0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (92)
  • R500+ (1,943)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on... Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
R2,411 Discovery Miles 24 110 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Public-Key Cryptography -- PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos... Public-Key Cryptography -- PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings (Paperback, 2014 ed.)
Hugo Krawczyk
R1,640 Discovery Miles 16 400 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.): Yun Q.... Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography (Paperback, 2014 ed.)
Yun Q. Shi, Feng Liu, Weiqi Yan
R1,883 Discovery Miles 18 830 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The seven papers included in this special issue were carefully reviewed and selected from 21 submissions. They address the challenges faced by the emerging area of visual cryptography and provide the readers with an overview of the state of the art in this field of research.

Classical, Semi-classical and Quantum Noise (Paperback, 2012 ed.): Leon Cohen, H. Vincent Poor, Marlan O. Scully Classical, Semi-classical and Quantum Noise (Paperback, 2012 ed.)
Leon Cohen, H. Vincent Poor, Marlan O. Scully
R5,090 Discovery Miles 50 900 Ships in 10 - 15 working days

David Middleton was a towering figure of 20th Century engineering and science and one of the founders of statistical communication theory. During the second World War, the young David Middleton, working with Van Fleck, devised the notion of the matched filter, which is the most basic method used for detecting signals in noise. Over the intervening six decades, the contributions of Middleton have become classics. This collection of essays by leading scientists, engineers and colleagues of David are in his honor and reflect the wide influence that he has had on many fields. Also included is the introduction by Middleton to his forthcoming book, which gives a wonderful view of the field of communication, its history and his own views on the field that he developed over the past 60 years. Focusing on classical noise modeling and applications, Classical, Semi-Classical and Quantum Noise includes coverage of statistical communication theory, non-stationary noise, molecular footprints, noise suppression, Quantum error correction, and other related topics.

An Introduction to Kolmogorov Complexity and Its Applications (Paperback, 3rd ed. 2008): Ming Li, Paul M. B. Vitanyi An Introduction to Kolmogorov Complexity and Its Applications (Paperback, 3rd ed. 2008)
Ming Li, Paul M. B. Vitanyi
R2,471 Discovery Miles 24 710 Ships in 10 - 15 working days

"The book is outstanding and admirable in many respects. ... is necessary reading for all kinds of readers from undergraduate students to top authorities in the field." Journal of Symbolic Logic Written by two experts in the field, this is the only comprehensive and unified treatment of the central ideas and applications of Kolmogorov complexity. The book presents a thorough treatment of the subject with a wide range of illustrative applications. Such applications include the randomness of finite objects or infinite sequences, Martin-Loef tests for randomness, information theory, computational learning theory, the complexity of algorithms, and the thermodynamics of computing. It will be ideal for advanced undergraduate students, graduate students, and researchers in computer science, mathematics, cognitive sciences, philosophy, artificial intelligence, statistics, and physics. The book is self-contained in that it contains the basic requirements from mathematics and computer science. Included are also numerous problem sets, comments, source references, and hints to solutions of problems. New topics in this edition include Omega numbers, Kolmogorov-Loveland randomness, universal learning, communication complexity, Kolmogorov's random graphs, time-limited universal distribution, Shannon information and others.

Homomorphic Encryption and Applications (Paperback, 2014 ed.): Xun Yi, Russell Paulet, Elisa Bertino Homomorphic Encryption and Applications (Paperback, 2014 ed.)
Xun Yi, Russell Paulet, Elisa Bertino
R2,782 Discovery Miles 27 820 Ships in 10 - 15 working days

This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings... Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (Paperback, 2014 ed.)
Carles Padro
R2,250 Discovery Miles 22 500 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum,... Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings (Paperback, 2014 ed.)
Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu
R3,146 Discovery Miles 31 460 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).

MIMO Communication for Cellular Networks (Paperback, 2012 ed.): Howard Huang, Constantinos B. Papadias, Sivarama Venkatesan MIMO Communication for Cellular Networks (Paperback, 2012 ed.)
Howard Huang, Constantinos B. Papadias, Sivarama Venkatesan
R3,376 Discovery Miles 33 760 Ships in 10 - 15 working days

As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, there is a growing need to understand the performance limits of MIMO in practical networks. To address this need, "MIMO Communication for Cellular Networks "presents a systematic description of MIMO technology classes and a framework for MIMO system design that takes into account the essential physical-layer features of practical cellular networks.

In contrast to works that focus on the theoretical performance of abstract MIMO channels, "MIMO Communication for Cellular Networks "emphasizes the practical performance of realistic MIMO systems. A unified set of system simulation results highlights relative performance gains of different MIMO techniques and provides insights into how best to use multiple antennas in cellular networks under various conditions.

"MIMO Communication for Cellular Networks" describes single-user, multiuser, network MIMO technologies and system-level aspects of cellular networks, including channel modeling, resource scheduling, interference mitigation, and simulation methodologies. The key concepts are presented with sufficient generality to be applied to a wide range of wireless systems, including those based on cellular standards such as LTE, LTE-Advanced, WiMAX, and WiMAX2. The book is intended for use by graduate students, researchers, and practicing engineers interested in the physical-layer design of state-of-the-art wireless systems.

Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014.... Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings (Paperback, 2014 ed.)
Jan Jurjens, Frank Piessens, Nataliia Bielova
R2,193 Discovery Miles 21 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

Selected Areas in Cryptography -- SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised... Selected Areas in Cryptography -- SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Antoine Joux, Amr Youssef
R2,595 Discovery Miles 25 950 Ships in 10 - 15 working days

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

Error-Correcting Linear Codes - Classification by Isometry and Applications (Paperback, 2006 ed.): Anton Betten, Michael Braun,... Error-Correcting Linear Codes - Classification by Isometry and Applications (Paperback, 2006 ed.)
Anton Betten, Michael Braun, Harald Fripertinger, Adalbert Kerber, Axel Kohnert, …
R3,006 Discovery Miles 30 060 Ships in 10 - 15 working days

This text offers an introduction to error-correcting linear codes for researchers and graduate students in mathematics, computer science and engineering. The book differs from other standard texts in its emphasis on the classification of codes by means of isometry classes. The relevant algebraic are developed rigorously. Cyclic codes are discussed in great detail. In the last four chapters these isometry classes are enumerated, and representatives are constructed algorithmically.

Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers... Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers (Paperback, 2013 ed.)
Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao
R2,710 Discovery Miles 27 100 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Theory of Cryptography - 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings... Theory of Cryptography - 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings (Paperback, 2014 ed.)
Yehuda Lindell
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.

Pairing-Based Cryptography -- Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised... Pairing-Based Cryptography -- Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers (Paperback, 2014)
Zhenfu Cao, Fangguo Zhang
R2,227 Discovery Miles 22 270 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013.

The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.

Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013,... Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Dongdai Lin, Shouhuai Xu, Moti Yung
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.

Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013,... Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Sokratis Katsikas, Isaac Agudo
R1,967 Discovery Miles 19 670 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.

Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013, Proceedings... Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013, Proceedings (Paperback, 2013)
Martijn Stam
R2,560 Discovery Miles 25 600 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.

Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014.... Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (Paperback, 2014 ed.)
Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis
R2,675 Discovery Miles 26 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.

Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain,  September... Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17-19, 2014. Proceedings (Paperback, 2014 ed.)
Josep Domingo-Ferrer
R2,560 Discovery Miles 25 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2014, held in Ibiza, Spain in September 2014 under the sponsorship of the UNESCO chair in Data Privacy. The 27 revised full papers presented were carefully reviewed and selected from 41 submissions. The scope of the conference is on following topics: tabular data protection, microdata masking, protection using privacy models, synthetic data, record linkage, remote access, privacy-preserving protocols, and case studies.

Cryptographic Hardware and Embedded Systems -- CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26,... Cryptographic Hardware and Embedded Systems -- CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings (Paperback, 2014 ed.)
Lejla Batina, Matthew Robshaw
R3,284 Discovery Miles 32 840 Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.

Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings... Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings (Paperback, 2013 ed.)
Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.

The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.

A Brief History of Cryptology and Cryptographic Algorithms (Paperback, 2013 ed.): John F Dooley A Brief History of Cryptology and Cryptographic Algorithms (Paperback, 2013 ed.)
John F Dooley
R1,791 Discovery Miles 17 910 Ships in 10 - 15 working days

The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them - so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.

Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.): Xinxin Liu, Xiaolin Li Location Privacy Protection in Mobile Networks (Paperback, 2013 ed.)
Xinxin Liu, Xiaolin Li
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Interference Cancellation Using Space-Time Processing and Precoding Design (Paperback, 2013 ed.): Feng Li Interference Cancellation Using Space-Time Processing and Precoding Design (Paperback, 2013 ed.)
Feng Li
R3,131 Discovery Miles 31 310 Ships in 10 - 15 working days

Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to achieve interference cancellation, low-complexity decoding and full diversity for a series of multi-user systems. In multi-user environments, co-channel interference will diminish the performance of wireless communications systems. In this book, we investigate how to design robust space-time codes and pre-coders to suppress the co-channel interference when multiple antennas are available. This book offers a valuable reference work for graduate students, academic researchers and engineers who are interested in interference cancellation in wireless communications. Rigorous performance analysis and various simulation illustrations are included for each design method. Dr. Feng Li is a scientific researcher at Cornell University.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Geothermal Engineering - Fundamentals…
Arnold Watson Hardcover R5,100 Discovery Miles 51 000
Electrical Energy Generation in Europe…
Jorge Morales Pedraza Hardcover R4,549 Discovery Miles 45 490
Wearable Solar Cell Systems
Denise Wilson Paperback R1,572 Discovery Miles 15 720
Hybrid Power Cycle Arrangements for…
Anoop Kumar Shukla, Onkar Singh, … Hardcover R2,894 Discovery Miles 28 940
The Electric Power Engineering Handbook…
Leonard L. Grigsby Hardcover R11,423 Discovery Miles 114 230
Applied Soft Computing and Embedded…
Mangey Ram, Rupendra Kumar Pachauri, … Hardcover R4,483 Discovery Miles 44 830
Lithium-Ion Batteries and Solar Cells…
Ming-Fa Lin, Wen-Dung Hsu, … Hardcover R4,484 Discovery Miles 44 840
Modern Computational Techniques for…
Krishan Arora, Vikram Kumar, … Hardcover R3,879 Discovery Miles 38 790
Advanced Power Generation Systems
Ibrahim Dincer, Calin Zamfirescu Hardcover R3,219 R3,046 Discovery Miles 30 460
Real-Time Systems Development with RTEMS…
Gedare Bloom, Joel Sherrill, … Hardcover R5,078 Discovery Miles 50 780

 

Partners