0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,945)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Cryptology - Classical and Modern (Paperback, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Paperback, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R1,563 Discovery Miles 15 630 Ships in 12 - 19 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

Protocols for Authentication and Key Establishment (Hardcover, 2003 ed.): Colin Boyd, Anish Mathuria Protocols for Authentication and Key Establishment (Hardcover, 2003 ed.)
Colin Boyd, Anish Mathuria
R2,908 Discovery Miles 29 080 Ships in 10 - 15 working days

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6... Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation - IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2020, Tiruchirappalli, India, December 18-19, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Sujeet K. Sharma, Yogesh K. Dwivedi, Bhimaraya Metri, Nripendra P. Rana
R4,703 Discovery Miles 47 030 Ships in 10 - 15 working days

This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020.The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems

Let's Calculate Bach - Applying Information Theory and Statistics to Numbers in Music (Paperback, 1st ed. 2021): Alan... Let's Calculate Bach - Applying Information Theory and Statistics to Numbers in Music (Paperback, 1st ed. 2021)
Alan Shepherd
R4,130 Discovery Miles 41 300 Ships in 10 - 15 working days

This book shows how information theory, probability, statistics, mathematics and personal computers can be applied to the exploration of numbers and proportions in music. It brings the methods of scientific and quantitative thinking to questions like: What are the ways of encoding a message in music and how can we be sure of the correct decoding? How do claims of names hidden in the notes of a score stand up to scientific analysis? How many ways are there of obtaining proportions and are they due to chance? After thoroughly exploring the ways of encoding information in music, the ambiguities of numerical alphabets and the words to be found "hidden" in a score, the book presents a novel way of exploring the proportions in a composition with a purpose-built computer program and gives example results from the application of the techniques. These include information theory, combinatorics, probability, hypothesis testing, Monte Carlo simulation and Bayesian networks, presented in an easily understandable form including their development from ancient history through the life and times of J. S. Bach, making connections between science, philosophy, art, architecture, particle physics, calculating machines and artificial intelligence. For the practitioner the book points out the pitfalls of various psychological fallacies and biases and includes succinct points of guidance for anyone involved in this type of research. This book will be useful to anyone who intends to use a scientific approach to the humanities, particularly music, and will appeal to anyone who is interested in the intersection between the arts and science.With a foreword by Ruth Tatlow (Uppsala University), award winning author of Bach's Numbers: Compositional Proportion and Significance and Bach and the Riddle of the Number Alphabet."With this study Alan Shepherd opens a much-needed examination of the wide range of mathematical claims that have been made about J. S. Bach's music, offering both tools and methodological cautions with the potential to help clarify old problems." Daniel R. Melamed, Professor of Music in Musicology, Indiana University

Contact Tracing in Post-Covid World - A Cryptologic Approach (Paperback, 1st ed. 2020): Pranab Chakraborty, Subhamoy Maitra,... Contact Tracing in Post-Covid World - A Cryptologic Approach (Paperback, 1st ed. 2020)
Pranab Chakraborty, Subhamoy Maitra, Mridul Nandi, Suprita Talnikar
R3,569 Discovery Miles 35 690 Ships in 10 - 15 working days

This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.

Information and Communication Technologies for Development - 16th IFIP WG 9.4 International Conference on Social Implications... Information and Communication Technologies for Development - 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, Manchester, UK, June 10-11, 2020, Proceedings (Paperback, 1st ed. 2020)
Julian M. Bass, P.J. Wall
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, which was supposed to be held in Salford, UK, in June 2020, but was held virtually instead due to the COVID-19 pandemic. The 18 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.

Estimating Functional Connectivity and Topology in Large-Scale Neuronal Assemblies - Statistical and Computational Methods... Estimating Functional Connectivity and Topology in Large-Scale Neuronal Assemblies - Statistical and Computational Methods (Paperback, 1st ed. 2021)
Vito Paolo Pastore
R4,293 Discovery Miles 42 930 Ships in 10 - 15 working days

This book describes a set of novel statistical algorithms designed to infer functional connectivity of large-scale neural assemblies. The algorithms are developed with the aim of maximizing computational accuracy and efficiency, while faithfully reconstructing both the inhibitory and excitatory functional links. The book reports on statistical methods to compute the most significant functional connectivity graph, and shows how to use graph theory to extract the topological features of the computed network. A particular feature is that the methods used and extended at the purpose of this work are reported in a fairly completed, yet concise manner, together with the necessary mathematical fundamentals and explanations to understand their application. Furthermore, all these methods have been embedded in the user-friendly open source software named SpiCoDyn, which is also introduced here. All in all, this book provides researchers and graduate students in bioengineering, neurophysiology and computer science, with a set of simplified and reduced models for studying functional connectivity in in silico biological neuronal networks, thus overcoming the complexity of brain circuits.

Information Theory - Poincare Seminar 2018 (Paperback, 1st ed. 2021): Bertrand Duplantier, Vincent Rivasseau Information Theory - Poincare Seminar 2018 (Paperback, 1st ed. 2021)
Bertrand Duplantier, Vincent Rivasseau
R3,590 Discovery Miles 35 900 Ships in 10 - 15 working days

This eighteenth volume in the Poincare Seminar Series provides a thorough description of Information Theory and some of its most active areas, in particular, its relation to thermodynamics at the nanoscale and the Maxwell Demon, and the emergence of quantum computation and of its counterpart, quantum verification. It also includes two introductory tutorials, one on the fundamental relation between thermodynamics and information theory, and a primer on Shannon's entropy and information theory. The book offers a unique and manifold perspective on recent mathematical and physical developments in this field.

ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September... ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Paperback, 1st ed. 2020)
Marko Hoelbl, Kai Rannenberg, Tatjana Welzer
R3,415 Discovery Miles 34 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.

Advances in Production Management Systems. Towards Smart and Digital Manufacturing - IFIP WG 5.7 International Conference, APMS... Advances in Production Management Systems. Towards Smart and Digital Manufacturing - IFIP WG 5.7 International Conference, APMS 2020, Novi Sad, Serbia, August 30 - September 3, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Bojan Lalic, Vidosav Majstorovic, Ugljesa Marjanovic, Gregor von Cieminski, David Romero
R3,022 Discovery Miles 30 220 Ships in 10 - 15 working days

The two-volume set IFIP AICT 591 and 592 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2020, held in Novi Sad, Serbia, in August/September 2020. The 164 papers presented were carefully reviewed and selected from 199 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: Part I: advanced modelling, simulation and data analytics in production and supply networks; advanced, digital and smart manufacturing; digital and virtual quality management systems; cloud-manufacturing; cyber-physical production systems and digital twins; IIOT interoperability; supply chain planning and optimization; digital and smart supply chain management; intelligent logistics networks management; artificial intelligence and blockchain technologies in logistics and DSN; novel production planning and control approaches; machine learning and artificial intelligence; connected, smart factories of the future; manufacturing systems engineering: agile, flexible, reconfigurable; digital assistance systems: augmented reality and virtual reality; circular products design and engineering; circular, green, sustainable manufacturing; environmental and social lifecycle assessments; socio-cultural aspects in production systems; data-driven manufacturing and services operations management; product-service systems in DSN; and collaborative design and engineering Part II: the Operator 4.0: new physical and cognitive evolutionary paths; digital transformation approaches in production management; digital transformation for more sustainable supply chains; data-driven applications in smart manufacturing and logistics systems; data-driven services: characteristics, trends and applications; the future of lean thinking and practice; digital lean manufacturing and its emerging practices; new reconfigurable, flexible or agile production systems in the era of industry 4.0; operations management in engineer-to-order manufacturing; production management in food supply chains; gastronomic service system design; product and asset life cycle management in the circular economy; and production ramp-up strategies for product

Advances in Production Management Systems. The Path to Digital Transformation and Innovation of Production Management Systems -... Advances in Production Management Systems. The Path to Digital Transformation and Innovation of Production Management Systems - IFIP WG 5.7 International Conference, APMS 2020, Novi Sad, Serbia, August 30 - September 3, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Bojan Lalic, Vidosav Majstorovic, Ugljesa Marjanovic, Gregor von Cieminski, David Romero
R2,999 Discovery Miles 29 990 Ships in 10 - 15 working days

The two-volume set IFIP AICT 591 and 592 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2020, held in Novi Sad, Serbia, in August/September 2020.The 164 papers presented were carefully reviewed and selected from 199 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: Part I: advanced modelling, simulation and data analytics in production and supply networks; advanced, digital and smart manufacturing; digital and virtual quality management systems; cloud-manufacturing; cyber-physical production systems and digital twins; IIOT interoperability; supply chain planning and optimization; digital and smart supply chain management; intelligent logistics networks management; artificial intelligence and blockchain technologies in logistics and DSN; novel production planning and control approaches; machine learning and artificial intelligence; connected, smart factories of the future; manufacturing systems engineering: agile, flexible, reconfigurable; digital assistance systems: augmented reality and virtual reality; circular products design and engineering; circular, green, sustainable manufacturing; environmental and social lifecycle assessments; socio-cultural aspects in production systems; data-driven manufacturing and services operations management; product-service systems in DSN; and collaborative design and engineering Part II: the Operator 4.0: new physical and cognitive evolutionary paths; digital transformation approaches in production management; digital transformation for more sustainable supply chains; data-driven applications in smart manufacturing and logistics systems; data-driven services: characteristics, trends and applications; the future of lean thinking and practice; digital lean manufacturing and its emerging practices; new reconfigurable, flexible or agile production systems in the era of industry 4.0; operations management in engineer-to-order manufacturing; production management in food supply chains; gastronomic service system design; product and asset life cycle management in the circular economy; and production ramp-up strategies for product

Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings (Paperback, 1st ed. 2020)
Nathan Clarke, Steven Furnell
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Empowering Teaching for Digital Equity and Agency - IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, Mumbai,... Empowering Teaching for Digital Equity and Agency - IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, Mumbai, India, January 6-8, 2020, Proceedings (Paperback, 1st ed. 2020)
Torsten Brinda, Don Passey, Therese Keane
R2,833 Discovery Miles 28 330 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, held in Mumbai, India, in January 2020. The 11 full papers and 4 short papers included in this volume were carefully reviewed and selected from 57 submissions. The papers discuss key emerging topics and evolving practices in the area of educational computing research. They are organized in the following topical sections: computing education; learners' and teachers' perspectives; teacher professional development; the industry perspective; and further aspects.

Microelectronic Devices, Circuits and Systems - Second International Conference, ICMDCS 2021, Vellore, India, February 11-13,... Microelectronic Devices, Circuits and Systems - Second International Conference, ICMDCS 2021, Vellore, India, February 11-13, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
V. Arunachalam, K. Sivasankaran
R2,933 Discovery Miles 29 330 Ships in 10 - 15 working days

This book constitutes selected papers from the Second International Conference on Microelectronic Devices, Circuits and Systems, ICMDCS 2021, held in Vellore, India, in February 2021. The 32 full papers and 6 short papers presented were thoroughly reviewed and selected from 103 submissions. They are organized in the topical sections on digital design for signal, image and video processing; VLSI testing and verification; emerging technologies and IoT; nano-scale modelling and process technology device; analog and mixed signal design; communication technologies and circuits; technology and modelling for micro electronic devices; electronics for green technology.

Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D -... Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D - 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1-3, 2019, Proceedings, Part I (Hardcover, 1st ed. 2019)
Petter Nielsen, Honest Christopher Kimaro
R3,055 Discovery Miles 30 550 Ships in 10 - 15 working days

The two volumes IFIP AICT 551 and 552 constitute the refereed proceedings of the 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, held in Dar es Salaam, Tanzania, in May 2019. The 97 revised full papers and 2 short papers presented were carefully reviewed and selected from 185 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: communities, ICT-enabled networks, and development; digital platforms for development; ICT for displaced population and refugees. How it helps? How it hurts?; ICT4D for the indigenous, by the indigenous and of the indigenous; local technical papers; pushing the boundaries - new research methods, theory and philosophy in ICT4D; southern-driven human-computer interaction; sustainable ICT, informatics, education and learning in a turbulent world - "doing the safari way".

The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020): Joan Daemen, Vincent Rijmen The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020)
Joan Daemen, Vincent Rijmen
R4,596 Discovery Miles 45 960 Ships in 10 - 15 working days

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.

Security and Privacy - Select Proceedings of ICSP 2020 (Paperback, 1st ed. 2021): Pantelimon Stanica, Sugata Gangopadhyay,... Security and Privacy - Select Proceedings of ICSP 2020 (Paperback, 1st ed. 2021)
Pantelimon Stanica, Sugata Gangopadhyay, Sumit Kumar Debnath
R2,843 Discovery Miles 28 430 Ships in 10 - 15 working days

This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

Simulation Tools and Techniques - 12th EAI International Conference, SIMUtools 2020, Guiyang, China, August 28-29, 2020,... Simulation Tools and Techniques - 12th EAI International Conference, SIMUtools 2020, Guiyang, China, August 28-29, 2020, Proceedings, Part II (Paperback, 1st ed. 2021)
Houbing Song, Dingde Jiang
R5,235 Discovery Miles 52 350 Ships in 10 - 15 working days

This two-volume set constitutes the refereed post-conference proceedings of the 12th International Conference on Simulation Tools and Techniques, SIMUTools 2020, held in Guiyang, China, in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 125 revised full papers were carefully selected from 354 submissions. The papers focus on simulation methods, simulation techniques, simulation software, simulation performance, modeling formalisms, simulation verification and widely used frameworks.

Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical... Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, Costa de Caparica, Portugal, July 1-3, 2020, Proceedings (Paperback, 1st ed. 2020)
Luis M. Camarinha-Matos, Nastaran Farhadi, Fabio Lopes, Helena Pereira
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020. The 20 full papers and 24 short papers presented were carefully reviewed and selected from 91 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; decisions systems; analysis and synthesis algorithms; communication systems; optimization systems; digital twins and smart manufacturing; power systems; energy control; power transportation; biomedical analysis and diagnosis; and instrumentation in health.

Information Technology in Disaster Risk Reduction - 4th IFIP TC 5 DCITDRR International Conference, ITDRR 2019, Kyiv, Ukraine,... Information Technology in Disaster Risk Reduction - 4th IFIP TC 5 DCITDRR International Conference, ITDRR 2019, Kyiv, Ukraine, October 9-10, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Yuko Murayama, Dimiter Velev, Plamena Zlateva
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, and disaster risk assessment and management.

Real-World Cryptography (Paperback): David Wong Real-World Cryptography (Paperback)
David Wong
R1,331 Discovery Miles 13 310 Ships in 12 - 19 working days

If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging science is based on encryption and secure communication using algorithms that are hard to crack even for high-powered computer systems. Cryptography protects privacy, secures online activity, and defends confidential information, such as credit cards, from attackers and thieves. Without cryptographic techniques allowing for easy encrypting and decrypting of data, almost all IT infrastructure would be vulnerable. about the book Real-World Cryptography helps you understand the cryptographic techniques at work in common tools, frameworks, and protocols so you can make excellent security choices for your systems and applications. There's no unnecessary theory or jargon-just the most up-to-date techniques you'll need in your day-to-day work as a developer or systems administrator. Cryptography expert David Wong takes you hands-on with cryptography building blocks such as hash functions and key exchanges, then shows you how to use them as part of your security protocols and applications. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, password-authenticated key exchange, and post-quantum cryptography. Throughout, all techniques are fully illustrated with diagrams and real-world use cases so you can easily see how to put them into practice. what's inside Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Identifying and fixing cryptography bad practices in applications Picking the right cryptographic tool to solve problems about the readerFor cryptography beginners with no previous experience in the field. about the author David Wong is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he's spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry.

Forward Error Correction via Channel Coding (Hardcover, 1st ed. 2020): Orhangazi Forward Error Correction via Channel Coding (Hardcover, 1st ed. 2020)
Orhangazi
R2,915 Discovery Miles 29 150 Ships in 10 - 15 working days

This book provides a comprehensive explanation of forward error correction, which is a vital part of communication systems. The book is written in such a way to make the subject easy and understandable for the reader. The book starts with a review of linear algebra to provide a basis for the text. The author then goes on to cover linear block codes, syndrome error correction, cyclic codes, Galois fields, BCH codes, Reed Solomon codes, and convolutional codes. Examples are provided throughout the text.

Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R1,862 Discovery Miles 18 620 Ships in 12 - 19 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Wireless and Satellite Systems - 11th EAI International Conference, WiSATS 2020, Nanjing, China, September 17-18, 2020,... Wireless and Satellite Systems - 11th EAI International Conference, WiSATS 2020, Nanjing, China, September 17-18, 2020, Proceedings, Part I (Paperback, 1st ed. 2021)
Qihui Wu, Kanglian Zhao, Xiaojin Ding
R2,939 Discovery Miles 29 390 Ships in 10 - 15 working days

This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020. The 91 full papers and workshop papers were carefully reviewed and selected from 200 submissions. Part I - LNICST 357 - details original research and results of wireless and satellite technology for a smarter global communication architecture. The theme of WISATS 2020 is "Intelligent Wireless and Satellite Communications for Beyond 5G". Part II - LNICST 358 - presents 6 workshop papers: High Speed Space Communication and Space Information Networks (HSSCSIN); Integrated Space and Onboard Networks (ISON); Intelligent Satellite Operations, Managements, and Applications (ISOMA); Intelligent Satellites in Future Space Networked System (ISFSNS); Satellite Communications, Networking and Applications (SCNA); Satellite Internet of Things; Trusted Data Sharing, Secure Communication (SIOTTDSSC).

Artificial Intelligence for Communications and Networks - Second EAI International Conference, AICON 2020, Virtual Event,... Artificial Intelligence for Communications and Networks - Second EAI International Conference, AICON 2020, Virtual Event, December 19-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Shuo Shi, Liang Ye, Yu Zhang
R2,969 Discovery Miles 29 690 Ships in 10 - 15 working days

This book constitutes the post-conference proceedings of the Second EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2020, held in December 2020. Due to COVID-19 pandemic the conference was held virtually.The 52 full papers were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Deep Learning/Machine Learning on Information and Signal Processing; AI in Ubiquitous Mobile Wireless Communications; AI in UAV-assisted wireless communications; Smart Education: Educational Change in the age of artificial Intelligence; AI in SAR/ISAR Target Detection; Recent advances in AI and their applications in future electronic and information field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mastering Risk Modelling - A Practical…
Alastair Day Paperback R1,671 Discovery Miles 16 710
MOS 2016 Study Guide for Microsoft Excel…
Paul McFedries Paperback R557 R486 Discovery Miles 4 860
Excel 2021 / Microsoft 365 Programming…
Julitta Korol Paperback R1,560 R1,312 Discovery Miles 13 120
Excel 2019 Bible
M. Alexander Paperback  (1)
R1,541 R1,131 Discovery Miles 11 310
Excel Dashboards and Reports, 2nd…
M. Alexander Paperback R851 R690 Discovery Miles 6 900
Financial Modelling and Asset Valuation…
Morten Helbaek, Ragnar Lovaas, … Paperback R2,847 Discovery Miles 28 470
Excel 2013 Power Programming with VBA
J Walkenbach Paperback R1,111 Discovery Miles 11 110
The Shelly Cashman Series (R) Microsoft…
Steven Freund, Joy Starks Paperback R1,538 R1,421 Discovery Miles 14 210
Statistics for Managers Using Microsoft…
David Levine, David Stephan, … Paperback R2,727 Discovery Miles 27 270
Translation and Adaptation in Theatre…
Katja Krebs Hardcover R4,931 Discovery Miles 49 310

 

Partners