0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Inside Blockchain, Bitcoin, and Cryptocurrencies (Hardcover): Niaz Chowdhury Inside Blockchain, Bitcoin, and Cryptocurrencies (Hardcover)
Niaz Chowdhury
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book covers blockchain from the underlying principles to how it enables applications to survive and surf on its shoulder. Having covered the fundamentals of blockchain, the book turns to cryptocurrency. It thoroughly examines Bitcoin before presenting six other major currencies in a rounded discussion. The book then bridges between technology and finance, concentrating on how blockchain-based applications, including cryptocurrencies, have pushed hard against mainstream industries in a bid to cement their positions permanent. It discusses blockchain as underlying banking technology, crypto mining and offering, cryptocurrency as investment instruments, crypto regulations, and markets.

Programming with Types (Paperback): Vlad Riscutia Programming with Types (Paperback)
Vlad Riscutia
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days

Summary Programming with Types teaches you to design safe, resilient, correct software that's easy to maintain and understand by taking advantage of the power of strong type systems. Designed to provide practical, instantly useful techniques for working developers, this clearly written tutorial introduces you to using type systems to support everyday programming tasks. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Common bugs often result from mismatched data types. By precisely naming and controlling which data are allowable in a calculation, a strong type system can eliminate whole classes of errors and ensure data integrity throughout an application. As a developer, skillfully using types in your everyday practice leads to better code and saves time tracking down tricky data-related errors. About the book Programming with Types teaches type-based techniques for writing software that's safe, correct, easy to maintain, and practically self-documenting. Designed for working developers, this clearly written tutorial sticks with the practical benefits of type systems for everyday programming tasks. Following real-world examples coded in TypeScript, you'll build your skills from primitive types up to more-advanced concepts like functors and monads. What's inside Building data structures with primitive types, arrays, and references How types affect functions, inheritance, and composition Object-oriented programming with types Applying generics and higher-kinded types About the reader You'll need experience with a mainstream programming language like TypeScript, Java, JavaScript, C#, or C++. About the author Vlad Riscutia is a principal software engineer at Microsoft. He has headed up several major software projects and mentors up-and-coming software engineers.

Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part II... Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Amos Beimel, Stefan Dziembowski
R1,531 Discovery Miles 15 310 Ships in 18 - 22 working days

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised... Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Huanguo Zhang, Bo Zhao, Fei Yan
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.

Enigma: How Breaking the Code Helped Win World War II (Hardcover): Michael Kerrigan Enigma: How Breaking the Code Helped Win World War II (Hardcover)
Michael Kerrigan
R606 R547 Discovery Miles 5 470 Save R59 (10%) Ships in 9 - 17 working days

At its peak in January 1945, 10,000 people worked at Bletchley Park, reading 4000 messages a day, decrypting German and Japanese communications and helping the Allies to victory. But while we know that Bletchley was the centre of Britain's World War II code-breaking, how did its efforts actually change the course of the war? Enigma: How Breaking the Code Helped Win World War II tells the story of Bletchley's role in defeating U-boats in the Atlantic, breaking the Japanese codes, helping the Allies to victory in North Africa, deciphering the German military intelligence code, learning of most German positions in western Europe before the Normandy Landings, defeating the Italian Navy in the Mediterranean, and helping sink the German battleship Scharnhorst off Norway. In tracing these events, the book also delves into the stories of major Bletchley characters, 'boffins' such as Alan Turing and Gordon Welchman, and 'Debs' such as Joan Clarke and Margaret Rock. An accessible work of military history that ranges across air, land and naval warfare, the book also touches on the story of early computer science. Illustrated with 120 black-&-white and colour photographs, artworks and maps, Enigma: How Breaking the Code Helped Win World War II is an authoritative and novel perspective on WWII history.

Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018,... Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings (Paperback, 1st ed. 2018)
Bart Preneel, Frederik Vercauteren
R2,771 Discovery Miles 27 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

Ada Lovelace Cracks the Code (Hardcover): Rebel Girls Ada Lovelace Cracks the Code (Hardcover)
Rebel Girls; Edited by Jestine Ware; Illustrated by Marina Muun 1
R291 R265 Discovery Miles 2 650 Save R26 (9%) Ships in 9 - 17 working days

In Ada Lovelace Cracks the Code, Ada uses her incredible imagination to dream up technology that could have jump-started the digital age nearly two hundred years ago. In fact, she writes what will become the world's first programming language. As a child, Ada is curious about everything. She is obsessed with machines and creatures that fly, even going so far as to write her own book about them called "Flyology." Along with her cat, Mistress Puff, Ada gets into all sorts of trouble. According to her mother, Ada is a bit too wild and her imagination could benefit from some discipline, so she puts Ada into a rigorous syllabus of mathematics, languages, and geography. When Ada comes out in London's high society, she is invited to the most popular soiree in town, hosted by the renowned inventor Charles Babbage. It is there that she encounters a mysterious machine which unlocks a future full of possibilities. But she can't escape marriage forever, and soon finds herself a wife with three children. She aches to study math again, to stand on the same ground as the eccentric inventor she met so many years ago. She hires tutors to teach her absolutely everything about math and numbers, before joining Babbage in his mechanical world. This is the story of a pioneer in the computer sciences, which is now a multibillion-dollar industry, but it's also proof that women have the intellectual capacity to make invaluable contributions to the Science Technology Engineering & Math world. Also included is further information on Ada's legacy today and activities based on simple coding and mathematical concepts.

Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 18th International Conference, NEW2AN 2018, and... Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27-29, 2018, Proceedings (Paperback, 1st ed. 2018)
Olga Galinina, Sergey Andreev, Sergey Balandin, Yevgeni Koucheryavy
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018. The 64 revised full papers presented were carefully reviewed and selected from 186 submissions. The papers of NEW2AN focus on advanced wireless networking and applications; lower-layer communication enablers; novel and innovative approaches to performance and efficiency analysis of ad-hoc and machine-type systems; employed game-theoretical formulations, Markov chain models, and advanced queuing theory; grapheme and other emerging material, photonics and optics; generation and processing of signals; and business aspects. The ruSMART papers deal with fully-customized applications and services.

Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece,... Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings (Paperback, 1st ed. 2018)
Gerhard P Hancke, Ernesto Damiani
R1,899 Discovery Miles 18 990 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.

Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Serge Fehr
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Lattices Applied to Coding for Reliable and Secure Communications (Paperback, 1st ed. 2017): Sueli I. R. Costa, Frederique... Lattices Applied to Coding for Reliable and Secure Communications (Paperback, 1st ed. 2017)
Sueli I. R. Costa, Frederique Oggier, Antonio Campello, Jean-Claude Belfiore, Emanuele Viterbo
R1,634 Discovery Miles 16 340 Ships in 18 - 22 working days

This book provides a first course on lattices - mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematicians for their structure and, at the same time, are used by electrical and computer engineers working on coding theory and cryptography. The book presents both fundamental concepts and a wealth of applications, including coding and transmission over Gaussian channels, techniques for obtaining lattices from finite prime fields and quadratic fields, constructions of spherical codes, and hard lattice problems used in cryptography. The topics selected are covered in a level of detail not usually found in reference books. As the range of applications of lattices continues to grow, this work will appeal to mathematicians, electrical and computer engineers, and graduate or advanced undergraduate in these fields.

Ubiquitous Communications and Network Computing - First International Conference, UBICNET 2017, Bangalore, India, August 3-5,... Ubiquitous Communications and Network Computing - First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedings (Paperback, 1st ed. 2018)
Navin Kumar, Arpita Thakre
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Ubiquitous Communications and Network Computing, UBICNET 2017, held in Bangalore, India, in August 2017. The 23 full papers were selected from 71 submissions and are grouped in topical sections on safety and energy efficient computing, cloud computing and mobile commerce, advanced and software defined networks, and advanced communication systems and networks.

Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings,... Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Martin Hirt, Adam Smith
R2,936 Discovery Miles 29 360 Ships in 18 - 22 working days

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.

Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings,... Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Martin Hirt, Adam Smith
R1,519 Discovery Miles 15 190 Ships in 18 - 22 working days

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.

Channel Coding Techniques for Wireless Communications (Paperback, Softcover reprint of the original 1st ed. 2015): K. Deergha... Channel Coding Techniques for Wireless Communications (Paperback, Softcover reprint of the original 1st ed. 2015)
K. Deergha Rao
R4,135 Discovery Miles 41 350 Ships in 18 - 22 working days

The book discusses modern channel coding techniques for wireless communications such as turbo codes, low parity check codes (LDPC), space-time coding, Reed Solomon (RS) codes and convolutional codes. Many illustrative examples are included in each chapter for easy understanding of the coding techniques. The text is integrated with MATLAB-based programs to enhance the understanding of the subject's underlying theories. It includes current topics of increasing importance such as turbo codes, LDPC codes, LT codes, Raptor codes and space-time coding in detail, in addition to the traditional codes such as cyclic codes, BCH and RS codes and convolutional codes. MIMO communications is a multiple antenna technology, which is an effective method for high-speed or high-reliability wireless communications. PC-based MATLAB m-files for the illustrative examples are included and also provided on the accompanying CD, which will help students and researchers involved in advanced and current concepts in coding theory. Channel coding, the core of digital communication and data storage, has undergone a major revolution as a result of the rapid growth of mobile and wireless communications. The book is divided into 11 chapters. Assuming no prior knowledge in the field of channel coding, the opening chapters (1 - 2) begin with basic theory and discuss how to improve the performance of wireless communication channels using channel coding. Chapters 3 and 4 introduce Galois fields and present detailed coverage of BCH codes and Reed-Solomon codes. Chapters 5-7 introduce the family of convolutional codes, hard and soft-decision Viterbi algorithms, turbo codes, BCJR algorithm for turbo decoding and studies trellis coded modulation (TCM), turbo trellis coded modulation (TTCM), bit-interleaved coded modulation (BICM) as well as iterative BICM (BICM-ID) and compares them under various channel conditions. Chapters 8 and 9 focus on low-density parity-check (LDPC) codes, LT codes and Raptor codes. Chapters 10 and 11 discuss MIMO systems and space-time (ST) coding.

Smart Secure Systems - IoT and Analytics Perspective - Second International Conference on Intelligent Information Technologies.... Smart Secure Systems - IoT and Analytics Perspective - Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings (Paperback, 1st ed. 2018)
Guru Prasadh Venkataramani, Karthik Sankaranarayanan, Saswati Mukherjee, Kannan Arputharaj, Swamynathan Sankara Narayanan
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017. The 20 full papers and 7 short papers presented were carefully reviewed and selected from 117 submissions. They feature research on the Internet of Things (IoT) and are organized in the following topical sections: IoT enabling technologies; IoT security; social IoT; web of things; and IoT services and applications.

Communication Networks for Smart Grids - Making Smart Grid Real (Paperback, Softcover reprint of the original 1st ed. 2014):... Communication Networks for Smart Grids - Making Smart Grid Real (Paperback, Softcover reprint of the original 1st ed. 2014)
Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
R2,725 Discovery Miles 27 250 Ships in 18 - 22 working days

This book presents an application-centric approach to the development of smart grid communication architecture. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response and synchrophasors. Features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of WANs and FANs; explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings (Paperback, 1st ed. 2017)
Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo
R2,808 Discovery Miles 28 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications SCS 2017: The Third International Symposium on Sensor-Cloud Systems WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity

Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers... Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Thomas Peyrin
R3,976 Discovery Miles 39 760 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.

Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings... Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings (Paperback, 1st ed. 2017)
Maire O'Neill
R2,428 Discovery Miles 24 280 Ships in 18 - 22 working days

This book constitutes the proceedings of the 16th IMA International Conference on Cryptography and Coding, IMACC 2017, held at Oxford, UK, in December 2017. The 19 papers presented were carefully reviewed and selected from 32 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on... Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings (Paperback, 1st ed. 2017)
Matteo Maffei, Mark Ryan
R2,248 Discovery Miles 22 480 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. The 14 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: information flow; security protocols; security policies; and information leakage.

Digital Transmission - A Simulation-Aided Introduction with VisSim/Comm (Paperback, Softcover reprint of the original 1st ed.... Digital Transmission - A Simulation-Aided Introduction with VisSim/Comm (Paperback, Softcover reprint of the original 1st ed. 2009)
Dayan Adionel Guimaraes
R6,748 Discovery Miles 67 480 Ships in 18 - 22 working days

Digital Transmission - A Simulation-Aided Introduction with VisSim/Comm is a book in which basic principles of digital communication, mainly pertaining to the physical layer, are emphasized. Nevertheless, these principles can serve as the fundamentals that will help the reader to understand more advanced topics and the associated technology. In this book, each topic is addressed in two different and complementary ways: theoretically and by simulation. The theoretical approach encompasses common subjects covering principles of digital transmission, like notions of probability and stochastic processes, signals and systems, baseband and passband signaling, signal-space representation, spread spectrum, multi-carrier and ultra wideband transmission, carrier and symbol-timing recovery, information theory and error-correcting codes. The simulation approach revisits the same subjects, focusing on the capabilities of the communication system simulation software VisSim/Comm on helping the reader to fulfill the gap between the theory and its practical meaning. The presentation of the theory is made easier with the help of 357 illustrations. A total of 101 simulation files supplied in the accompanying CD support the simulation-oriented approach. A full evaluation version and a viewer-only version of VisSim/Comm are also supplied in the CD.

Wireless and Satellite Systems - 8th International Conference, WiSATS 2016, Cardiff, UK, September 19-20, 2016, Proceedings... Wireless and Satellite Systems - 8th International Conference, WiSATS 2016, Cardiff, UK, September 19-20, 2016, Proceedings (Paperback, 1st ed. 2017)
Ifiok Otung, Prashant Pillai, George Eleftherakis, Giovanni Giambene
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 8th International Conference on Wireless and Satellite Services, WiSATS 2016, held in Cardiff, UK, in September 2016. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference was renamed WiSATS. The 22 revised papers were selected from 32 submissions and cover a broad range of related state-of-the-art topics in antennas and mobile terminals, symbol precoding and network coding schemes, energy efficient strategies in satellite communication and cloud radio access networks, smart grid communication and optimization, security issues in vehicular ad-hoc networks (VANET) and delay tolerant net-works (DTN), interference mitigation in high throughput geostationary and non-geostationary satellite systems.

Certified Ethical Hacker (CEH) Foundation Guide (Paperback, 1st ed.): Sagar Ajay Rahalkar Certified Ethical Hacker (CEH) Foundation Guide (Paperback, 1st ed.)
Sagar Ajay Rahalkar
R1,650 Discovery Miles 16 500 Ships in 18 - 22 working days

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. What You Will Learn Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker Who This Book Is For Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016): Byung-gyu Kim, Kalyan Goswami Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016)
Byung-gyu Kim, Kalyan Goswami
R1,603 Discovery Miles 16 030 Ships in 18 - 22 working days

This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video compression algorithms succinctly, without going to the mathematical details and technical specifications. For accelerated learning, hybrid codec structure, inter- and intra- prediction techniques in MPEG-4, H.264/AVC, and HEVC are discussed together. In addition, the latest research in the fast encoder design for the HEVC and H.264/AVC is also included.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,356 Discovery Miles 23 560
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820

 

Partners