan, M Perret, S.G. Vladut
R5,121 Discovery Miles 51 210 Ships in 12 - 19 working days

The series is aimed specifically at publishing peer reviewed reviews and contributions presented at workshops and conferences. Each volume is associated with a particular conference, symposium or workshop. These events cover various topics within pure and applied mathematics and provide up-to-date coverage of new developments, methods and applications.

Probability and Information (Hardcover, 1983 ed.): A.M. Yaglom, I.M. Yaglom Probability and Information (Hardcover, 1983 ed.)
A.M. Yaglom, I.M. Yaglom
R10,511 Discovery Miles 105 110 Ships in 12 - 19 working days
Cryptography (Hardcover): William Buchanan Cryptography (Hardcover)
William Buchanan
R2,110 Discovery Miles 21 100 Ships in 9 - 17 working days

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: - full provision of Web-based material on almost every topic covered - provision of additional on-line material, such as videos, source code, and labs - coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs) Key areas covered include: - Fundamentals of Encryption - Public Key Encryption - Symmetric Key Encryption - Hashing Methods - Key Exchange Methods - Digital Certificates and Authentication - Tunneling - Crypto Cracking - Light-weight Cryptography - Blockchain - Zero-knowledge Proofs This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

Heterogeneous Cyber Physical Systems of Systems (Hardcover): Ioannis Papaefstathiou, Alkis Hatzopoulos Heterogeneous Cyber Physical Systems of Systems (Hardcover)
Ioannis Papaefstathiou, Alkis Hatzopoulos
R2,839 R1,737 Discovery Miles 17 370 Save R1,102 (39%) Ships in 9 - 17 working days

Cyber-physical systems are the natural extension of the so-called "Internet of Things". They are "systems of collaborating computational elements controlling physical entities". Cyber Physical Systems of Systems (CPSoS) are considered "The Next Computing Revolution" after Mainframe computing (60's-70's), Desktop computing & Internet (80's-90's) and Ubiquitous computing (00's); because all aspects of daily life are rapidly evolving towards humans interacting amongst themselves as well as their environment via computational devices (often mobile), and because in most cases systems will employ their computational capabilities to interact amongst themselves. CPSoS enable the physical world to merge with the cyber one. Using sensors, the embedded systems monitor and collect data from physical processes, such as the steering of a vehicle, energy consumption or human health functions. The systems are networked making the data globally available. CPSoS make it possible for software applications to directly interact with events in the physical world, for example to measure and react to changes in blood pressure or peaks in energy consumption. Embedded hardware and software systems crucially expand the functionality and competitiveness of vehicles, aircraft, medical equipment, production plants and household appliances. Connecting these systems to a virtual environment of globally networked services and information systems opens completely new areas of innovation and novel business platforms. Future CPSoS will have many sophisticated, interconnected parts that must instantaneously exchange, parse, and act on detailed data in a highly coordinated manner. Continued advances in science and engineering will be necessary to enable advances in design and development of these complex systems. Multi- scale, multi-layer, multi-domain, and multi-system integrated infrastructures will require new foundations in system science and engineering. Scientists and engineers with an understanding of otherwise physical systems will need to work in tandem with computer and information scientists to achieve effective, workable designs. In this tutorial, basic and advanced issues on the design of the future heterogeneous CPSoS are presented including relevant Blockchain technologies, reconfigurable systems, advanced sensor interfaces and human-centered design processes. Certain advanced tools for the design and implementation of the cyber parts of the CPSoS (i.e. FPGA design tools from Xilinx) are also covered.

Radical transparency and digital democracy - Wikileaks and beyond (Hardcover): Luke Heemsbergen Radical transparency and digital democracy - Wikileaks and beyond (Hardcover)
Luke Heemsbergen
R2,898 Discovery Miles 28 980 Ships in 10 - 15 working days

This book tells the story of radical transparency in a datafied world. It is a story that not only includes the beginnings of WikiLeaks and its endings as a weapon of the GRU, but also exposes numerous other decentralised disclosure networks designed to crack open democracy - for good or ill - that followed in its wake. This is a story that can only be understood through rethinking how technologies of government, practices of media, and assumptions of democracy interact. By combining literatures of governmentality, media studies, and democracy, this illuminating account offers novel insights and critiques of the transparency ideal through its material-political practice. Case studies uncover evolving media practices that, regardless of being scraped from public records or leaked from internal sources, still divulge secrets. The narrative also traces new corporate players such as Clearview AI, the civic-minded ICIJ, and state-based public health disclosures in times of pandemic to reveal how they all form unique proto-institutional instances of disclosure as a technology of government. The analysis of novel forms of digital radical transparency - from a trickle of paper-based leaks to the modern digital .torrent - is grounded in analogues from the analogue past, which combine to tell the whole story of how transparency functions in and helps form democracy.

Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Hardcover, 4th ed. 2020): Walter Fischer Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Hardcover, 4th ed. 2020)
Walter Fischer
R4,677 Discovery Miles 46 770 Ships in 12 - 19 working days

This practical guide offers all important digital television, sound radio, and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM and ISDB-T. It provides an in-depth look at these subjects in terms of practical experience. In addition explains the basics of essential topics like analog television, digital modulation, COFDM or mathematical transformations between time and frequency domains. The fourth edition addresses many new developments and features of digital broadcasting. Especially it includes Ultra High Definition Television (UHDTV), 4K, HEVC / H.265 (High Efficiency Video Coding), DVB-T2 measurement techniques and practice, DOCSIS 3.1, DVB - S2X, and 3DTV, as well as VHF-FM radio, HDMI, terrestrial transmitters, and stations. In the center of the treatments are always measuring techniques and of measuring practice for each case consolidating the knowledge imparted with numerous practical examples. The book is directed primarily at the specialist working in the field, on transmitters and transmission equipment, network planning, studio technology, playout centers and multiplex center technology and in the development departments for entertainment electronics or TV test engineering. Since the entire field of electrical communications technology is traversed in a wide arc, those who are students in this field are not excluded either.

Quantum Computing Environments (Hardcover, 1st ed. 2022): Sitharama S. Iyengar, Mario Mastriani, KJ Latesh Kumar Quantum Computing Environments (Hardcover, 1st ed. 2022)
Sitharama S. Iyengar, Mario Mastriani, KJ Latesh Kumar
R3,622 Discovery Miles 36 220 Ships in 10 - 15 working days

This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors. The book provides a comprehensive insight into the quantum mechanics and quantum computing techniques and tools and how they have evolved and the impacted in supporting and flourishing business during the quantum computing era. This book includes chapters that discuss the most primitive quantum schemes to the most recent use of Internet, finance and radar technology, thus leveraging greater use of new technologies like security and Internet and others. The content is relevant for an audience that is involved in the research and development of advanced quantum systems. It gives the industry, researchers, and students interested in learning the various quantum computing sectors with the necessary information and tools that can be used to research, design and develop advanced quantum computing systems and techniques.

Autonomic Computing in Cloud Resource Management in Industry 4.0 (Hardcover, 1st ed. 2021): Tanupriya Choudhury, Bhupesh Kumar... Autonomic Computing in Cloud Resource Management in Industry 4.0 (Hardcover, 1st ed. 2021)
Tanupriya Choudhury, Bhupesh Kumar Dewangan, Ravi Tomar, Bhupesh Kumar Singh, Teoh Teik Toe, …
R5,155 Discovery Miles 51 550 Ships in 10 - 15 working days

This book describes the next generation of industry-Industry 4.0-and how it holds the promise of increased flexibility in manufacturing, along with automation, better quality, and improved productivity. The authors discuss how it thus enables companies to cope with the challenges of producing increasingly individualized products with a short lead-time to market and higher quality. The authors posit that intelligent cloud services and resource sharing play an important role in Industry 4.0 anticipated Fourth Industrial Revolution. This book serves the different issues and challenges in cloud resource management CRM techniques with proper propped solution for IT organizations. The book features chapters based on the characteristics of autonomic computing with its applicability in CRM. Each chapter features the techniques and analysis of each mechanism to make better resource management in cloud.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Foundations of Software Science and…
Alex Simpson, Mikolaj Bojańczyk Hardcover R1,981 Discovery Miles 19 810
Oceanographic Analysis with R
Dan E. Kelley Hardcover R2,188 Discovery Miles 21 880
A Level of Martin-Lof Randomness
Bradley S. Tice Hardcover R3,414 Discovery Miles 34 140
Post-Optimal Analysis in Linear…
Miguel A. Goberna, Marco A. Lopez Paperback R1,896 Discovery Miles 18 960
R Visualizations - Derive Meaning from…
David Gerbing Paperback R1,418 Discovery Miles 14 180
Introduction to Mathematica (R) for…
Andrey Grozin Hardcover R2,163 Discovery Miles 21 630
Visual Approach to SPSS for Windows, A…
Leonard Stern Paperback R2,157 Discovery Miles 21 570
Mathematics for Computer Science
Eric Lehman, F.Thomson Leighton, … Hardcover R1,660 Discovery Miles 16 600
R for SAS and SPSS Users
Robert A. Muenchen Hardcover R4,659 Discovery Miles 46 590
A Simple Guide to SPSS (R) for Political…
Lee Kirkpatrick, Quentin Kidd Paperback R1,285 R1,189 Discovery Miles 11 890

 

Partners