0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Modern Cryptography - Applied Mathematics for Encryption and Information Security (Hardcover, 2nd ed. 2022): William Easttom Modern Cryptography - Applied Mathematics for Encryption and Information Security (Hardcover, 2nd ed. 2022)
William Easttom
R1,596 Discovery Miles 15 960 Ships in 10 - 15 working days

This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); Includes a full suite of classroom materials including exercises, Q&A, and examples.

Probabilistic Methods and Distributed Information - Rudolf Ahlswede's Lectures on Information Theory 5 (Hardcover, 1st ed.... Probabilistic Methods and Distributed Information - Rudolf Ahlswede's Lectures on Information Theory 5 (Hardcover, 1st ed. 2019)
Rudolf Ahlswede; Edited by Alexander Ahlswede, Ingo Althoefer, Christian Deppe; Contributions by Vladimir Blinovsky; Edited by …
R2,762 Discovery Miles 27 620 Ships in 18 - 22 working days

The fifth volume of Rudolf Ahlswede's lectures on Information Theory focuses on several problems that were at the heart of a lot of his research. One of the highlights of the entire lecture note series is surely Part I of this volume on arbitrarily varying channels (AVC), a subject in which Ahlswede was probably the world's leading expert. Appended to Part I is a survey by Holger Boche and Ahmed Mansour on recent results concerning AVC and arbitrarily varying wiretap channels (AVWC). After a short Part II on continuous data compression, Part III, the longest part of the book, is devoted to distributed information. This Part includes discussions on a variety of related topics; among them let us emphasize two which are famously associated with Ahlswede: "multiple descriptions", on which he produced some of the best research worldwide, and "network coding", which had Ahlswede among the authors of its pioneering paper. The final Part IV on "Statistical Inference under Communication constraints" is mainly based on Ahlswede's joint paper with Imre Csiszar, which received the Best Paper Award of the IEEE Information Theory Society. The lectures presented in this work, which consists of 10 volumes, are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used either as the basis for courses or to supplement them in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.

Data Security in Cloud Computing, Volume II (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume II (Paperback)
Giulio D'Agostino
R1,040 R869 Discovery Miles 8 690 Save R171 (16%) Ships in 18 - 22 working days
Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG... Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG 5.7 International Conference, APMS 2021, Nantes, France, September 5-9, 2021, Proceedings, Part III (Hardcover, 1st ed. 2021)
Alexandre Dolgui, Alain Bernard, David Lemoine, Gregor von Cieminski, David Romero
R4,158 Discovery Miles 41 580 Ships in 18 - 22 working days

The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Paperback): David Kahn How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Paperback)
David Kahn
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.

Codes - The Guide to Secrecy From Ancient to Modern Times (Hardcover): Richard A. Mollin Codes - The Guide to Secrecy From Ancient to Modern Times (Hardcover)
Richard A. Mollin
R5,549 Discovery Miles 55 490 Ships in 10 - 15 working days

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist. The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.

Public-Key Cryptography and Computational Number Theory - Proceedings of the International Conference organized by the Stefan... Public-Key Cryptography and Computational Number Theory - Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000 (Hardcover, Reprint 2011)
Kazimierz Alster, Jerzy Urbanowicz, Hugh C. Williams
R5,115 Discovery Miles 51 150 Ships in 10 - 15 working days

The Proceedings contain twenty selected, refereed contributions arising from the International Conference on Public-Key Cryptography and Computational Number Theory held in Warsaw, Poland, on September 11-15, 2000. The conference, attended by eightyfive mathematicians from eleven countries, was organized by the Stefan Banach International Mathematical Center. This volume contains articles from leading experts in the world on cryptography and computational number theory, providing an account of the state of research in a wide variety of topics related to the conference theme. It is dedicated to the memory of the Polish mathematicians Marian Rejewski (1905-1980), Jerzy Rooycki (1909-1942) and Henryk Zygalski (1907-1978), who deciphered the military version of the famous Enigma in December 1932 ? January 1933. A noteworthy feature of the volume is a foreword written by Andrew Odlyzko on the progress in cryptography from Enigma time until now."

Investigator's Guide to Steganography (Hardcover): Gregory Kipper Investigator's Guide to Steganography (Hardcover)
Gregory Kipper
R3,088 Discovery Miles 30 880 Ships in 10 - 15 working days

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Michael Friedewald, Melek OEnen, Eva Lievens, Stephan Krenn, Samuel Fricker
R2,507 Discovery Miles 25 070 Ships in 18 - 22 working days

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings (Hardcover, 1st ed. 2020)
Nathan Clarke, Steven Furnell
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Procedural Semantics for Hyperintensional Logic - Foundations and Applications of Transparent Intensional Logic (Hardcover,... Procedural Semantics for Hyperintensional Logic - Foundations and Applications of Transparent Intensional Logic (Hardcover, 2010)
Marie Duzi, Bjorn Jespersen, Pavel Materna
R5,449 Discovery Miles 54 490 Ships in 18 - 22 working days

The book is about logical analysis of natural language. Since we humans communicate by means of natural language, we need a tool that helps us to understand in a precise manner how the logical and formal mechanisms of natural language work. Moreover, in the age of computers, we need to communicate both with and through computers as well. Transparent Intensional Logic is a tool that is helpful in making our communication and reasoning smooth and precise. It deals with all kinds of linguistic context in a fully compositional and anti-contextual way.

Number Theory Meets Wireless Communications (Hardcover, 1st ed. 2020): Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju... Number Theory Meets Wireless Communications (Hardcover, 1st ed. 2020)
Victor Beresnevich, Alister Burr, Bobak Nazer, Sanju Velani
R4,716 Discovery Miles 47 160 Ships in 18 - 22 working days

This volume explores the rich interplay between number theory and wireless communications, reviewing the surprisingly deep connections between these fields and presenting new research directions to inspire future research. The contributions of this volume stem from the Workshop on Interactions between Number Theory and Wireless Communication held at the University of York in 2016. The chapters, written by leading experts in their respective fields, provide direct overviews of highly exciting current research developments. The topics discussed include metric Diophantine approximation, geometry of numbers, homogeneous dynamics, algebraic lattices and codes, network and channel coding, and interference alignment. The book is edited by experts working in number theory and communication theory. It thus provides unique insight into key concepts, cutting-edge results, and modern techniques that play an essential role in contemporary research. Great effort has been made to present the material in a manner that is accessible to new researchers, including PhD students. The book will also be essential reading for established researchers working in number theory or wireless communications looking to broaden their outlook and contribute to this emerging interdisciplinary area.

Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth... Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth Birthday (Hardcover, 2002 ed.)
Richard E Blahut, Ralf Koetter
R4,268 Discovery Miles 42 680 Ships in 18 - 22 working days

Foreword by James L. Massey.
Codes, Graphs, and Systems is an excellent reference for both academic researchers and professional engineers working in the fields of communications and signal processing. A collection of contributions from world-renowned experts in coding theory, information theory, and signal processing, the book provides a broad perspective on contemporary research in these areas. Survey articles are also included. Specific topics covered include convolutional codes and turbo codes; detection and equalization; modems; physics and information theory; lattices and geometry; and behaviors and codes on graphs.
Codes, Graphs, and Systems is a tribute to the leadership and profound influence of G. David Forney, Jr. The 35 contributors to the volume have assembled their work in his honor.

Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings... Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (Hardcover, 2012 ed.)
Theo Dimitrakos, Rajat Moona, Dhiren, Patel, D. Harrison McKnight
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.

Metaverso y NFT - El descubrimiento de la Web 3.0, la inversion en tokens no fungibles, la realidad virtual, el criptojuego y... Metaverso y NFT - El descubrimiento de la Web 3.0, la inversion en tokens no fungibles, la realidad virtual, el criptojuego y el criptoarte (Spanish, Hardcover)
Donn Newman
R734 R653 Discovery Miles 6 530 Save R81 (11%) Ships in 18 - 22 working days
Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG... Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems - IFIP WG 5.7 International Conference, APMS 2021, Nantes, France, September 5-9, 2021, Proceedings, Part II (Hardcover, 1st ed. 2021)
Alexandre Dolgui, Alain Bernard, David Lemoine, Gregor von Cieminski, David Romero
R4,366 Discovery Miles 43 660 Ships in 10 - 15 working days

The five-volume set IFIP AICT 630, 631, 632, 633, and 634 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2021, held in Nantes, France, in September 2021.*The 378 papers presented were carefully reviewed and selected from 529 submissions. They discuss artificial intelligence techniques, decision aid and new and renewed paradigms for sustainable and resilient production systems at four-wall factory and value chain levels. The papers are organized in the following topical sections: Part I: artificial intelligence based optimization techniques for demand-driven manufacturing; hybrid approaches for production planning and scheduling; intelligent systems for manufacturing planning and control in the industry 4.0; learning and robust decision support systems for agile manufacturing environments; low-code and model-driven engineering for production system; meta-heuristics and optimization techniques for energy-oriented manufacturing systems; metaheuristics for production systems; modern analytics and new AI-based smart techniques for replenishment and production planning under uncertainty; system identification for manufacturing control applications; and the future of lean thinking and practice Part II: digital transformation of SME manufacturers: the crucial role of standard; digital transformations towards supply chain resiliency; engineering of smart-product-service-systems of the future; lean and Six Sigma in services healthcare; new trends and challenges in reconfigurable, flexible or agile production system; production management in food supply chains; and sustainability in production planning and lot-sizing Part III: autonomous robots in delivery logistics; digital transformation approaches in production management; finance-driven supply chain; gastronomic service system design; modern scheduling and applications in industry 4.0; recent advances in sustainable manufacturing; regular session: green production and circularity concepts; regular session: improvement models and methods for green and innovative systems; regular session: supply chain and routing management; regular session: robotics and human aspects; regular session: classification and data management methods; smart supply chain and production in society 5.0 era; and supply chain risk management under coronavirus Part IV: AI for resilience in global supply chain networks in the context of pandemic disruptions; blockchain in the operations and supply chain management; data-based services as key enablers for smart products, manufacturing and assembly; data-driven methods for supply chain optimization; digital twins based on systems engineering and semantic modeling; digital twins in companies first developments and future challenges; human-centered artificial intelligence in smart manufacturing for the operator 4.0; operations management in engineer-to-order manufacturing; product and asset life cycle management for smart and sustainable manufacturing systems; robotics technologies for control, smart manufacturing and logistics; serious games analytics: improving games and learning support; smart and sustainable production and supply chains; smart methods and techniques for sustainable supply chain management; the new digital lean manufacturing paradigm; and the role of emerging technologies in disaster relief operations: lessons from COVID-19 Part V: data-driven platforms and applications in production and logistics: digital twins and AI for sustainability; regular session: new approaches for routing problem solving; regular session: improvement of design and operation of manufacturing systems; regular session: crossdock and transportation issues; regular session: maintenance improvement and lifecycle management; regular session: additive manufacturing and mass customization; regular session: frameworks and conceptual modelling for systems and services efficiency; regular session: optimization of production and transportation systems; regular session: optimization of supply chain agility and reconfigurability; regular session: advanced modelling approaches; regular session: simulation and optimization of systems performances; regular session: AI-based approaches for quality and performance improvement of production systems; and regular session: risk and performance management of supply chains *The conference was held online.

Arithmetic, Geometry, and Coding Theory - Proceedings of the International Conference held at Centre International de... Arithmetic, Geometry, and Coding Theory - Proceedings of the International Conference held at Centre International de Rencontres de Mathematiques (CIRM), Luminy, France, June 28 - July 2, 1993 (Hardcover, Reprint 2011)
R. Pellikaan, M Perret, S.G. Vladut
R4,819 Discovery Miles 48 190 Ships in 10 - 15 working days

The series is aimed specifically at publishing peer reviewed reviews and contributions presented at workshops and conferences. Each volume is associated with a particular conference, symposium or workshop. These events cover various topics within pure and applied mathematics and provide up-to-date coverage of new developments, methods and applications.

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R3,650 Discovery Miles 36 500 Ships in 10 - 15 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Hardcover, New): David Kahn How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Hardcover, New)
David Kahn
R1,429 Discovery Miles 14 290 Ships in 10 - 15 working days

Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.

The Theory of Quantum Information (Hardcover): John Watrous The Theory of Quantum Information (Hardcover)
John Watrous
R2,140 Discovery Miles 21 400 Ships in 10 - 15 working days

This largely self-contained book on the theory of quantum information focuses on precise mathematical formulations and proofs of fundamental facts that form the foundation of the subject. It is intended for graduate students and researchers in mathematics, computer science, and theoretical physics seeking to develop a thorough understanding of key results, proof techniques, and methodologies that are relevant to a wide range of research topics within the theory of quantum information and computation. The book is accessible to readers with an understanding of basic mathematics, including linear algebra, mathematical analysis, and probability theory. An introductory chapter summarizes these necessary mathematical prerequisites, and starting from this foundation, the book includes clear and complete proofs of all results it presents. Each subsequent chapter includes challenging exercises intended to help readers to develop their own skills for discovering proofs concerning the theory of quantum information.

Distributed Multiple Description Coding - Principles, Algorithms and Systems (Hardcover, 2011): Huihui Bai, Anhong Wang, Yao... Distributed Multiple Description Coding - Principles, Algorithms and Systems (Hardcover, 2011)
Huihui Bai, Anhong Wang, Yao Zhao, Jeng-Shyang Pan, Ajith Abraham
R2,652 Discovery Miles 26 520 Ships in 18 - 22 working days

This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC, transform based MDC, and FEC based MDC; discusses Sleplian-Wolf coding based on Turbo and LDPC respectively, and comparing relative performance; includes original algorithms of MDC and DVC; presents the basic frameworks and experimental results, to help readers improve the efficiency of MDC and DVC; introduces the classical DVC system for mobile communications, providing the developmental environment in detail.

Modern Dimension Reduction (Paperback): Philip D. Waggoner Modern Dimension Reduction (Paperback)
Philip D. Waggoner
R586 Discovery Miles 5 860 Ships in 10 - 15 working days

Data are not only ubiquitous in society, but are increasingly complex both in size and dimensionality. Dimension reduction offers researchers and scholars the ability to make such complex, high dimensional data spaces simpler and more manageable. This Element offers readers a suite of modern unsupervised dimension reduction techniques along with hundreds of lines of R code, to efficiently represent the original high dimensional data space in a simplified, lower dimensional subspace. Launching from the earliest dimension reduction technique principal components analysis and using real social science data, I introduce and walk readers through application of the following techniques: locally linear embedding, t-distributed stochastic neighbor embedding (t-SNE), uniform manifold approximation and projection, self-organizing maps, and deep autoencoders. The result is a well-stocked toolbox of unsupervised algorithms for tackling the complexities of high dimensional data so common in modern society. All code is publicly accessible on Github.

Codebreaker in the Far East (Paperback): Alan Stripp Codebreaker in the Far East (Paperback)
Alan Stripp
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

This is the first book to describe British wartime success in breaking Japanese codes of dazzling variety and great complexity which contributed to the victory in Burma three months before Hiroshima. Written for the general reader, this first-hand account describes the difficulty of decoding one of the most complex languages in the world in some of the most difficult conditions. The book was published in 1989 to avoid proposed legislation which would prohibit those in the security services from publishing secret information.

Generalized Statistical Thermodynamics - Thermodynamics of Probability Distributions and Stochastic Processes (Hardcover, 1st... Generalized Statistical Thermodynamics - Thermodynamics of Probability Distributions and Stochastic Processes (Hardcover, 1st ed. 2018)
Themis Matsoukas
R4,743 Discovery Miles 47 430 Ships in 18 - 22 working days

This book gives the definitive mathematical answer to what thermodynamics really is: a variational calculus applied to probability distributions. Extending Gibbs's notion of ensemble, the Author imagines the ensemble of all possible probability distributions and assigns probabilities to them by selection rules that are fairly general. The calculus of the most probable distribution in the ensemble produces the entire network of mathematical relationships we recognize as thermodynamics. The first part of the book develops the theory for discrete and continuous distributions while the second part applies this thermodynamic calculus to problems in population balance theory and shows how the emergence of a giant component in aggregation, and the shattering transition in fragmentation may be treated as formal phase transitions. While the book is intended as a research monograph, the material is self-contained and the style sufficiently tutorial to be accessible for self-paced study by an advanced graduate student in such fields as physics, chemistry, and engineering.

Real-World Cryptography (Paperback): David Wong Real-World Cryptography (Paperback)
David Wong
R1,325 R1,098 Discovery Miles 10 980 Save R227 (17%) Ships in 5 - 10 working days

If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging science is based on encryption and secure communication using algorithms that are hard to crack even for high-powered computer systems. Cryptography protects privacy, secures online activity, and defends confidential information, such as credit cards, from attackers and thieves. Without cryptographic techniques allowing for easy encrypting and decrypting of data, almost all IT infrastructure would be vulnerable. about the book Real-World Cryptography helps you understand the cryptographic techniques at work in common tools, frameworks, and protocols so you can make excellent security choices for your systems and applications. There's no unnecessary theory or jargon-just the most up-to-date techniques you'll need in your day-to-day work as a developer or systems administrator. Cryptography expert David Wong takes you hands-on with cryptography building blocks such as hash functions and key exchanges, then shows you how to use them as part of your security protocols and applications. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, password-authenticated key exchange, and post-quantum cryptography. Throughout, all techniques are fully illustrated with diagrams and real-world use cases so you can easily see how to put them into practice. what's inside Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Identifying and fixing cryptography bad practices in applications Picking the right cryptographic tool to solve problems about the readerFor cryptography beginners with no previous experience in the field. about the author David Wong is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he's spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, … Hardcover R4,705 Discovery Miles 47 050
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Practical Cryptography
Jamie White Hardcover R3,284 R2,971 Discovery Miles 29 710
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Fundamentals and Applications of…
Joceli Mayer, Paulo V.K. Borges, … Hardcover R2,012 R1,787 Discovery Miles 17 870
Readings from CRYPTOLOGIA on the Enigma…
Brian J. Winkel, Cipher Deavors, … Hardcover R2,798 Discovery Miles 27 980
Python Programming For Beginners In 2020…
James Tudor Hardcover R701 Discovery Miles 7 010
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520

 

Partners