0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Tribe of Hackers Blue Team - Tribal Knowledge from  the best in Defensive Cybersecurity (Paperback): M. J. Carey Tribe of Hackers Blue Team - Tribal Knowledge from the best in Defensive Cybersecurity (Paperback)
M. J. Carey
R552 R500 Discovery Miles 5 000 Save R52 (9%) Ships in 9 - 17 working days

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Modern Cryptography - Applied Mathematics for Encryption and Information Security (Hardcover, 2nd ed. 2022): William Easttom Modern Cryptography - Applied Mathematics for Encryption and Information Security (Hardcover, 2nd ed. 2022)
William Easttom
R1,596 Discovery Miles 15 960 Ships in 10 - 15 working days

This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); Includes a full suite of classroom materials including exercises, Q&A, and examples.

Probabilistic Methods and Distributed Information - Rudolf Ahlswede's Lectures on Information Theory 5 (Hardcover, 1st ed.... Probabilistic Methods and Distributed Information - Rudolf Ahlswede's Lectures on Information Theory 5 (Hardcover, 1st ed. 2019)
Rudolf Ahlswede; Edited by Alexander Ahlswede, Ingo Althoefer, Christian Deppe; Contributions by Vladimir Blinovsky; Edited by …
R2,762 Discovery Miles 27 620 Ships in 18 - 22 working days

The fifth volume of Rudolf Ahlswede's lectures on Information Theory focuses on several problems that were at the heart of a lot of his research. One of the highlights of the entire lecture note series is surely Part I of this volume on arbitrarily varying channels (AVC), a subject in which Ahlswede was probably the world's leading expert. Appended to Part I is a survey by Holger Boche and Ahmed Mansour on recent results concerning AVC and arbitrarily varying wiretap channels (AVWC). After a short Part II on continuous data compression, Part III, the longest part of the book, is devoted to distributed information. This Part includes discussions on a variety of related topics; among them let us emphasize two which are famously associated with Ahlswede: "multiple descriptions", on which he produced some of the best research worldwide, and "network coding", which had Ahlswede among the authors of its pioneering paper. The final Part IV on "Statistical Inference under Communication constraints" is mainly based on Ahlswede's joint paper with Imre Csiszar, which received the Best Paper Award of the IEEE Information Theory Society. The lectures presented in this work, which consists of 10 volumes, are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used either as the basis for courses or to supplement them in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.

Data Security in Cloud Computing, Volume II (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume II (Paperback)
Giulio D'Agostino
R1,040 R869 Discovery Miles 8 690 Save R171 (16%) Ships in 18 - 22 working days
Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG... Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG 5.7 International Conference, APMS 2021, Nantes, France, September 5-9, 2021, Proceedings, Part III (Hardcover, 1st ed. 2021)
Alexandre Dolgui, Alain Bernard, David Lemoine, Gregor von Cieminski, David Romero
R4,158 Discovery Miles 41 580 Ships in 18 - 22 working days

The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Paperback): David Kahn How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Paperback)
David Kahn
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.

Codes - The Guide to Secrecy From Ancient to Modern Times (Hardcover): Richard A. Mollin Codes - The Guide to Secrecy From Ancient to Modern Times (Hardcover)
Richard A. Mollin
R5,549 Discovery Miles 55 490 Ships in 10 - 15 working days

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist. The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.

Investigator's Guide to Steganography (Hardcover): Gregory Kipper Investigator's Guide to Steganography (Hardcover)
Gregory Kipper
R3,088 Discovery Miles 30 880 Ships in 10 - 15 working days

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

Unsupervised Machine Learning for Clustering in Political and Social Research (Paperback): Philip D. Waggoner Unsupervised Machine Learning for Clustering in Political and Social Research (Paperback)
Philip D. Waggoner
R495 Discovery Miles 4 950 Ships in 9 - 17 working days

In the age of data-driven problem-solving, applying sophisticated computational tools for explaining substantive phenomena is a valuable skill. Yet, application of methods assumes an understanding of the data, structure, and patterns that influence the broader research program. This Element offers researchers and teachers an introduction to clustering, which is a prominent class of unsupervised machine learning for exploring and understanding latent, non-random structure in data. A suite of widely used clustering techniques is covered in this Element, in addition to R code and real data to facilitate interaction with the concepts. Upon setting the stage for clustering, the following algorithms are detailed: agglomerative hierarchical clustering, k-means clustering, Gaussian mixture models, and at a higher-level, fuzzy C-means clustering, DBSCAN, and partitioning around medoids (k-medoids) clustering.

Secret Colors (Hardcover): Martin Kleppmann Secret Colors (Hardcover)
Martin Kleppmann; Illustrated by Mitch Seymour
R573 Discovery Miles 5 730 Ships in 9 - 17 working days
Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Michael Friedewald, Melek OEnen, Eva Lievens, Stephan Krenn, Samuel Fricker
R2,507 Discovery Miles 25 070 Ships in 18 - 22 working days

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings (Hardcover, 1st ed. 2020)
Nathan Clarke, Steven Furnell
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Procedural Semantics for Hyperintensional Logic - Foundations and Applications of Transparent Intensional Logic (Hardcover,... Procedural Semantics for Hyperintensional Logic - Foundations and Applications of Transparent Intensional Logic (Hardcover, 2010)
Marie Duzi, Bjorn Jespersen, Pavel Materna
R5,449 Discovery Miles 54 490 Ships in 18 - 22 working days

The book is about logical analysis of natural language. Since we humans communicate by means of natural language, we need a tool that helps us to understand in a precise manner how the logical and formal mechanisms of natural language work. Moreover, in the age of computers, we need to communicate both with and through computers as well. Transparent Intensional Logic is a tool that is helpful in making our communication and reasoning smooth and precise. It deals with all kinds of linguistic context in a fully compositional and anti-contextual way.

Number Theory Meets Wireless Communications (Hardcover, 1st ed. 2020): Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju... Number Theory Meets Wireless Communications (Hardcover, 1st ed. 2020)
Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju Velani
R4,716 Discovery Miles 47 160 Ships in 18 - 22 working days

This volume explores the rich interplay between number theory and wireless communications, reviewing the surprisingly deep connections between these fields and presenting new research directions to inspire future research. The contributions of this volume stem from the Workshop on Interactions between Number Theory and Wireless Communication held at the University of York in 2016. The chapters, written by leading experts in their respective fields, provide direct overviews of highly exciting current research developments. The topics discussed include metric Diophantine approximation, geometry of numbers, homogeneous dynamics, algebraic lattices and codes, network and channel coding, and interference alignment. The book is edited by experts working in number theory and communication theory. It thus provides unique insight into key concepts, cutting-edge results, and modern techniques that play an essential role in contemporary research. Great effort has been made to present the material in a manner that is accessible to new researchers, including PhD students. The book will also be essential reading for established researchers working in number theory or wireless communications looking to broaden their outlook and contribute to this emerging interdisciplinary area.

Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth... Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth Birthday (Hardcover, 2002 ed.)
Richard E Blahut, Ralf Koetter
R4,268 Discovery Miles 42 680 Ships in 18 - 22 working days

Foreword by James L. Massey.
Codes, Graphs, and Systems is an excellent reference for both academic researchers and professional engineers working in the fields of communications and signal processing. A collection of contributions from world-renowned experts in coding theory, information theory, and signal processing, the book provides a broad perspective on contemporary research in these areas. Survey articles are also included. Specific topics covered include convolutional codes and turbo codes; detection and equalization; modems; physics and information theory; lattices and geometry; and behaviors and codes on graphs.
Codes, Graphs, and Systems is a tribute to the leadership and profound influence of G. David Forney, Jr. The 35 contributors to the volume have assembled their work in his honor.

Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings... Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (Hardcover, 2012 ed.)
Theo Dimitrakos, Rajat Moona, Dhiren, Patel, D. Harrison McKnight
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.

Metaverso y NFT - El descubrimiento de la Web 3.0, la inversion en tokens no fungibles, la realidad virtual, el criptojuego y... Metaverso y NFT - El descubrimiento de la Web 3.0, la inversion en tokens no fungibles, la realidad virtual, el criptojuego y el criptoarte (Spanish, Hardcover)
Donn Newman
R734 R653 Discovery Miles 6 530 Save R81 (11%) Ships in 18 - 22 working days
Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG... Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG 5.7 International Conference, APMS 2021, Nantes, France, September 5-9, 2021, Proceedings, Part II (Hardcover, 1st ed. 2021)
Alexandre Dolgui, Alain Bernard, David Lemoine, Gregor von Cieminski, David Romero
R4,366 Discovery Miles 43 660 Ships in 10 - 15 working days

The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Hardcover, New): David Kahn How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Hardcover, New)
David Kahn
R1,429 Discovery Miles 14 290 Ships in 10 - 15 working days

Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.

The Theory of Quantum Information (Hardcover): John Watrous The Theory of Quantum Information (Hardcover)
John Watrous
R2,140 Discovery Miles 21 400 Ships in 10 - 15 working days

This largely self-contained book on the theory of quantum information focuses on precise mathematical formulations and proofs of fundamental facts that form the foundation of the subject. It is intended for graduate students and researchers in mathematics, computer science, and theoretical physics seeking to develop a thorough understanding of key results, proof techniques, and methodologies that are relevant to a wide range of research topics within the theory of quantum information and computation. The book is accessible to readers with an understanding of basic mathematics, including linear algebra, mathematical analysis, and probability theory. An introductory chapter summarizes these necessary mathematical prerequisites, and starting from this foundation, the book includes clear and complete proofs of all results it presents. Each subsequent chapter includes challenging exercises intended to help readers to develop their own skills for discovering proofs concerning the theory of quantum information.

Distributed Multiple Description Coding - Principles, Algorithms and Systems (Hardcover, 2011): Huihui Bai, Anhong Wang, Yao... Distributed Multiple Description Coding - Principles, Algorithms and Systems (Hardcover, 2011)
Huihui Bai, Anhong Wang, Yao Zhao, Jeng-Shyang Pan, Ajith Abraham
R2,652 Discovery Miles 26 520 Ships in 18 - 22 working days

This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC, transform based MDC, and FEC based MDC; discusses Sleplian-Wolf coding based on Turbo and LDPC respectively, and comparing relative performance; includes original algorithms of MDC and DVC; presents the basic frameworks and experimental results, to help readers improve the efficiency of MDC and DVC; introduces the classical DVC system for mobile communications, providing the developmental environment in detail.

Codebreaker in the Far East (Paperback): Alan Stripp Codebreaker in the Far East (Paperback)
Alan Stripp
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

This is the first book to describe British wartime success in breaking Japanese codes of dazzling variety and great complexity which contributed to the victory in Burma three months before Hiroshima. Written for the general reader, this first-hand account describes the difficulty of decoding one of the most complex languages in the world in some of the most difficult conditions. The book was published in 1989 to avoid proposed legislation which would prohibit those in the security services from publishing secret information.

Generalized Statistical Thermodynamics - Thermodynamics of Probability Distributions and Stochastic Processes (Hardcover, 1st... Generalized Statistical Thermodynamics - Thermodynamics of Probability Distributions and Stochastic Processes (Hardcover, 1st ed. 2018)
Themis Matsoukas
R4,743 Discovery Miles 47 430 Ships in 18 - 22 working days

This book gives the definitive mathematical answer to what thermodynamics really is: a variational calculus applied to probability distributions. Extending Gibbs's notion of ensemble, the Author imagines the ensemble of all possible probability distributions and assigns probabilities to them by selection rules that are fairly general. The calculus of the most probable distribution in the ensemble produces the entire network of mathematical relationships we recognize as thermodynamics. The first part of the book develops the theory for discrete and continuous distributions while the second part applies this thermodynamic calculus to problems in population balance theory and shows how the emergence of a giant component in aggregation, and the shattering transition in fragmentation may be treated as formal phase transitions. While the book is intended as a research monograph, the material is self-contained and the style sufficiently tutorial to be accessible for self-paced study by an advanced graduate student in such fields as physics, chemistry, and engineering.

MIMO Communication for Cellular Networks (Hardcover, 2012): Howard Huang, Constantinos B. Papadias, Sivarama Venkatesan MIMO Communication for Cellular Networks (Hardcover, 2012)
Howard Huang, Constantinos B. Papadias, Sivarama Venkatesan
R2,691 Discovery Miles 26 910 Ships in 18 - 22 working days

Multiple antenna (MIMO) techniques are an essential component of any contemporary wireless communication system because they can significantly improve the performance over conventional single-antenna links. While MIMO techniques are relatively well understood at the link level, the interaction of multiple MIMO links and their impact on performance at the system level necessitate fundamentally new investigations. We propose a book that investigates the theoretical foundations of MIMO networks consisting of multiple simultaneous MIMO links and applies these principles in the design of next-generation wireless networks.

About ten years ago, the information theoretic foundations of MIMO techniques were developed and showed the promise of using multiple antennas at both the transmitter and receiver of a wireless link. An enormous amount of research ensued to develop practical techniques for achieving these promised gains. Within the last few years, the information theory community has again made significant breakthroughs, this time in the understanding of multiuser MIMO systems. Currently in industry, new wideband wireless standards, including EV-DO Rev C, UMTS LTE, and WiMax, are under development to meet the insatiable demands for high-rate, ubiquitous wireless services. For the first time, and for all of these standards, MIMO technology will play an integral role in meeting the aggressive performance requirements for increased data rates, decreased latency, and improved coverage.

Motivated by the confluence of these two eventsa "the emergence of multiuser MIMO theory and the development of commercial MIMO-based systemsa "we propose to connect the two worlds with a bookthat combines theory and practice. This book would provide a systematic survey of MIMO systems, starting with a review of MIMO link-level techniques and conventional single-antenna system-level techniques, summarizing the latest results in multiuser MIMO systems and developments in cross-layer techniques, and applying these techniques to the analysis and design of both current and future packet-based wireless networks. In addition to providing theoretical results, the book would serve as a reference for practicing communication engineers by providing useful descriptions of spatial channel models and system simulation methodologies for MIMO networks

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Process Systems Engineering for…
Ravendra Singh, Zhihong Yuan Hardcover R5,513 R5,107 Discovery Miles 51 070
Photocatalytic Degradation of Dyes…
Sushma Dave, Jayashankar Das, … Paperback R4,626 Discovery Miles 46 260
Knowledge Intensive Computer Aided…
Susan Finger, Tetsuo Tomiyama, … Hardcover R5,324 Discovery Miles 53 240
Distributed, Parallel and Biologically…
Mike Hinchey, Bernd Kleinjohann, … Hardcover R1,446 Discovery Miles 14 460
Enzymes in Oil Processing - Recent…
Showkat Ahmad Bhawani, Anish Khan, … Paperback R4,320 Discovery Miles 43 200
Corrosion Atlas - A Collection of…
Evert D.D. During Paperback R8,725 Discovery Miles 87 250
Handbook of Research on Big Data…
Jose Machado, Hugo Peixoto, … Hardcover R10,591 Discovery Miles 105 910
Bridging Scales in Modelling and…
Alessandro Parente, Juray De Wilde Hardcover R5,227 Discovery Miles 52 270
Software Engineering Research…
Roger Lee Hardcover R2,669 Discovery Miles 26 690
Novel Catalytic and Separation Processes…
Dickson Ozokwelu, Suojiang Zhang, … Hardcover R4,462 R4,146 Discovery Miles 41 460

 

Partners