0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (87)
  • R500+ (1,898)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Implementing Cryptography Using Python (Paperback): S Bray Implementing Cryptography Using Python (Paperback)
S Bray
R1,099 R927 Discovery Miles 9 270 Save R172 (16%) Ships in 18 - 22 working days

Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you'll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You'll also explore methods of authenticating messages to ensure that they haven't been tampered with in transit. Finally, you'll learn how to use digital signatures to let others verify the messages sent through your services. Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python Discover the history of cryptography and understand its critical importance in today's digital communication systems Work through real-world examples to understand the pros and cons of various authentication methods Protect your end-users and ensure that your applications and systems are using up-to-date cryptography

Concise Encyclopedia of Coding Theory (Hardcover): W. Cary Huffman, Jon-Lark Kim, Patrick Sole Concise Encyclopedia of Coding Theory (Hardcover)
W. Cary Huffman, Jon-Lark Kim, Patrick Sole
R6,718 Discovery Miles 67 180 Ships in 10 - 15 working days

Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has grown into a discipline with many practical applications (antennas, networks, memories), requiring various mathematical techniques, from commutative algebra, to semi-definite programming, to algebraic geometry. Most topics covered in the Concise Encyclopedia of Coding Theory are presented in short sections at an introductory level and progress from basic to advanced level, with definitions, examples, and many references. The book is divided into three parts: Part I fundamentals: cyclic codes, skew cyclic codes, quasi-cyclic codes, self-dual codes, codes and designs, codes over rings, convolutional codes, performance bounds Part II families: AG codes, group algebra codes, few-weight codes, Boolean function codes, codes over graphs Part III applications: alternative metrics, algorithmic techniques, interpolation decoding, pseudo-random sequences, lattices, quantum coding, space-time codes, network coding, distributed storage, secret-sharing, and code-based-cryptography. Features Suitable for students and researchers in a wide range of mathematical disciplines Contains many examples and references Most topics take the reader to the frontiers of research

Cybersecurity in the COVID-19 Pandemic (Hardcover): Kenneth Okereafor Cybersecurity in the COVID-19 Pandemic (Hardcover)
Kenneth Okereafor
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book's primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.

Secure Searchable Encryption and Data Management (Hardcover): Mamta, Brij B. Gupta Secure Searchable Encryption and Data Management (Hardcover)
Mamta, Brij B. Gupta
R1,571 Discovery Miles 15 710 Ships in 10 - 15 working days

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques... Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques (Hardcover, 1st ed. 2021)
Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari
R4,639 Discovery Miles 46 390 Ships in 10 - 15 working days

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

Data Analytics and Decision Support for Cybersecurity - Trends, Methodologies and Applications (Hardcover, 1st ed. 2017): Ivan... Data Analytics and Decision Support for Cybersecurity - Trends, Methodologies and Applications (Hardcover, 1st ed. 2017)
Ivan Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang
R4,034 Discovery Miles 40 340 Ships in 10 - 15 working days

The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science methods, has resulted in a higher demand for effective data-driven models that support decision-making at a strategic level. This motivates the need for defining novel data analytics and decision support approaches in a myriad of real-life scenarios and problems, with Cybersecurity-related domains being no exception. This contributed volume comprises nine chapters, written by leading international researchers, covering a compilation of recent advances in Cybersecurity-related applications of data analytics and decision support approaches. In addition to theoretical studies and overviews of existing relevant literature, this book comprises a selection of application-oriented research contributions. The investigations undertaken across these chapters focus on diverse and critical Cybersecurity problems, such as Intrusion Detection, Insider Threats, Insider Threats, Collusion Detection, Run-Time Malware Detection, Intrusion Detection, E-Learning, Online Examinations, Cybersecurity noisy data removal, Secure Smart Power Systems, Security Visualization and Monitoring. Researchers and professionals alike will find the chapters an essential read for further research on the topic.

Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Hardcover, 1st ed. 2021): Maamar Ouladj, Sylvain... Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Hardcover, 1st ed. 2021)
Maamar Ouladj, Sylvain Guilley
R1,743 Discovery Miles 17 430 Ships in 18 - 22 working days

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Hardcover, 1st ed. 2020): Tuan D. Pham Fuzzy Recurrence Plots and Networks with Applications in Biomedicine (Hardcover, 1st ed. 2020)
Tuan D. Pham
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This book presents an original combination of three well-known methodological approaches for nonlinear data analysis: recurrence, networks, and fuzzy logic. After basic concepts of these three approaches are introduced, this book presents recently developed methods known as fuzzy recurrence plots and fuzzy recurrence networks. Computer programs written in MATLAB, which implement the basic algorithms, are included to facilitate the understanding of the developed ideas. Several applications of these techniques to biomedical problems, ranging from cancer and neurodegenerative disease to depression, are illustrated to show the potential of fuzzy recurrence methods. This book opens a new door to theorists in complex systems science as well as specialists in medicine, biology, engineering, physics, computer science, geosciences, and social economics to address issues in experimental nonlinear signal and data processing.

Codes and Designs - Proceedings of a conference honoring Professor Dijen K. Ray-Chaudhuri on the occasion of his 65th birthday.... Codes and Designs - Proceedings of a conference honoring Professor Dijen K. Ray-Chaudhuri on the occasion of his 65th birthday. The Ohio State University May 18-21, 2000 (Hardcover, Reprint 2012)
K.T. Arasu, Akos Seress
R5,404 Discovery Miles 54 040 Ships in 10 - 15 working days

Following an initiative of the late Hans Zassenhaus in 1965, the Departments of Mathematics at The Ohio State University and Denison University organize conferences in combinatorics, group theory, and ring theory. Between May 18-21, 2000, the 25th conference of this series was held. Usually, there are twenty to thirty invited 20-minute talks in each of the three main areas. However, at the 2000 meeting, the combinatorics part of the conference was extended, to honor the 65th birthday of Professor Dijen Ray-Chaudhuri. This volulme is the proceedings of this extension. Most of the papers are in coding theory and design theory, reflecting the major interest of Professor Ray-Chaudhuri, but there are articles on association schemes, algebraic graph theory, combinatorial geometry, and network flows as well. There are four surveys and seventeen research articles, and all of these went through a thorough refereeing process. The volume is primarily recommended for researchers and graduate students interested in new developments in coding theory and design theory.

Polar Codes - A Non-Trivial Approach to Channel Coding (Hardcover, 1st ed. 2019): Orhangazi Polar Codes - A Non-Trivial Approach to Channel Coding (Hardcover, 1st ed. 2019)
Orhangazi
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

This book explains the philosophy of the polar encoding and decoding technique. Polar codes are one of the most recently discovered capacity-achieving channel codes. What sets them apart from other channel codes is the fact that polar codes are designed mathematically and their performance is mathematically proven. The book develops related fundamental concepts from information theory, such as entropy, mutual information, and channel capacity. It then explains the successive cancellation decoding logic and provides the necessary formulas, moving on to demonstrate the successive cancellation decoding operation with a tree structure. It also demonstrates the calculation of split channel capacities when polar codes are employed for binary erasure channels, and explains the mathematical formulation of successive cancellation decoding for polar codes. In closing, the book presents and proves the channel polarization theorem, before mathematically analyzing the performance of polar codes.

Guide to Biometrics (Hardcover, 2004 ed.): Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W.... Guide to Biometrics (Hardcover, 2004 ed.)
Ruud M. Bolle, Jonathan H. Connell, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior
R5,398 Discovery Miles 53 980 Ships in 10 - 15 working days

There is much interest in the use of biometrics for verification, identification, and "screening" applications, collectively called biometric authentication. This interest has been heightened because of the threat of terrorism. Biometric authentication systems offer advantages over systems based on knowledge or possession such as unsupervised (legacy) authentication systems based on password/PIN and supervised (legacy) authentication systems based on driver's licences and passports. The most important advantage is increased security: when a person is authenticated based on a biometric, the probability that this person is the originally enrolled person can be statistically estimated or computed in some other way. When a person is authenticated based on a password or even based on human observation, no such probabilities can be determined. Of course, the mere capability to compute this probability is not sufficient, what is needed is that the probability of correct authentication is high and the error probabilities are low. Achieving this probabilistic linking by introducing biometrics in authentication systems brings along many design choices and may introduce additional security loopholes. "Biometrics" examines the many aspects of biometric applications that are an issue even before a particular biometrics has been selected. In addition, the book further studies many issues that are associated with the currently popular biometric identifiers, namely, finger, face, voice, iris, hand (geometry) and signature.

Digital Watermarking and Steganography - Fundamentals and Techniques, Second Edition (Paperback, 2nd edition): Frank Y. Shih Digital Watermarking and Steganography - Fundamentals and Techniques, Second Edition (Paperback, 2nd edition)
Frank Y. Shih
R1,700 Discovery Miles 17 000 Ships in 10 - 15 working days

This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.

Security without Obscurity - A Guide to Cryptographic Architectures (Paperback): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Paperback)
Jeff Stapleton
R1,458 Discovery Miles 14 580 Ships in 10 - 15 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover): Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover)
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong
R5,617 Discovery Miles 56 170 Ships in 10 - 15 working days

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

Exercises in Programming Style (Hardcover, 2nd edition): Cristina Videira Lopes Exercises in Programming Style (Hardcover, 2nd edition)
Cristina Videira Lopes
R3,104 Discovery Miles 31 040 Ships in 10 - 15 working days

The first edition of Exercises in Programming Style was honored as an ACM Notable Book and praised as "The best programming book of the decade." This new edition retains the same presentation but has been upgraded to Python 3, and there is a new section on neural network styles. Using a simple computational task (term frequency) to illustrate different programming styles, Exercises in Programming Style helps readers understand the various ways of writing programs and designing systems. It is designed to be used in conjunction with code provided on an online repository. The book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. The book can also be used in advanced programming courses in computer science and software engineering programs. The book contains 40 different styles for writing the term frequency task. The styles are grouped into ten categories: historical, basic, function composition, objects and object interactions, reflection and metaprogramming, adversity, data-centric, concurrency, interactivity, and neural networks. The author states the constraints in each style and explains the example programs. Each chapter first presents the constraints of the style, next shows an example program, and then gives a detailed explanation of the code. Most chapters also have sections focusing on the use of the style in systems design as well as sections describing the historical context in which the programming style emerged.

An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Hardcover): Nikos Daskalakis, Panagiotis Georgitseas An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Hardcover)
Nikos Daskalakis, Panagiotis Georgitseas
R3,771 Discovery Miles 37 710 Ships in 10 - 15 working days

The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.

An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Paperback): Nikos Daskalakis, Panagiotis Georgitseas An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Paperback)
Nikos Daskalakis, Panagiotis Georgitseas
R1,277 Discovery Miles 12 770 Ships in 10 - 15 working days

The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.

Mathematical Modelling and Computational Intelligence Techniques - ICMMCIT-2021, Gandhigram, India February 10-12 (Hardcover,... Mathematical Modelling and Computational Intelligence Techniques - ICMMCIT-2021, Gandhigram, India February 10-12 (Hardcover, 1st ed. 2021)
P. Balasubramaniam, Kuru Ratnavelu, Grienggrai Rajchakit, G. Nagamani
R5,191 Discovery Miles 51 910 Ships in 18 - 22 working days

This book collects papers presented at the International Conference on Mathematical Modelling and Computational Intelligence Techniques (ICMMCIT) 2021, held at the Department of Mathematics, The Gandhigram Rural Institute (Deemed to be University), Gandhigram, Tamil Nadu, India, from 10-12 February 2021. Significant contributions from renowned researchers from fields of applied analysis, mathematical modelling and computing techniques have been received for this conference. Chapters emphasize on the research of computational nature focusing on new algorithms, their analysis and numerical results, as well as applications in physical, biological, social, and behavioural sciences. The accepted papers are organized in topical sections as mathematical modelling, image processing, control theory, graphs and networks, and inventory control.

ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24,... ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
R3,858 Discovery Miles 38 580 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Selected Unsolved Problems in Coding Theory (Hardcover, 2011 ed.): David Joyner, Jon-Lark Kim Selected Unsolved Problems in Coding Theory (Hardcover, 2011 ed.)
David Joyner, Jon-Lark Kim
R1,517 Discovery Miles 15 170 Ships in 18 - 22 working days

Using an original mode of presentation, and emphasizing the computational nature of the subject, this book explores a number of the unsolved problems that still exist in coding theory. A well-established and highly relevant branch of mathematics, the theory of error-correcting codes is concerned with reliably transmitting data over a noisy channel. Despite frequent use in a range of contexts, the subject still contains interesting unsolved problems that have resisted solution by some of the most prominent mathematicians of recent decades.

"

Employing Sage a free open-source mathematics software system to illustrate ideas, this book is intended for graduate students and researchers in algebraic coding theory. The work may be used as supplementary reading material in a graduate course on coding theory or for self-study.

Compressed Sensing and its Applications - MATHEON Workshop 2013 (Hardcover, 1st ed. 2015): Holger Boche, Robert Calderbank,... Compressed Sensing and its Applications - MATHEON Workshop 2013 (Hardcover, 1st ed. 2015)
Holger Boche, Robert Calderbank, Gitta Kutyniok, Jan Vybiral
R3,113 R2,212 Discovery Miles 22 120 Save R901 (29%) Ships in 10 - 15 working days

Since publication of the initial papers in 2006, compressed sensing has captured the imagination of the international signal processing community, and the mathematical foundations are nowadays quite well understood. Parallel to the progress in mathematics, the potential applications of compressed sensing have been explored by many international groups of, in particular, engineers and applied mathematicians, achieving very promising advances in various areas such as communication theory, imaging sciences, optics, radar technology, sensor networks, or tomography. Since many applications have reached a mature state, the research center MATHEON in Berlin focusing on "Mathematics for Key Technologies", invited leading researchers on applications of compressed sensing from mathematics, computer science, and engineering to the "MATHEON Workshop 2013: Compressed Sensing and its Applications" in December 2013. It was the first workshop specifically focusing on the applications of compressed sensing. This book features contributions by the plenary and invited speakers of this workshop. To make this book accessible for those unfamiliar with compressed sensing, the book will not only contain chapters on various applications of compressed sensing written by plenary and invited speakers, but will also provide a general introduction into compressed sensing. The book is aimed at both graduate students and researchers in the areas of applied mathematics, computer science, and engineering as well as other applied scientists interested in the potential and applications of the novel methodology of compressed sensing. For those readers who are not already familiar with compressed sensing, an introduction to the basics of this theory will be included.

Everyday Cryptography - Fundamental Principles and Applications (Hardcover, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Hardcover, 2nd Revised edition)
Keith Martin
R3,374 Discovery Miles 33 740 Ships in 10 - 15 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical... Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, Costa de Caparica, Portugal, July 1-3, 2020, Proceedings (Hardcover, 1st ed. 2020)
Luis M. Camarinha-Matos, Nastaran Farhadi, Fabio Lopes, Helena Pereira
R2,735 Discovery Miles 27 350 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020. The 20 full papers and 24 short papers presented were carefully reviewed and selected from 91 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; decisions systems; analysis and synthesis algorithms; communication systems; optimization systems; digital twins and smart manufacturing; power systems; energy control; power transportation; biomedical analysis and diagnosis; and instrumentation in health.

Advanced Video Coding Systems (Hardcover, 2014 ed.): Wen Gao, Siwei Ma Advanced Video Coding Systems (Hardcover, 2014 ed.)
Wen Gao, Siwei Ma
R3,388 Discovery Miles 33 880 Ships in 10 - 15 working days

This book presents an overview of the state of the art in video coding technology. Specifically, it introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding. Features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax structure of AVS2; describes the key technologies used in the AVS2 standard, including prediction coding, transform coding, entropy coding, and loop-filters; examines efficient tools for scene video coding and surveillance video, and the details of a promising intelligent video coding system; discusses optimization technologies in video coding systems; provides a review of image, video, and 3D content quality assessment algorithms; surveys the hot research topics in video compression.

Codes - The Guide to Secrecy From Ancient to Modern Times (Paperback): Richard A. Mollin Codes - The Guide to Secrecy From Ancient to Modern Times (Paperback)
Richard A. Mollin
R2,094 Discovery Miles 20 940 Ships in 10 - 15 working days

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist. The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
Algebraic Geometry Modeling In…
Edgar Martinez-Moro Hardcover R2,933 Discovery Miles 29 330
Stream Ciphers and Number Theory, Volume…
Thomas W Cusick, Cunsheng Ding, … Hardcover R2,957 Discovery Miles 29 570
Why Cryptography Should Not Rely on…
Juliane Kramer Hardcover R3,193 Discovery Miles 31 930
Blockchain Applications
Arshdeep Bagha Hardcover R1,870 R1,522 Discovery Miles 15 220
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,356 Discovery Miles 23 560

 

Partners