0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Metaverso y NFT - El descubrimiento de la Web 3.0, la inversion en tokens no fungibles, la realidad virtual, el criptojuego y... Metaverso y NFT - El descubrimiento de la Web 3.0, la inversion en tokens no fungibles, la realidad virtual, el criptojuego y el criptoarte (Spanish, Hardcover)
Donn Newman
R797 R669 Discovery Miles 6 690 Save R128 (16%) Ships in 10 - 15 working days
Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R1,765 R1,575 Discovery Miles 15 750 Save R190 (11%) Ships in 5 - 10 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Cryptology - Classical and Modern (Paperback, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Paperback, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R1,363 Discovery Miles 13 630 Ships in 12 - 17 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Michael Friedewald, Melek OEnen, Eva Lievens, Stephan Krenn, Samuel Fricker
R2,530 Discovery Miles 25 300 Ships in 12 - 17 working days

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Street Coder (Paperback): Sedat Kapanoglu Street Coder (Paperback)
Sedat Kapanoglu
R1,335 R1,190 Discovery Miles 11 900 Save R145 (11%) Ships in 12 - 17 working days

Software development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.

Secret History - The Story of Cryptology (Hardcover): Craig P. Bauer Secret History - The Story of Cryptology (Hardcover)
Craig P. Bauer
R2,327 Discovery Miles 23 270 Ships in 12 - 17 working days

Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author-a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History-includes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenere cipher, the one-time pad, transposition ciphers, Jefferson's cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field. Please visit Dr. Bauer's website, which provides access to exercise sets: http://depts.ycp.edu/~cbauer/

Fundamentals of Classical and Modern Error-Correcting Codes (Hardcover): Shu Lin, Juane Li Fundamentals of Classical and Modern Error-Correcting Codes (Hardcover)
Shu Lin, Juane Li
R2,272 Discovery Miles 22 720 Ships in 12 - 17 working days

Using easy-to-follow mathematics, this textbook provides comprehensive coverage of block codes and techniques for reliable communications and data storage. It covers major code designs and constructions from geometric, algebraic, and graph-theoretic points of view, decoding algorithms, error control additive white Gaussian noise (AWGN) and erasure, and dataless recovery. It simplifies a highly mathematical subject to a level that can be understood and applied with a minimum background in mathematics, provides step-by-step explanation of all covered topics, both fundamental and advanced, and includes plenty of practical illustrative examples to assist understanding. Numerous homework problems are included to strengthen student comprehension of new and abstract concepts, and a solutions manual is available online for instructors. Modern developments, including polar codes, are also covered. An essential textbook for senior undergraduates and graduates taking introductory coding courses, students taking advanced full-year graduate coding courses, and professionals working on coding for communications and data storage.

Real-World Cryptography (Paperback): David Wong Real-World Cryptography (Paperback)
David Wong
R1,409 R1,215 Discovery Miles 12 150 Save R194 (14%) Ships in 9 - 15 working days

If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging science is based on encryption and secure communication using algorithms that are hard to crack even for high-powered computer systems. Cryptography protects privacy, secures online activity, and defends confidential information, such as credit cards, from attackers and thieves. Without cryptographic techniques allowing for easy encrypting and decrypting of data, almost all IT infrastructure would be vulnerable. about the book Real-World Cryptography helps you understand the cryptographic techniques at work in common tools, frameworks, and protocols so you can make excellent security choices for your systems and applications. There's no unnecessary theory or jargon-just the most up-to-date techniques you'll need in your day-to-day work as a developer or systems administrator. Cryptography expert David Wong takes you hands-on with cryptography building blocks such as hash functions and key exchanges, then shows you how to use them as part of your security protocols and applications. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, password-authenticated key exchange, and post-quantum cryptography. Throughout, all techniques are fully illustrated with diagrams and real-world use cases so you can easily see how to put them into practice. what's inside Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Identifying and fixing cryptography bad practices in applications Picking the right cryptographic tool to solve problems about the readerFor cryptography beginners with no previous experience in the field. about the author David Wong is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he's spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry.

Procedural Semantics for Hyperintensional Logic - Foundations and Applications of Transparent Intensional Logic (Hardcover,... Procedural Semantics for Hyperintensional Logic - Foundations and Applications of Transparent Intensional Logic (Hardcover, 2010)
Marie Duzi, Bjorn Jespersen, Pavel Materna
R5,759 Discovery Miles 57 590 Ships in 10 - 15 working days

The book is about logical analysis of natural language. Since we humans communicate by means of natural language, we need a tool that helps us to understand in a precise manner how the logical and formal mechanisms of natural language work. Moreover, in the age of computers, we need to communicate both with and through computers as well. Transparent Intensional Logic is a tool that is helpful in making our communication and reasoning smooth and precise. It deals with all kinds of linguistic context in a fully compositional and anti-contextual way.

The Cracking Code Book (Paperback): Simon Singh The Cracking Code Book (Paperback)
Simon Singh 2
R270 R197 Discovery Miles 1 970 Save R73 (27%) Ships in 12 - 17 working days

How to make it, break it, hack it, crack it. The secret history of codes and code breaking. Simon Singh's best-selling title The Code Book now re-issued for the young-adult market. The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Simon Singh brings life to an amazing story of puzzles, codes, languages and riddles -- revealing the continual pursuit to disguise and uncover, and to work out the secret languages of others. Codes have influenced events throughout history, both in the stories of those who make them and those who break them. The betrayal of Mary Queen of Scots and the cracking of the enigma code that helped the Allies in World War II are major episodes in a continuing history of cryptography. In addition to stories of intrigue and warfare, Simon Singh also investigates other codes, the unravelling of genes and the rediscovery of ancient languages and most tantalisingly, the Beale ciphers, an unbroken code that could hold the key to a USD20 million treasure.

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R3,606 Discovery Miles 36 060 Ships in 12 - 17 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

The Theory of Quantum Information (Hardcover): John Watrous The Theory of Quantum Information (Hardcover)
John Watrous
R2,029 Discovery Miles 20 290 Ships in 12 - 17 working days

This largely self-contained book on the theory of quantum information focuses on precise mathematical formulations and proofs of fundamental facts that form the foundation of the subject. It is intended for graduate students and researchers in mathematics, computer science, and theoretical physics seeking to develop a thorough understanding of key results, proof techniques, and methodologies that are relevant to a wide range of research topics within the theory of quantum information and computation. The book is accessible to readers with an understanding of basic mathematics, including linear algebra, mathematical analysis, and probability theory. An introductory chapter summarizes these necessary mathematical prerequisites, and starting from this foundation, the book includes clear and complete proofs of all results it presents. Each subsequent chapter includes challenging exercises intended to help readers to develop their own skills for discovering proofs concerning the theory of quantum information.

Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth... Codes, Graphs, and Systems - A Celebration of the Life and Career of G. David Forney, Jr. on the Occasion of his Sixtieth Birthday (Hardcover, 2002 ed.)
Richard E Blahut, Ralf Koetter
R4,365 Discovery Miles 43 650 Ships in 12 - 17 working days

Foreword by James L. Massey.
Codes, Graphs, and Systems is an excellent reference for both academic researchers and professional engineers working in the fields of communications and signal processing. A collection of contributions from world-renowned experts in coding theory, information theory, and signal processing, the book provides a broad perspective on contemporary research in these areas. Survey articles are also included. Specific topics covered include convolutional codes and turbo codes; detection and equalization; modems; physics and information theory; lattices and geometry; and behaviors and codes on graphs.
Codes, Graphs, and Systems is a tribute to the leadership and profound influence of G. David Forney, Jr. The 35 contributors to the volume have assembled their work in his honor.

Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings... Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (Hardcover, 2012 ed.)
Theo Dimitrakos, Rajat Moona, Dhiren, Patel, D. Harrison McKnight
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.

Real Life Cryptology - Ciphers and Secrets in Early Modern Hungary (Hardcover, 0): Benedek Lang Real Life Cryptology - Ciphers and Secrets in Early Modern Hungary (Hardcover, 0)
Benedek Lang
R3,308 Discovery Miles 33 080 Ships in 12 - 17 working days

A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of YprivateOE applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Hardcover, New): David Kahn How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code (Hardcover, New)
David Kahn
R1,262 Discovery Miles 12 620 Ships in 12 - 17 working days

Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.

Codebreaker in the Far East (Paperback): Alan Stripp Codebreaker in the Far East (Paperback)
Alan Stripp
R1,324 Discovery Miles 13 240 Ships in 12 - 17 working days

This is the first book to describe British wartime success in breaking Japanese codes of dazzling variety and great complexity which contributed to the victory in Burma three months before Hiroshima. Written for the general reader, this first-hand account describes the difficulty of decoding one of the most complex languages in the world in some of the most difficult conditions. The book was published in 1989 to avoid proposed legislation which would prohibit those in the security services from publishing secret information.

Distributed Multiple Description Coding - Principles, Algorithms and Systems (Hardcover, 2011): Huihui Bai, Anhong Wang, Yao... Distributed Multiple Description Coding - Principles, Algorithms and Systems (Hardcover, 2011)
Huihui Bai, Anhong Wang, Yao Zhao, Jeng-Shyang Pan, Ajith Abraham
R2,787 Discovery Miles 27 870 Ships in 10 - 15 working days

This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC, transform based MDC, and FEC based MDC; discusses Sleplian-Wolf coding based on Turbo and LDPC respectively, and comparing relative performance; includes original algorithms of MDC and DVC; presents the basic frameworks and experimental results, to help readers improve the efficiency of MDC and DVC; introduces the classical DVC system for mobile communications, providing the developmental environment in detail.

Radical transparency and digital democracy - Wikileaks and beyond (Hardcover): Luke Heemsbergen Radical transparency and digital democracy - Wikileaks and beyond (Hardcover)
Luke Heemsbergen
R2,466 Discovery Miles 24 660 Ships in 12 - 17 working days

This book tells the story of radical transparency in a datafied world. It is a story that not only includes the beginnings of WikiLeaks and its endings as a weapon of the GRU, but also exposes numerous other decentralised disclosure networks designed to crack open democracy - for good or ill - that followed in its wake. This is a story that can only be understood through rethinking how technologies of government, practices of media, and assumptions of democracy interact. By combining literatures of governmentality, media studies, and democracy, this illuminating account offers novel insights and critiques of the transparency ideal through its material-political practice. Case studies uncover evolving media practices that, regardless of being scraped from public records or leaked from internal sources, still divulge secrets. The narrative also traces new corporate players such as Clearview AI, the civic-minded ICIJ, and state-based public health disclosures in times of pandemic to reveal how they all form unique proto-institutional instances of disclosure as a technology of government. The analysis of novel forms of digital radical transparency - from a trickle of paper-based leaks to the modern digital .torrent - is grounded in analogues from the analogue past, which combine to tell the whole story of how transparency functions in and helps form democracy.

Adaptive Inventories - A Practical Guide for Applied Researchers (Paperback): Jacob M. Montgomery, Erin L. Rossiter Adaptive Inventories - A Practical Guide for Applied Researchers (Paperback)
Jacob M. Montgomery, Erin L. Rossiter
R522 Discovery Miles 5 220 Ships in 12 - 17 working days

The goal of this Element is to provide a detailed introduction to adaptive inventories, an approach to making surveys adjust to respondents' answers dynamically. This method can help survey researchers measure important latent traits or attitudes accurately while minimizing the number of questions respondents must answer. The Element provides both a theoretical overview of the method and a suite of tools and tricks for integrating it into the normal survey process. It also provides practical advice and direction on how to calibrate, evaluate, and field adaptive batteries using example batteries that measure variety of latent traits of interest to survey researchers across the social sciences.

Practical Cryptography (Hardcover): Jamie White Practical Cryptography (Hardcover)
Jamie White
R3,565 R3,127 Discovery Miles 31 270 Save R438 (12%) Ships in 10 - 15 working days
Information Theory - Poincare Seminar 2018 (Paperback, 1st ed. 2021): Bertrand Duplantier, Vincent Rivasseau Information Theory - Poincare Seminar 2018 (Paperback, 1st ed. 2021)
Bertrand Duplantier, Vincent Rivasseau
R3,488 Discovery Miles 34 880 Ships in 10 - 15 working days

This eighteenth volume in the Poincare Seminar Series provides a thorough description of Information Theory and some of its most active areas, in particular, its relation to thermodynamics at the nanoscale and the Maxwell Demon, and the emergence of quantum computation and of its counterpart, quantum verification. It also includes two introductory tutorials, one on the fundamental relation between thermodynamics and information theory, and a primer on Shannon's entropy and information theory. The book offers a unique and manifold perspective on recent mathematical and physical developments in this field.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Paperback, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,771 Discovery Miles 27 710 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24,... ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Paperback, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
R4,038 Discovery Miles 40 380 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Information Technology in Disaster Risk Reduction - 5th IFIP WG 5.15 International Conference, ITDRR 2020, Sofia, Bulgaria,... Information Technology in Disaster Risk Reduction - 5th IFIP WG 5.15 International Conference, ITDRR 2020, Sofia, Bulgaria, December 3-4, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Yuko Murayama, Dimiter Velev, Plamena Zlateva
R2,080 Discovery Miles 20 800 Ships in 10 - 15 working days

This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,473 Discovery Miles 24 730
Python Programming For Beginners In 2020…
James Tudor Hardcover R678 Discovery Miles 6 780
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,177 Discovery Miles 31 770
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R1,968 R1,559 Discovery Miles 15 590
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R875 Discovery Miles 8 750

 

Partners