0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

6GN for Future Wireless Networks - Third EAI International Conference, 6GN 2020, Tianjin, China, August 15-16, 2020,... 6GN for Future Wireless Networks - Third EAI International Conference, 6GN 2020, Tianjin, China, August 15-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Xiaofei Wang, Victor C. M. Leung, Keqiu Li, Haijun Zhang, Xiping Hu, …
R3,348 Discovery Miles 33 480 Ships in 10 - 15 working days

This book constitutes the proceedings of the Third International Conference on 6G for Future Wireless Networks, 6GN 2020, held in Tianjin, China, in August 2020. The conference was held virtually due to the COVID-19 pandemic. The 45 full papers were selected from 109 submissions and present the state of the art and practical applications of 6G technologies. The papers are arranged thematically on network scheduling and optimization; wireless system and platform; intelligent applications; network performance evaluation; cyber security and privacy; technologies for private 5G/6G.

Forward Error Correction via Channel Coding (Paperback, 1st ed. 2020): Orhangazi Forward Error Correction via Channel Coding (Paperback, 1st ed. 2020)
Orhangazi
R2,800 Discovery Miles 28 000 Ships in 10 - 15 working days

This book provides a comprehensive explanation of forward error correction, which is a vital part of communication systems. The book is written in such a way to make the subject easy and understandable for the reader. The book starts with a review of linear algebra to provide a basis for the text. The author then goes on to cover linear block codes, syndrome error correction, cyclic codes, Galois fields, BCH codes, Reed Solomon codes, and convolutional codes. Examples are provided throughout the text.

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R2,863 Discovery Miles 28 630 Ships in 10 - 15 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Shiho Moriai, Huaxiong Wang
R2,978 Discovery Miles 29 780 Ships in 10 - 15 working days

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

Digital Transformation for a Sustainable Society in the 21st Century - I3E 2019 IFIP WG 6.11 International Workshops,... Digital Transformation for a Sustainable Society in the 21st Century - I3E 2019 IFIP WG 6.11 International Workshops, Trondheim, Norway, September 18-20, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Ilias O. Pappas, Patrick Mikalef, Yogesh K. Dwivedi, Letizia Jaccheri, John Krogstie, …
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes papers from the workshops held at the 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, which took place in Trondheim, Norway, in September 2019. The 11 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 33 submissions to the following workshops: DTIS: Digital Transformation for an Inclusive Society TPSIE: Trust and Privacy Aspects of Smart Information Environments 3(IT): Innovative Teaching of Introductory Topics in Information Technology CROPS: CROwd-Powered e-Services

Pro Cryptography and Cryptanalysis - Creating Advanced Algorithms with C# and .NET (Paperback, 1st ed.): Marius Iulian... Pro Cryptography and Cryptanalysis - Creating Advanced Algorithms with C# and .NET (Paperback, 1st ed.)
Marius Iulian Mihailescu, Stefania Loredana Nita
R2,196 Discovery Miles 21 960 Ships in 10 - 15 working days

Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understanding of public key encryption systems and challenging cryptography mechanisms such as lattice-based cryptography. Modern cryptography is the lifeboat of a secure infrastructure. From global economies and governments, to meeting everyday consumer needs, cryptography is ubiquitous, and used in search, design, data, artificial intelligence, and other fields of information technology and communications. Its complexity can lead to misconfiguration, misuse, and misconceptions. For developers who are involved in designing and implementing cryptographic operations in their applications, understanding the implications of the algorithms, modes, and other parameters is vital. Pro Cryptography and Cryptanalysis is for the reader who has a professional need or personal interest in developing cryptography algorithms and security schemes using C# and .NET. You will learn how to implement advanced cryptographic algorithms (such as Elliptic Curve Cryptography Algorithms, Lattice-based Cryptography, Searchable Encryption, Homomorphic Encryption), and come away with a solid understanding of the internal cryptographic mechanisms, and common ways in which the algorithms are correctly implemented in real practice. With the new era of quantum computing, this book serves as a stepping stone to quantum cryptography, finding useful connections between current cryptographic concepts and quantum related topics. What You Will Learn Know when to enlist cryptography, and how it is often misunderstood and misused Explore modern cryptography algorithms, practices, and properties Design and implement usable, advanced cryptographic methods and mechanisms Understand how new features in C# and .NET impact the future of cryptographic algorithms Use the cryptographic model, services, and System.Security.Cryptography namespace in .NET Modernize your cryptanalyst mindset by exploiting the performance of C# and .NET with its weak cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures Discover how most algorithms can be broken Who This Book Is For Information security experts, cryptologists, software engineers, developers, data scientists, and academia who have experience with C#, .NET, as well as IDEs such as Visual Studio, VS Code, or Mono. Because this book is for an intermediate to advanced audience, readers should also possess an understanding of cryptography (symmetric and asymmetric) concepts.

Metabiology - Non-standard Models, General Semantics and Natural Evolution (Paperback, 1st ed. 2020): Arturo Carsetti Metabiology - Non-standard Models, General Semantics and Natural Evolution (Paperback, 1st ed. 2020)
Arturo Carsetti
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

In the context of life sciences, we are constantly confronted with information that possesses precise semantic values and appears essentially immersed in a specific evolutionary trend. In such a framework, Nature appears, in Monod's words, as a tinkerer characterized by the presence of precise principles of self-organization. However, while Monod was obliged to incorporate his brilliant intuitions into the framework of first-order cybernetics and a theory of information with an exclusively syntactic character such as that defined by Shannon, research advances in recent decades have led not only to the definition of a second-order cybernetics but also to an exploration of the boundaries of semantic information. As H. Atlan states, on a biological level "the function self-organizes together with its meaning". Hence the need to refer to a conceptual theory of complexity and to a theory of self-organization characterized in an intentional sense. There is also a need to introduce, at the genetic level, a distinction between coder and ruler as well as the opportunity to define a real software space for natural evolution. The recourse to non-standard model theory, the opening to a new general semantics, and the innovative definition of the relationship between coder and ruler can be considered, today, among the most powerful theoretical tools at our disposal in order to correctly define the contours of that new conceptual revolution increasingly referred to as metabiology. This book focuses on identifying and investigating the role played by these particular theoretical tools in the development of this new scientific paradigm. Nature "speaks" by means of mathematical forms: we can observe these forms, but they are, at the same time, inside us as they populate our organs of cognition. In this context, the volume highlights how metabiology appears primarily to refer to the growth itself of our instruments of participatory knowledge of the world.

Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III (Paperback, 1st ed. 2020)
Shiho Moriai, Huaxiong Wang
R2,971 Discovery Miles 29 710 Ships in 10 - 15 working days

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

The Art of Error Correcting Coding 2e +Website (Hardcover, 2nd Edition): RH Morelos-Zaragoz The Art of Error Correcting Coding 2e +Website (Hardcover, 2nd Edition)
RH Morelos-Zaragoz
R2,317 Discovery Miles 23 170 Ships in 12 - 17 working days

Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. "The Art of Error Correcting Coding, Second Edition" explores intermediate and advanced level concepts as well as those which will appeal to the novice.

All key topics are discussed, including Reed-Solomon codes, Viterbi decoding, soft-output decoding algorithms, MAP, log-MAP and MAX-log-MAP. Reliability-based algorithms GMD and Chase are examined, as are turbo codes, both serially and parallel concatenated, as well as low-density parity-check (LDPC) codes and their iterative decoders. Features additional problems at the end of each chapter and an instructor's solutions manual Updated companion website offers new C/C ]+programs and MATLAB scripts, to help with the understanding and implementation of basic ECC techniques Easy to follow examples illustrate the fundamental concepts of error correcting codes Basic analysis tools are provided throughout to help in the assessment of the error performance block and convolutional codes of a particular error correcting coding (ECC) scheme for a selection of the basic channel models

This edition provides an essential resource to engineers, computer scientists and graduate students alike for understanding and applying ECC techniques in the transmission and storage of digital information.

E-Government, E-Services and Global Processes - Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010,... E-Government, E-Services and Global Processes - Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 ed.)
Marijn Janssen, Winfried Lamersdorf, Jan Pries-Heje, Michael Rosemann
R1,492 Discovery Miles 14 920 Ships in 10 - 15 working days

This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The proceedings of each conference are allocated separate parts in this book each with their own editors. E-Government and E-Services (EGES) page 3 Marijn Janssen / Winfried Lamersdorf Global Information Systems Processes (GISP) page 183 Jan Pries-Heje / Michael Rosemann Organization E-Government and E-Services (EGES 2010) EGES Co-chairs Marijn Janssen Delft, The Netherlands Winfried Lamersdorf Hamburg, Germany Lalit Sawhney Bangalore, India Leon Strous Helmond, The Netherlands EGES Reviewers Agarwal Ashok ACS Technologies Ltd., Bhoopal, India Mark Borman University of Sydney, Australia Erwin Fielt Queensland University of Technology, Brisbane, Australia Ernest Foo Queensland University of Technology, Brisbane, Australia M.P. Gupta Indian Institute of Technology Delhi, India Paul Henman The University of Queensland, Australia Ralf Klischewski German University, Cairo, Egypt Christine Leitner Donau-Universit. at Krems, Austria Miriam Lips Victoria University of Wellington, New Zealand Zoran Milosevic Deontic, Brisbane, Australia Oystein Sabo University of Agder, Norway Jochen Scholl University of Washington, Seattle, USA Leif Skiftenes University of Agder, Norway Weerakoddy Vishanth Brunel University Business School, West London, UK Dirk Werth DFKI, Saarbruc . . ken, Germany Maria Wimmer University Koblenz-Landau, Germany EGES Subreviewers Alexandra Chapko, Andreas Emrich and Marc Graessle German Research Center for Arti?cial Intelligence, Saarbruc .. ken, Germany Kristof Hamann, Kai Jander, Ante Vilenica and Sonja Zaplata University of Hamburg, Germany Global Information Systems Processes (GISP 2010) GISP Co-chairs Jan Pries-Heje Roskilde University, Denmark

Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1,... Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings (Paperback, 1st ed. 2020)
Shui Yu, Peter Mueller, Jiangbo Qian
R2,928 Discovery Miles 29 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*. The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science. *The conference was held virtually due to the COVID-19 pandemic.

Implementing Effective Code Reviews - How to Build and Maintain Clean Code (Paperback, 1st ed.): Giuliana Carullo Implementing Effective Code Reviews - How to Build and Maintain Clean Code (Paperback, 1st ed.)
Giuliana Carullo
R1,619 R1,269 Discovery Miles 12 690 Save R350 (22%) Ships in 10 - 15 working days

The ideal code review process differs from organization to organization, but the needs all boil down to the same foundational factors. A software development team cannot properly grow if its code reviews are not consistent, straightforward, and aspire to hit several company goals at once, such as security, performance, longevity, and more. Implementing Effective Code Reviews is the manual your team has been seeking. Author Giuliana Carullo uses her expert background to guide you through the basics of building and maintaining clean code, and she is known for distilling complex concepts into entertaining and easy-to-grasp lessons. Healthy code requires incremental improvements, and knowing how to execute this is essential for conducting effective reviews on your team. While complex and fancy code can be interesting to work with, it will not always achieve business goals or solve urgent problems. Good coding practices are at the heart of a high-performing team, and Carullo instills these core values in a simple, straight-forward way in Implementing Effective Code Reviews. Whether you are a passionate programmer looking to go the extra mile at the office, or an experienced software engineer seeking a guide to how to improve your leadership and code review process, this book covers it all. With each chapter wrapped up in a handy checklist of crucial takeaways, Carullo has created an essential handbook for coders everywhere. There are a lot of myths that dominate the programming landscape, and Implementing Effective Code Reviews grounds the process and gets to the heart of the matter. What You Will Learn Understand how to work with your team to implement effective code reviews Master good programming practices that will build healthy code Discover how you should tackle different complex areas during code review like, security and performance Who This Book Is For Passionate programmers willing to go the extra mile to be better at their jobs, new programmers looking to strengthen their programming skills, and experienced software engineers looking for a quick guide on how to review code

A Practical Introduction to Regression Discontinuity Designs - Foundations (Paperback): Matias D. Cattaneo, Nicolas Idrobo,... A Practical Introduction to Regression Discontinuity Designs - Foundations (Paperback)
Matias D. Cattaneo, Nicolas Idrobo, Rocio Titiunik
R554 Discovery Miles 5 540 Ships in 12 - 17 working days

In this Element and its accompanying second Element, A Practical Introduction to Regression Discontinuity Designs: Extensions, Matias Cattaneo, Nicolas Idrobo, and Rociio Titiunik provide an accessible and practical guide for the analysis and interpretation of regression discontinuity (RD) designs that encourages the use of a common set of practices and facilitates the accumulation of RD-based empirical evidence. In this Element, the authors discuss the foundations of the canonical Sharp RD design, which has the following features: (i) the score is continuously distributed and has only one dimension, (ii) there is only one cutoff, and (iii) compliance with the treatment assignment is perfect. In the second Element, the authors discuss practical and conceptual extensions to this basic RD setup.

Improving Image Quality in Visual Cryptography (Paperback, 1st ed. 2020): Bin Yan, Yong Xiang, Guang Hua Improving Image Quality in Visual Cryptography (Paperback, 1st ed. 2020)
Bin Yan, Yong Xiang, Guang Hua
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.

Decoding Blockchain for Business - Understand the Tech and Prepare for the Blockchain Future (Paperback, 1st ed.): Stijn Van... Decoding Blockchain for Business - Understand the Tech and Prepare for the Blockchain Future (Paperback, 1st ed.)
Stijn Van Hijfte
R1,182 R949 Discovery Miles 9 490 Save R233 (20%) Ships in 10 - 15 working days

Business professionals looking to understand the impact, future, and limitations of blockchain need look no further. This revolutionary technology has impacted business and the economy in unprecedented ways within the past decade, and it is only continuing to grow. As a leader in your organization, it is vital that you decode blockchain and optimize all the ways in which it can improve your business. Author of Decoding Blockchain for Business, Stijn Van Hijfte, expertly emphasizes the imperative of professionals in any sector of industry to understand the core concepts and implications of blockchain technology. Cryptocurrencies, cryptotrading, and constantly-changing tax structures for financial systems using blockchain technologies are covered in detail. The lasting effects of blockchain across specific industries such as media, real estate, finance, and regulatory bodies are addressed with an insightful eye from Van Hijfte. If not properly implemented with care and a foundation of knowledge, blockchain brings risks and uncertainties to a company. Know your technology to be ready for the present and the future, and stay ahead of the curve. Blockchain is here to stay, and Decoding Blockchain for Business is your professional roadmap. What You Will Learn Discover the risks associated with blockchain if not properly implemented Gain insights on how blockchain technology affects other booming topics such as AI, IoT, and RPA Look at the regulations surrounding Blockchain in different countries Who This Book Is For Business professionals looking to understand the impact, future, and limitations of Blockchain and how individuals and companies should prepare for this technology.

Design, User Experience, and Usability. Design for Contemporary Interactive Environments - 9th International Conference, DUXU... Design, User Experience, and Usability. Design for Contemporary Interactive Environments - 9th International Conference, DUXU 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Aaron Marcus, Elizabeth Rosenzweig
R1,605 Discovery Miles 16 050 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, DUXU 2020, held as part of the 22nd International Conference on Human-Computer Interaction, HCII 2020, in Copenhagen, Denmark, in July 2020. The conference was held virtually due to the COVID-19 pandemic. From a total of 6326 submissions, a total of 1439 papers and 238 posters has been accepted for publication in the HCII 2020 proceedings. The 50 papers included in this volume were organized in topical sections on interactions in intelligent and IoT environments, usability aspects of handheld and mobile devices, designing games and immersive experiences, and UX studies in automotive and transport.

Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications - 9th EAI International Conference, CloudComp 2019,... Cloud Computing, Smart Grid and Innovative Frontiers in Telecommunications - 9th EAI International Conference, CloudComp 2019, and 4th EAI International Conference, SmartGIFT 2019, Beijing, China, December 4-5, 2019, and December 21-22, 2019 (Paperback, 1st ed. 2020)
Xuyun Zhang, Guanfeng Liu, Meikang Qiu, Wei Xiang, Tao Huang
R2,915 Discovery Miles 29 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9thInternational Conference on Cloud Computing, CloudComp 2019, and the 4th International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019, both held in Beijing, China, in December 2019. The55 full papers of both conferences were selected from 113 submissions. CloudComp 2019 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. The papers are grouped thematically in tracks on cloud architecture and scheduling; cloud-based data analytics; cloud applications; and cloud security and privacy. SmartGIFT 2019 focus on all aspects of smart grids and telecommunications, broadly understood as the renewable generation and distributed energy resources integration, computational intelligence applications, information and communication technologies.

Cognitive Cities - Second International Conference, IC3 2019, Kyoto, Japan, September 3-6, 2019, Revised Selected Papers... Cognitive Cities - Second International Conference, IC3 2019, Kyoto, Japan, September 3-6, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Jian Shen, Yao-Chung Chang, Yu-Sheng Su, Hiroaki Ogata
R2,923 Discovery Miles 29 230 Ships in 10 - 15 working days

This book constitutes refereed proceeding of the Second International Cognitive Cities Conference, IC3 2019, held in Kyoto, Japan, in September 2019. The 37 full papers and 46 short papers were thoroughly reviewed and selected from 206 submissions. The papers are organized according to the topical sections on cognitive city for special needs; cognitive city theory, modeling and simulation; XR and educational innovations for cognitive city; educational technology and strategy in cognitive city; safety, security and privacy in cognitive city; artificial intelligence theory and technology related to cognitive city; Internet of Things for cognitive city; business application and management for cognitive city; big data for cognitive city; engineering technology and applied science for cognitive city; maker, CT and STEAM education for cognitive city.

How to Prove It - A Structured Approach (Hardcover, 3rd Revised edition): Daniel J. Velleman How to Prove It - A Structured Approach (Hardcover, 3rd Revised edition)
Daniel J. Velleman
R2,612 Discovery Miles 26 120 Ships in 12 - 17 working days

Proofs play a central role in advanced mathematics and theoretical computer science, yet many students struggle the first time they take a course in which proofs play a significant role. This bestselling text's third edition helps students transition from solving problems to proving theorems by teaching them the techniques needed to read and write proofs. Featuring over 150 new exercises and a new chapter on number theory, this new edition introduces students to the world of advanced mathematics through the mastery of proofs. The book begins with the basic concepts of logic and set theory to familiarize students with the language of mathematics and how it is interpreted. These concepts are used as the basis for an analysis of techniques that can be used to build up complex proofs step by step, using detailed 'scratch work' sections to expose the machinery of proofs about numbers, sets, relations, and functions. Assuming no background beyond standard high school mathematics, this book will be useful to anyone interested in logic and proofs: computer scientists, philosophers, linguists, and, of course, mathematicians.

Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R3,891 Discovery Miles 38 910 Ships in 12 - 17 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019): Abid Yahya Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019)
Abid Yahya
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Paperback, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Paperback, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R972 Discovery Miles 9 720 Ships in 9 - 15 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin... Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers (Paperback, 1st ed. 2019)
Tanja Lange, Orr Dunkelman
R1,989 Discovery Miles 19 890 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Hardcover, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Hardcover, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R3,096 Discovery Miles 30 960 Ships in 12 - 17 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R1,172 Discovery Miles 11 720 Ships in 12 - 17 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R712 R590 Discovery Miles 5 900
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R875 Discovery Miles 8 750
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,177 Discovery Miles 31 770
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R1,968 R1,559 Discovery Miles 15 590
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Blockchain Gaps - From Myth to Real Life
Shin'ichiro Matsuo, Nat Sakimura Hardcover R2,309 Discovery Miles 23 090
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Blockchain Applications
Arshdeep Bagha Hardcover R2,030 R1,592 Discovery Miles 15 920
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390

 

Partners