0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Biometrics, Computer Security Systems and Artificial Intelligence Applications (Paperback, Softcover reprint of hardcover 1st... Biometrics, Computer Security Systems and Artificial Intelligence Applications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Khalid Saeed, Jerzy Pejas, Romuald Mosdorf
R5,160 Discovery Miles 51 600 Ships in 18 - 22 working days

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.

Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008):... Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Hsinchun Chen, Christopher C. Yang
R4,060 Discovery Miles 40 600 Ships in 18 - 22 working days

The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response

Knowledge Discovery and Data Mining - The Info-Fuzzy Network (IFN) Methodology (Paperback, Softcover reprint of hardcover 1st... Knowledge Discovery and Data Mining - The Info-Fuzzy Network (IFN) Methodology (Paperback, Softcover reprint of hardcover 1st ed. 2001)
O. Maimon, M. Last
R2,624 Discovery Miles 26 240 Ships in 18 - 22 working days

This book presents a specific and unified approach to Knowledge Discovery and Data Mining, termed IFN for Information Fuzzy Network methodology. Data Mining (DM) is the science of modelling and generalizing common patterns from large sets of multi-type data. DM is a part of KDD, which is the overall process for Knowledge Discovery in Databases. The accessibility and abundance of information today makes this a topic of particular importance and need. The book has three main parts complemented by appendices as well as software and project data that are accessible from the book's web site (http: //www.eng.tau.ac.iV-maimonlifn-kdg ). Part I (Chapters 1-4) starts with the topic of KDD and DM in general and makes reference to other works in the field, especially those related to the information theoretic approach. The remainder of the book presents our work, starting with the IFN theory and algorithms. Part II (Chapters 5-6) discusses the methodology of application and includes case studies. Then in Part III (Chapters 7-9) a comparative study is presented, concluding with some advanced methods and open problems. The IFN, being a generic methodology, applies to a variety of fields, such as manufacturing, finance, health care, medicine, insurance, and human resources. The appendices expand on the relevant theoretical background and present descriptions of sample projects (including detailed results)."

Dynamics and Randomness II (Paperback, Softcover reprint of hardcover 1st ed. 2004): Alejandro Maass, Servet Martinez, Jaime... Dynamics and Randomness II (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Alejandro Maass, Servet Martinez, Jaime San Martin
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book contains the lectures given at the II Canference an Dynamics and Randamness held at the Centro de Modelamiento Matematico of the Universidad de Chile, from December 9th to 13th, 2002. This meeting brought together mathematicians, theoretical physicists, theoretical computer scientists, and graduate students interested in fields related to probability theory, ergodic theory, symbolic and topological dynamics. We would like to express our gratitude to an the participants of the conference and to the people who contributed to its orga- nization. In particular, to Pierre Collet, BerIiard Rost and Karl Petersen for their scientific advise. We want to thank warmly the authors of each chapter for their stimulating lectures and for their manuscripts devoted to a various of appealing subjects in probability and dynamics: to Jean Bertoin for his course on Some aspects of random fragmentation in con- tinuous time; to Anton Bovier for his course on Metastability and ageing in stochastic dynamics; to Steve Lalley for his course on AI- gebraic systems of generat ing functions and return probabilities for random walks; to Elon Lindenstrauss for his course on Recurrent measures and measure rigidity; to Sylvie Meleard for her course on Stochastic particle approximations for two-dimensional N avier- Stokes equations; and to Anatoly Vershik for his course on Random and universal metric spaces.

Maximum Entropy, Information Without Probability and Complex Fractals - Classical and Quantum Approach (Paperback, Softcover... Maximum Entropy, Information Without Probability and Complex Fractals - Classical and Quantum Approach (Paperback, Softcover reprint of the original 1st ed. 2000)
Guy Jumarie
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Every thought is a throw of dice. Stephane Mallarme This book is the last one of a trilogy which reports a part of our research work over nearly thirty years (we discard our non-conventional results in automatic control theory and applications on the one hand, and fuzzy sets on the other), and its main key words are Information Theory, Entropy, Maximum Entropy Principle, Linguistics, Thermodynamics, Quantum Mechanics, Fractals, Fractional Brownian Motion, Stochastic Differential Equations of Order n, Stochastic Optimal Control, Computer Vision. Our obsession has been always the same: Shannon's information theory should play a basic role in the foundations of sciences, but subject to the condition that it be suitably generalized to allow us to deal with problems which are not necessarily related to communication engineering. With this objective in mind, two questions are of utmost importance: (i) How can we introduce meaning or significance of information in Shannon's information theory? (ii) How can we define and/or measure the amount of information involved in a form or a pattern without using a probabilistic scheme? It is obligatory to find suitable answers to these problems if we want to apply Shannon's theory to science with some chance of success. For instance, its use in biology has been very disappointing, for the very reason that the meaning of information is there of basic importance, and is not involved in this approach.

Coding for Wireless Channels (Paperback, Softcover reprint of hardcover 1st ed. 2005): Ezio Biglieri Coding for Wireless Channels (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ezio Biglieri
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

Accessible introduction to the theoretical foundations of modern coding theory

Including numerous applications to wireless transmission systems

The author is famous in the field of coding and wireless communications for his work in the area of faded channels & communcations.

Data Mining for Design and Manufacturing - Methods and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2002):... Data Mining for Design and Manufacturing - Methods and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2002)
D. Braha
R4,230 Discovery Miles 42 300 Ships in 18 - 22 working days

Data Mining for Design and Manufacturing: Methods and Applications is the first book that brings together research and applications for data mining within design and manufacturing. The aim of the book is 1) to clarify the integration of data mining in engineering design and manufacturing, 2) to present a wide range of domains to which data mining can be applied, 3) to demonstrate the essential need for symbiotic collaboration of expertise in design and manufacturing, data mining, and information technology, and 4) to illustrate how to overcome central problems in design and manufacturing environments. The book also presents formal tools required to extract valuable information from design and manufacturing data, and facilitates interdisciplinary problem solving for enhanced decision making. Audience: The book is aimed at both academic and practising audiences. It can serve as a reference or textbook for senior or graduate level students in Engineering, Computer, and Management Sciences who are interested in data mining technologies. The book will be useful for practitioners interested in utilizing data mining techniques in design and manufacturing as well as for computer software developers engaged in developing data mining tools.

RFID Security and Privacy - Concepts, Protocols, and Architectures (Paperback, Softcover reprint of hardcover 1st ed. 2008):... RFID Security and Privacy - Concepts, Protocols, and Architectures (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Dirk Henrici
R4,009 Discovery Miles 40 090 Ships in 18 - 22 working days

In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: "There must exist better solutions. " I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ], whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security, privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ] supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own."

Multiple Access Communications - 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings... Multiple Access Communications - 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings (Paperback, 2011)
Claudio Sacchi, Boris Bellalta, Alexey Vinel, Fabrizio Granelli, Yan Zhang, …
R1,741 Discovery Miles 17 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Workshop on Multiple Access Communications, MACOM 2011, held in Trento, Italy, in September 2011. The 21 full papers presented were carefully reviewed and selected from more than 40 submissions. They are divided in topical sections on cognitive radio; MAC protocols; communications theory; special session on MAC protocols for WSNs; system analysis and scheduling; and queuing systems.

Information, Coding and Mathematics - Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (Paperback,... Information, Coding and Mathematics - Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Mario Blaum, Patrick G. Farrell, Henk C.A. van Tilborg
R4,038 Discovery Miles 40 380 Ships in 18 - 22 working days

Information, Coding and Mathematics is a classic reference for both professional and academic researchers working in error-correction coding and decoding, Shannon theory, cryptography, digital communications, information security, and electronic engineering. The work represents a collection of contributions from leading experts in turbo coding, cryptography and sequences, Shannon theory and coding bounds, and decoding theory and applications. All of the contributors have individually and collectively dedicated their work as a tribute to the outstanding work of Robert J. McEliece. Information, Coding and Mathematics covers the latest advances in the widely used and rapidly developing field of information and communication technology.

Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Keith Mayes,... Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Keith Mayes, Konstantinos Markantonakis
R3,347 Discovery Miles 33 470 Ships in 18 - 22 working days

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in a smart card related project.

Guide to Elliptic Curve Cryptography (Paperback, Softcover reprint of the original 1st ed. 2004): Darrel Hankerson, Alfred J.... Guide to Elliptic Curve Cryptography (Paperback, Softcover reprint of the original 1st ed. 2004)
Darrel Hankerson, Alfred J. Menezes, Scott Vanstone
R3,366 Discovery Miles 33 660 Ships in 18 - 22 working days

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.

Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.
Features & Benefits:

* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems

* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology

* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic
* Distills complex mathematics and algorithms for easy understanding
* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools
This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings (Paperback, Edition.)
Masayuki Abe
R1,522 Discovery Miles 15 220 Ships in 18 - 22 working days

ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and Cryptography Research Group of Nanyang Technological University. It was also supported by the Singapore Tourism Board, and co-sponsored by the - tional Research Foundation of Singapore, Lee Foundation, IBM Singapore Ltd., O'Connor'sSingaporeLtd., Pu?ersoftLtd., PrivylinkLtd., Hewlett-PackardS- gaporeLtd., JardineOneSolutionLtd., andSingaporeMathematicalSociety.San Ling chaired the conference and I served as the Program Chair. There were 216 valid submissions. The Program Committee aided by 221 external reviewers spent 83 days on reviews and discussions. They spared no e?ort to increase the quality of their reviews. Every paper received at least three independent reviews, and papers from the committee members received ?ve reviews. In total, there were more than 730 reviews followed by intensive discussion. This long and tough process, wrapped up with an intensive face-- facemeeting by the committeemembers convenedatUCSanta Barbara, yielded 35 accepted papers. I regret not being able to select more of such high-quality papers due to space limitations. The proceedings include the revised versions of the accepted papers. The authors are fully responsible for their contents."

Security for Telecommunications Networks (Paperback, Softcover reprint of hardcover 1st ed. 2008): Patrick Traynor, Patrick... Security for Telecommunications Networks (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Patrick Traynor, Patrick McDaniel, Thomas La Porta
R2,427 Discovery Miles 24 270 Ships in 18 - 22 working days

This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.

Multivariate Public Key Cryptosystems (Paperback, Softcover reprint of hardcover 1st ed. 2006): Jintai Ding, Jason E. Gower,... Multivariate Public Key Cryptosystems (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Jintai Ding, Jason E. Gower, Dieter S Schmidt
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

Multivariate public key cryptosystems (MPKC) is a fast-developing area in cryptography. This book systematically presents the subject matter for a broad audience and is the first book to focus on this exciting new topic. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find it a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students.

New Approaches for Security, Privacy and Trust in Complex Environments - Proceedings of the IFIP TC 11 22nd International... New Approaches for Security, Privacy and Trust in Complex Environments - Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This volume includes papers offering research contributions that focus both on access control in complex environments as well as other aspects of computer security and privacy.

Embedded Security in Cars - Securing Current and Future Automotive IT Applications (Paperback, Softcover reprint of hardcover... Embedded Security in Cars - Securing Current and Future Automotive IT Applications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Kerstin Lemke, Christof Paar, Marko Wolf
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge.

Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and personalization.

The first book in this area of fast-growing economic and scientific importance, it is indispensable for both researchers in software or embedded security and professionals in the automotive industry.

Image and Video Encryption - From Digital Rights Management to Secured Personal Communication (Paperback, Softcover reprint of... Image and Video Encryption - From Digital Rights Management to Secured Personal Communication (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Andreas Uhl, Andreas Pommer
R2,622 Discovery Miles 26 220 Ships in 18 - 22 working days

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).

The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.

New Directions of Modern Cryptography (Hardcover): Zhenfu Cao New Directions of Modern Cryptography (Hardcover)
Zhenfu Cao
R3,534 Discovery Miles 35 340 Ships in 10 - 15 working days

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography. This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.

Handover in DVB-H - Investigations and Analysis (Paperback, Softcover reprint of hardcover 1st ed. 2008): Xiaodong Yang Handover in DVB-H - Investigations and Analysis (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Xiaodong Yang
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

"European industry has already developed successful standards in the past, and I am very con?dent that on the basis of DVB-H, Mobile TV services can developtheeconomiesofscaletheyneedfortake-upacrossEuropeandaround the world," With these words of EU's Telecom Commissioner Viviane Reding, DVB-H is destined to be a dominating mobile TV technology in Europe and even in the world. I was ?rst getting in touch with the DVB technology when I was doing my PhD research in Brunel University in UK in 2002. At that time DVB-T was already a mature and widely used digital broadcast technology and anyone could easily buy a DVB-T receiver in the market to try the digital broadcast signals that have been already broadcasted in UK since 1998. Then the DVB technology world changed dramatically. As a more ?exible and robust terr- trial broadcast system targeting handsets, DVB-H was developed based on DVB-T. In 2003 the DVB-H community were continuously working to ?n- ize the standard. Finally in November 2004 DVB-H was adopted as an ETSI standard EN 302 304. I was lucky to see all these changes when I was doing my PhD research in DVB technology. And I was very proud to be involved in the di?erent DVB-H research projects since the beginning of the DVB-H standard development stage. I was also lucky enough that I am one of the ?rst persons who ?nished PhD degree by focusing on DVB-H research.

Universal Artificial Intelligence - Sequential Decisions Based on Algorithmic Probability (Paperback, Softcover reprint of... Universal Artificial Intelligence - Sequential Decisions Based on Algorithmic Probability (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Marcus Hutter
R2,429 Discovery Miles 24 290 Ships in 18 - 22 working days

Personal motivation. The dream of creating artificial devices that reach or outperform human inteUigence is an old one. It is also one of the dreams of my youth, which have never left me. What makes this challenge so interesting? A solution would have enormous implications on our society, and there are reasons to believe that the AI problem can be solved in my expected lifetime. So, it's worth sticking to it for a lifetime, even if it takes 30 years or so to reap the benefits. The AI problem. The science of artificial intelligence (AI) may be defined as the construction of intelligent systems and their analysis. A natural definition of a system is anything that has an input and an output stream. Intelligence is more complicated. It can have many faces like creativity, solving prob lems, pattern recognition, classification, learning, induction, deduction, build ing analogies, optimization, surviving in an environment, language processing, and knowledge. A formal definition incorporating every aspect of intelligence, however, seems difficult. Most, if not all known facets of intelligence can be formulated as goal driven or, more precisely, as maximizing some utility func tion. It is, therefore, sufficient to study goal-driven AI; e. g. the (biological) goal of animals and humans is to survive and spread. The goal of AI systems should be to be useful to humans."

Information Theory and Statistical Learning (Paperback, Softcover reprint of hardcover 1st ed. 2009): Frank Emmert-Streib,... Information Theory and Statistical Learning (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Frank Emmert-Streib, Matthias Dehmer
R2,695 Discovery Miles 26 950 Ships in 18 - 22 working days

"Information Theory and Statistical Learning" presents theoretical and practical results about information theoretic methods used in the context of statistical learning.

The book will present a comprehensive overview of the large range of different methods that have been developed in a multitude of contexts. Each chapter is written by an expert in the field. The book is intended for an interdisciplinary readership working in machine learning, applied statistics, artificial intelligence, biostatistics, computational biology, bioinformatics, web mining or related disciplines.

Advance Praise for "Information Theory and Statistical Learning"

"A new epoch has arrived for information sciences to integrate various disciplines such as information theory, machine learning, statistical inference, data mining, model selection etc. I am enthusiastic about recommending the present book to researchers and students, because it summarizes most of these new emerging subjects and methods, which are otherwise scattered in many places." Shun-ichi Amari, RIKEN Brain Science Institute, Professor-Emeritus at the University of Tokyo

Network-Aware Security for Group Communications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Yan Sun, Wade Trappe,... Network-Aware Security for Group Communications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Yan Sun, Wade Trappe, K.J. Ray Liu
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts).

Practical Internet Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): John R Vacca Practical Internet Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
John R Vacca
R2,759 Discovery Miles 27 590 Ships in 18 - 22 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Autonomic Computing and Networking (Paperback, Softcover reprint of hardcover 1st ed. 2009): Mieso Denko, Laurence Tianruo... Autonomic Computing and Networking (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Mieso Denko, Laurence Tianruo Yang, Yan Zhang
R4,059 Discovery Miles 40 590 Ships in 18 - 22 working days

Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, protocols, services, privacy & security, simulation and implementation testbeds. Autonomic computing and networking are new computing and networking paradigms that allow the creation of self-managing and self-controlling computing and networking environments using techniques such as distributed algorithms and context-awareness to dynamically control networking functions without human interventions. Autonomic networking is characterized by recovery from failures and malfunctions, agility to changing networking environment, self-optimization and self-awareness. The self-control and management features can help to overcome the growing complexity and heterogeneity of exiting communication networks and systems. The realization of fully autonomic heterogeneous networking introduces several research challenges in all aspects of computing and networking and related fields.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Evolving Software Systems
Tom Mens, Alexander Serebrenik, … Hardcover R3,539 Discovery Miles 35 390
Managing Trade-offs in Adaptable…
Ivan Mistrik, Nour Ali, … Paperback R2,310 R2,188 Discovery Miles 21 880
Data Prefetching Techniques in Computer…
Pejman Lotfi-Kamran, Hamid Sarbazi-Azad Hardcover R3,923 Discovery Miles 39 230
Tools and Techniques for Software…
Vishnu Pendyala Hardcover R5,309 Discovery Miles 53 090
Economics-Driven Software Architecture
Ivan Mistrik, Rami Bahsoon, … Paperback R2,304 Discovery Miles 23 040
Software Piracy Exposed
Ron Honick Paperback R926 Discovery Miles 9 260
Accelerated Testing and Validation
Alex Porter Paperback R1,734 Discovery Miles 17 340
Edge/Fog Computing Paradigm: The…
Pethuru Raj, Kavita Saini, … Hardcover R3,966 Discovery Miles 39 660
Advances in Computers, Volume 119
Suyel Namasudra Hardcover R4,194 Discovery Miles 41 940
Model-Driven Domain Analysis and…
Janis Osis, Erika Asnina Hardcover R4,650 Discovery Miles 46 500

 

Partners