0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG... Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG 5.7 International Conference, APMS 2021, Nantes, France, September 5-9, 2021, Proceedings, Part II (Hardcover, 1st ed. 2021)
Alexandre Dolgui, Alain Bernard, David Lemoine, Gregor von Cieminski, David Romero
R4,319 Discovery Miles 43 190 Ships in 12 - 17 working days

The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.

Information Dynamics - In Classical and Quantum Systems (Hardcover, 1st ed. 2022): Thomas Dittrich Information Dynamics - In Classical and Quantum Systems (Hardcover, 1st ed. 2022)
Thomas Dittrich
R2,059 Discovery Miles 20 590 Ships in 12 - 17 working days

This wide-ranging book introduces information as a key concept not only in physics, from quantum mechanics to thermodynamics, but also in the neighboring sciences and in the humanities. The central part analyzes dynamical processes as manifestations of information flows between microscopic and macroscopic scales and between systems and their environment. Quantum mechanics is interpreted as a reconstruction of mechanics based on fundamental limitations of information processing on the smallest scales. These become particularly manifest in quantum chaos and in quantum computing. Covering subjects such as causality, prediction, undecidability, chaos, and quantum randomness, the book also provides an information-theoretical view of predictability. More than 180 illustrations visualize the concepts and arguments. The book takes inspiration from the author's graduate-level topical lecture but is also well suited for undergraduate studies and is a valuable resource for researchers and professionals.

Multivariate Public Key Cryptosystems (Hardcover, 2nd ed. 2020): Jintai Ding, Albrecht Petzoldt, Dieter S Schmidt Multivariate Public Key Cryptosystems (Hardcover, 2nd ed. 2020)
Jintai Ding, Albrecht Petzoldt, Dieter S Schmidt
R4,267 Discovery Miles 42 670 Ships in 12 - 17 working days

This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key schemes, including the four multivariate signature schemes participating as second round candidates in the NIST standardization process for post-quantum cryptosystems. Furthermore, this book covers the Simple Matrix encryption scheme, which is currently the most promising multivariate public key encryption scheme. This book also covers the current state of security analysis methods for Multivariate Public Key Cryptosystems including the algorithms and theory of solving systems of multivariate polynomial equations over finite fields. Through the book's website, interested readers can find source code to the algorithms handled in this book. In 1994, Dr. Peter Shor from Bell Laboratories proposed a quantum algorithm solving the Integer Factorization and the Discrete Logarithm problem in polynomial time, thus making all of the currently used public key cryptosystems, such as RSA and ECC insecure. Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge. One of the most promising candidates for this are Multivariate Public Key Cryptosystems (MPKCs). The public key of an MPKC is a set of multivariate polynomials over a small finite field. Especially for digital signatures, numerous well-studied multivariate schemes offering very short signatures and high efficiency exist. The fact that these schemes work over small finite fields, makes them suitable not only for interconnected computer systems, but also for small devices with limited resources, which are used in ubiquitous computing. This book gives a systematic introduction into the field of Multivariate Public Key Cryptosystems (MPKC), and presents the most promising multivariate schemes for digital signatures and encryption. Although, this book was written more from a computational perspective, the authors try to provide the necessary mathematical background. Therefore, this book is suitable for a broad audience. This would include researchers working in either computer science or mathematics interested in this exciting new field, or as a secondary textbook for a course in MPKC suitable for beginning graduate students in mathematics or computer science. Information security experts in industry, computer scientists and mathematicians would also find this book valuable as a guide for understanding the basic mathematical structures necessary to implement multivariate cryptosystems for practical applications.

Heterogeneous Cyber Physical Systems of Systems (Hardcover): Ioannis Papaefstathiou, Alkis Hatzopoulos Heterogeneous Cyber Physical Systems of Systems (Hardcover)
Ioannis Papaefstathiou, Alkis Hatzopoulos
R2,783 R1,647 Discovery Miles 16 470 Save R1,136 (41%) Ships in 9 - 15 working days

Cyber-physical systems are the natural extension of the so-called "Internet of Things". They are "systems of collaborating computational elements controlling physical entities". Cyber Physical Systems of Systems (CPSoS) are considered "The Next Computing Revolution" after Mainframe computing (60's-70's), Desktop computing & Internet (80's-90's) and Ubiquitous computing (00's); because all aspects of daily life are rapidly evolving towards humans interacting amongst themselves as well as their environment via computational devices (often mobile), and because in most cases systems will employ their computational capabilities to interact amongst themselves. CPSoS enable the physical world to merge with the cyber one. Using sensors, the embedded systems monitor and collect data from physical processes, such as the steering of a vehicle, energy consumption or human health functions. The systems are networked making the data globally available. CPSoS make it possible for software applications to directly interact with events in the physical world, for example to measure and react to changes in blood pressure or peaks in energy consumption. Embedded hardware and software systems crucially expand the functionality and competitiveness of vehicles, aircraft, medical equipment, production plants and household appliances. Connecting these systems to a virtual environment of globally networked services and information systems opens completely new areas of innovation and novel business platforms. Future CPSoS will have many sophisticated, interconnected parts that must instantaneously exchange, parse, and act on detailed data in a highly coordinated manner. Continued advances in science and engineering will be necessary to enable advances in design and development of these complex systems. Multi- scale, multi-layer, multi-domain, and multi-system integrated infrastructures will require new foundations in system science and engineering. Scientists and engineers with an understanding of otherwise physical systems will need to work in tandem with computer and information scientists to achieve effective, workable designs. In this tutorial, basic and advanced issues on the design of the future heterogeneous CPSoS are presented including relevant Blockchain technologies, reconfigurable systems, advanced sensor interfaces and human-centered design processes. Certain advanced tools for the design and implementation of the cyber parts of the CPSoS (i.e. FPGA design tools from Xilinx) are also covered.

Build Your Own Blockchain - A Practical Guide to Distributed Ledger Technology (Hardcover, 1st ed. 2020): Daniel Hellwig, Goran... Build Your Own Blockchain - A Practical Guide to Distributed Ledger Technology (Hardcover, 1st ed. 2020)
Daniel Hellwig, Goran Karlic, Arnd Huchzermeier
R1,564 R961 Discovery Miles 9 610 Save R603 (39%) Ships in 12 - 17 working days

This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain from scratch. Through its conceptual background and hands-on exercises, this book allows students, teachers and crypto enthusiasts to launch their first blockchain while assuming prior knowledge of the underlying technology. How do I build a blockchain? How do I mint a cryptocurrency? How do I write a smart contract? How do I launch an initial coin offering (ICO)? These are some of questions this book answers. Starting by outlining the beginnings and development of early cryptocurrencies, it provides the conceptual foundations required to engineer secure software that interacts with both public and private ledgers. The topics covered include consensus algorithms, mining and decentralization, and many more. "This is a one-of-a-kind book on Blockchain technology. The authors achieved the perfect balance between the breadth of topics and the depth of technical discussion. But the real gem is the set of carefully curated hands-on exercises that guide the reader through the process of building a Blockchain right from Chapter 1." Volodymyr Babich, Professor of Operations and Information Management, McDonough School of Business, Georgetown University "An excellent introduction of DLT technology for a non-technical audience. The book is replete with examples and exercises, which greatly facilitate the learning of the underlying processes of blockchain technology for all, from students to entrepreneurs." Serguei Netessine, Dhirubhai Ambani Professor of Innovation and Entrepreneurship, The Wharton School, University of Pennsylvania "Whether you want to start from scratch or deepen your blockchain knowledge about the latest developments, this book is an essential reference. Through clear explanations and practical code examples, the authors take you on a progressive journey to discover the technology foundations and build your own blockchain. From an operations perspective, you can learn the principles behind the distributed ledger technology relevant for transitioning towards blockchain-enabled supply chains. Reading this book, you'll get inspired, be able to assess the applicability of blockchain to supply chain operations, and learn from best practices recognized in real-world examples." Ralf W. Seifert, Professor of Technology and Operations Management at EPFL and Professor of Operations Management at IMD

European Axis Signal Intelligence in World War II (Hardcover): National Security Agency, Army Security Agency European Axis Signal Intelligence in World War II (Hardcover)
National Security Agency, Army Security Agency
R2,377 Discovery Miles 23 770 Ships in 12 - 17 working days

An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army Security Agency relying on captured documents and interviews with prisoners. This is an absolutely essential primary reference for anyone interested in cryptography as a vital aspect of World War II.

The volumes include:

Volume I: Synopsis

Volume 2: Notes on German High Level Cryptography and Cryptanalysis

Volume 3: The Signal Intelligence Agency of the Supreme Command, Armed Forces

Volume 4: The Signal Intelligence Service of the Army High Command

Volume 5: The German Air Force Signal Intelligence Service

Volume 6: The Foreign Office Cryptanalytic Section

Volume 7: Goering's "Research" Bureau

Volume 8: Miscellaneous

Volume 9: German Traffic Analysis of Russian Communications

Quantum Computing Environments (Hardcover, 1st ed. 2022): Sitharama S. Iyengar, Mario Mastriani, KJ Latesh Kumar Quantum Computing Environments (Hardcover, 1st ed. 2022)
Sitharama S. Iyengar, Mario Mastriani, KJ Latesh Kumar
R3,520 Discovery Miles 35 200 Ships in 10 - 15 working days

This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors. The book provides a comprehensive insight into the quantum mechanics and quantum computing techniques and tools and how they have evolved and the impacted in supporting and flourishing business during the quantum computing era. This book includes chapters that discuss the most primitive quantum schemes to the most recent use of Internet, finance and radar technology, thus leveraging greater use of new technologies like security and Internet and others. The content is relevant for an audience that is involved in the research and development of advanced quantum systems. It gives the industry, researchers, and students interested in learning the various quantum computing sectors with the necessary information and tools that can be used to research, design and develop advanced quantum computing systems and techniques.

Arithmetic, Geometry, and Coding Theory - Proceedings of the International Conference held at Centre International de... Arithmetic, Geometry, and Coding Theory - Proceedings of the International Conference held at Centre International de Rencontres de Mathematiques (CIRM), Luminy, France, June 28 - July 2, 1993 (Hardcover, Reprint 2011)
R. Pellikaan, M Perret, S.G. Vladut
R4,766 Discovery Miles 47 660 Ships in 12 - 17 working days

The series is aimed specifically at publishing peer reviewed reviews and contributions presented at workshops and conferences. Each volume is associated with a particular conference, symposium or workshop. These events cover various topics within pure and applied mathematics and provide up-to-date coverage of new developments, methods and applications.

Probability and Information (Hardcover, 1983 ed.): A.M. Yaglom, I.M. Yaglom Probability and Information (Hardcover, 1983 ed.)
A.M. Yaglom, I.M. Yaglom
R9,800 Discovery Miles 98 000 Ships in 12 - 17 working days
Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Hardcover, 4th ed. 2020): Walter Fischer Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide (Hardcover, 4th ed. 2020)
Walter Fischer
R4,356 Discovery Miles 43 560 Ships in 12 - 17 working days

This practical guide offers all important digital television, sound radio, and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM and ISDB-T. It provides an in-depth look at these subjects in terms of practical experience. In addition explains the basics of essential topics like analog television, digital modulation, COFDM or mathematical transformations between time and frequency domains. The fourth edition addresses many new developments and features of digital broadcasting. Especially it includes Ultra High Definition Television (UHDTV), 4K, HEVC / H.265 (High Efficiency Video Coding), DVB-T2 measurement techniques and practice, DOCSIS 3.1, DVB - S2X, and 3DTV, as well as VHF-FM radio, HDMI, terrestrial transmitters, and stations. In the center of the treatments are always measuring techniques and of measuring practice for each case consolidating the knowledge imparted with numerous practical examples. The book is directed primarily at the specialist working in the field, on transmitters and transmission equipment, network planning, studio technology, playout centers and multiplex center technology and in the development departments for entertainment electronics or TV test engineering. Since the entire field of electrical communications technology is traversed in a wide arc, those who are students in this field are not excluded either.

Z2Z4-Linear Codes (Hardcover, 1st ed. 2022): Joaquim Borges, Cristina Fernandez-Cordoba, Jaume Pujol, Josep Rifa, Merce... Z2Z4-Linear Codes (Hardcover, 1st ed. 2022)
Joaquim Borges, Cristina Fernandez-Cordoba, Jaume Pujol, Josep Rifa, Merce Villanueva
R3,625 Discovery Miles 36 250 Ships in 12 - 17 working days

The theory developed for 2 4-additive codes is the starting point for much generalization about codes over mixed alphabets. They have opened a new, emergent area of research. The techniques used for 2 4-linear codes are being generalized and applied to more general codes. By example, these codes have contributed to the classification of many nonlinear codes. Moreover, they can be considered as the starting point of many different generalizations given over mixed alphabets, thereby representing a useful area of research. Since 2010, more than 30 papers have been published about the codes considered in the book, which includes important classes of binary codes (1-perfect, Hadamard, etc.) that are not linear in general. For example, much recent research has shown the application of the techniques described for the family of cyclic 2 4-linear codes. Topics and Features: Examines everything from the basic definitions to very advanced results Provides numerous examples, succinctly and comprehensively gathering and using the relevant information Includes examples using commands from a new Magma package, developed mostly by the same authors Proposes algorithms, for instance to describe coding and decoding strategies This unique volume will be eminently suitable for researchers working on coding theory over rings, especially over mixed alphabets. Experts will find commands and algorithms that will be useful in the generalization to codes over mixed alphabets. Additionally, by outlining the basic theory of codes over mixed alphabets and providing numerous examples, the book will be useful to researchers wanting to be introduced to the topic. The authors are all affiliated with the Dept. of Information and Communications Engineering at the Universitat Autonoma de Barcelona, Spain. Joaquim Borges and Cristina Fernandez-Cordoba are Associate Professors, Jaume Pujol is a now retired Associate Professor, Josep Rifa is Professor Emeritus, and Merce Villanueva is Associate Professor.

Astronomy in the Near-Infrared - Observing Strategies and Data Reduction Techniques (Hardcover, 1st ed. 2022): Jochen Heidt Astronomy in the Near-Infrared - Observing Strategies and Data Reduction Techniques (Hardcover, 1st ed. 2022)
Jochen Heidt
R3,950 Discovery Miles 39 500 Ships in 12 - 17 working days

Near-infrared astronomy has become one of the most rapidly developing branches in modern astrophysics. Innovative observing techniques, near-infrared detectors with quantum efficiencies in excess of 90%, highly specialised instruments as well as advanced data reduction techniques have allowed major breakthroughs in various areas like exoplanets, star-forming regions, the supermassive black hole in the Galactic center, and the high-redshift Universe. In this book, the reader will be introduced to the basic concepts of how to prepare near-infrared observations with maximized scientific return. Equal weight is given to all aspects of the data reduction for both - imaging and spectroscopy. Information is also provided on the state of the art instrumentation available and planned, on detector technology or the physics of the atmosphere, all of which influence the preparation and execution of observations and data reduction techniques. The beginner but also the expert will find a lot of information in compact form which is otherwise widely dispersed across the internet or other sources.

Autonomic Computing in Cloud Resource Management in Industry 4.0 (Hardcover, 1st ed. 2021): Tanupriya Choudhury, Bhupesh Kumar... Autonomic Computing in Cloud Resource Management in Industry 4.0 (Hardcover, 1st ed. 2021)
Tanupriya Choudhury, Bhupesh Kumar Dewangan, Ravi Tomar, Bhupesh Kumar Singh, Teoh Teik Toe, …
R4,924 Discovery Miles 49 240 Ships in 12 - 17 working days

This book describes the next generation of industry-Industry 4.0-and how it holds the promise of increased flexibility in manufacturing, along with automation, better quality, and improved productivity. The authors discuss how it thus enables companies to cope with the challenges of producing increasingly individualized products with a short lead-time to market and higher quality. The authors posit that intelligent cloud services and resource sharing play an important role in Industry 4.0 anticipated Fourth Industrial Revolution. This book serves the different issues and challenges in cloud resource management CRM techniques with proper propped solution for IT organizations. The book features chapters based on the characteristics of autonomic computing with its applicability in CRM. Each chapter features the techniques and analysis of each mechanism to make better resource management in cloud.

Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023): Tuomo Sipola, Tero Kokkonen,... Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023)
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
R4,503 Discovery Miles 45 030 Ships in 10 - 15 working days

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.

Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Hardcover):... Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Hardcover)
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
R2,807 Discovery Miles 28 070 Ships in 12 - 17 working days

Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind

Introduction to Coding Theory (Paperback, 2nd edition): Jurgen Bierbrauer Introduction to Coding Theory (Paperback, 2nd edition)
Jurgen Bierbrauer
R1,369 Discovery Miles 13 690 Ships in 12 - 17 working days

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes, and algebraic curves. The latter part presents a brief introduction to the theory of algebraic curves and its most important applications to coding theory.

Freedom and Social Inclusion in a Connected World - 17th IFIP WG 9.4 International Conference on Implications of Information... Freedom and Social Inclusion in a Connected World - 17th IFIP WG 9.4 International Conference on Implications of Information and Digital Technologies for Development, ICT4D 2022, Lima, Peru, May 25-27, 2022, Proceedings (Hardcover, 1st ed. 2022)
Yingqin Zheng, Pamela Abbott, Jose Antonio Robles-Flores
R3,347 Discovery Miles 33 470 Ships in 12 - 17 working days

This book constitutes the refereed proceedings of the 17th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2022, which was supposed to be held in Lima, Peru, in May 2021, but was held virtually instead due to the COVID-19 pandemic. The 40 revised full papers presented were carefully reviewed and selected from 58 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.

Advances in Cyber Security: Principles, Techniques, and Applications (Hardcover, 1st ed. 2019): Kuan-Ching Li, Xiaofeng Chen,... Advances in Cyber Security: Principles, Techniques, and Applications (Hardcover, 1st ed. 2019)
Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
R4,493 Discovery Miles 44 930 Ships in 10 - 15 working days

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.

Blockchain for Industry 4.0 - Blockchain for Industry 4.0: Emergence, Challenges, and Opportunities (Hardcover): Asharaf S,... Blockchain for Industry 4.0 - Blockchain for Industry 4.0: Emergence, Challenges, and Opportunities (Hardcover)
Asharaf S, Justin Goldston, Samson Williams, Anoop V.S.
R3,620 Discovery Miles 36 200 Ships in 12 - 17 working days

This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain. It explains Blockchain concepts related to Industry 4.0, Smart Healthcare, and the Internet of Things (IoT) and explores Smart Contracts and Consensus algorithms. This book will serve as an ideal reference text for graduate students and academic researchers in electrical engineering, electronics and communication engineering, computer engineering, and information technology. This book * Discusses applications of blockchain technology in diverse sectors such as industry 4.0, education, finance, and supply chain. * Provides theoretical concepts, applications, and research advancements in the field of blockchain. * Covers industry 4.0 digitization platform and blockchain for data management in industry 4.0 in a comprehensive manner. * Emphasizes analysis and design of consensus algorithms, fault tolerance, and strategy to choose the correct consensus algorithm. * Introduces security issues in the industrial internet of things, internet of things, blockchain integration, and blockchain-based applications. The text presents in-depth coverage of theoretical concepts, applications and advances in the field of blockchain technology. This book will be an ideal reference for graduate students and academic researchers in diverse engineering fields such as electrical, electronics and communication, computer, and information technology.

Brute Force - Cracking the Data Encryption Standard (Hardcover, 2005 ed.): Matt Curtin Brute Force - Cracking the Data Encryption Standard (Hardcover, 2005 ed.)
Matt Curtin
R917 R802 Discovery Miles 8 020 Save R115 (13%) Ships in 10 - 15 working days

In 1996, the supposedly uncrackable US federal encryption system was broken. In this captivating and intriguing book, Matt Curtin charts the rise and fall of DES and chronicles the efforts of those who were determined to master it.

ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September... ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Hardcover, 1st ed. 2020)
Marko Hoelbl, Kai Rannenberg, Tatjana Welzer
R3,347 Discovery Miles 33 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.

Finite Fields and Applications - Proceedings of The Fifth International Conference on Finite Fields and Applications Fq 5, held... Finite Fields and Applications - Proceedings of The Fifth International Conference on Finite Fields and Applications Fq 5, held at the University of Augsburg, Germany, August 2-6, 1999 (Hardcover, 2001 ed.)
Dieter Jungnickel, H. Niederreiter
R5,705 R4,292 Discovery Miles 42 920 Save R1,413 (25%) Ships in 12 - 17 working days

This volume represents the refereed proceedings of the Fifth International Conference on Finite Fields and Applications (F q5) held at the University of Augsburg (Germany) from August 2-6, 1999, and hosted by the Department of Mathematics. The conference continued a series of biennial international conferences on finite fields, following earlier conferences at the University of Nevada at Las Vegas (USA) in August 1991 and August 1993, the University ofGlasgow (Scotland) in July 1995, and the University ofWaterloo (Canada) in August 1997. The Organizing Committee of F q5 comprised Thomas Beth (University ofKarlsruhe), Stephen D. Cohen (University of Glasgow), Dieter Jungnickel (University of Augsburg, Chairman), Alfred Menezes (University of Waterloo), Gary L. Mullen (Pennsylvania State University), Ronald C. Mullin (University of Waterloo), Harald Niederreiter (Austrian Academy of Sciences), and Alexander Pott (University of Magdeburg). The program ofthe conference consisted offour full days and one halfday ofsessions, with 11 invited plenary talks andover80contributedtalks that re- quired three parallel sessions. This documents the steadily increasing interest in finite fields and their applications. Finite fields have an inherently fasci- nating structure and they are important tools in discrete mathematics. Their applications range from combinatorial design theory, finite geometries, and algebraic geometry to coding theory, cryptology, and scientific computing. A particularly fruitful aspect is the interplay between theory and applications which has led to many new perspectives in research on finite fields.

Product Lifecycle Management. Green and Blue Technologies to Support Smart and Sustainable Organizations - 18th IFIP WG 5.1... Product Lifecycle Management. Green and Blue Technologies to Support Smart and Sustainable Organizations - 18th IFIP WG 5.1 International Conference, PLM 2021, Curitiba, Brazil, July 11-14, 2021, Revised Selected Papers, Part I (Hardcover, 1st ed. 2022)
Osiris Canciglieri Junior, Frederic Noel, Louis Rivest, Abdelaziz Bouras
R4,620 Discovery Miles 46 200 Ships in 12 - 17 working days

The two-volume set IFIP AICT 639 and 640 constitutes the refereed post-conference proceedings of the 18th IFIP WG 5.1 International Conference on Product Lifecycle Management, PLM 2021, held in Curitiba, Brazil, during July 11-14, 2021. The conference was held virtually due to the COVID-19 crisis.The 107 revised full papers presented in these proceedings were carefully reviewed and selected from 133 submissions. The papers are organized in the following topical sections: Volume I: Sustainability, sustainable development and circular economy; sustainability and information technologies and services; green and blue technologies; AI and blockchain integration with enterprise applications; PLM maturity, PLM implementation and adoption within industry 4.0; and industry 4.0 and emerging technologies: Volume II: Design, education and management; lean, design and innovation technologies; information technology models and design; and models, manufacturing and information technologies and services.

Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure... Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers (Hardcover, 2010 Ed.)
Tyler Moore, Sujeet Shenoi
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection IV, is the fourth volume in the annual series produced by IFIP Working Group 11.10 on Critical Infr- tructure Protection, an active international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Fourth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at the National Defense University, Washington, DC, March 15- 17, 2010. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure prot- tion.

Practical Mathematical Cryptography (Hardcover): Kristian Gjosteen Practical Mathematical Cryptography (Hardcover)
Kristian Gjosteen
R2,531 Discovery Miles 25 310 Ships in 12 - 17 working days

Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography. Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential mathematical nature of the computations and arguments involved in cryptography. Cryptography is also a practical science, and the book shows how modern cryptography solves important practical problems in the real world, developing the theory and practice of cryptography from the basics to secure messaging and voting. The presentation provides a unified and consistent treatment of the most important cryptographic topics, from the initial design and analysis of basic cryptographic schemes towards applications. Features Builds from theory toward practical applications Suitable as the main text for a mathematical cryptography course Focus on secure messaging and voting systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
The Economics of Blockchain and…
James L. Caton Hardcover R2,745 Discovery Miles 27 450
Alice and Bob Learn Application Security
T Janca Paperback R849 Discovery Miles 8 490
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,178 Discovery Miles 11 780
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Security and Privacy - Select…
Pantelimon Stanica, Sugata Gangopadhyay, … Hardcover R2,789 Discovery Miles 27 890
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,473 Discovery Miles 24 730
Ransomware Revolution: The Rise of a…
Matthew Ryan Hardcover R4,897 Discovery Miles 48 970
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840

 

Partners