0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (85)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Morphological Intelligence - Measuring the Body's Contribution to Intelligence (Hardcover, 1st ed. 2019): Keyan... Morphological Intelligence - Measuring the Body's Contribution to Intelligence (Hardcover, 1st ed. 2019)
Keyan Ghazi-Zahedi
R3,985 Discovery Miles 39 850 Ships in 10 - 15 working days

Intelligence results from the interaction of the brain, body and environment. The question addressed in this book is, can we measure the contribution of the body and its' interaction with the environment? To answer this, we first present a comprehensive overview of the various ways in which a body reduces the amount of computation that the brain has to perform to solve a task. This chapter will broaden your understanding of how important inconspicuously appearing physical processes and physical properties of the body are with respect to our cognitive abilities. This form of contribution to intelligence is called Morphological Intelligence. The main contribution of this book to the field is a detailed discussion of how Morphological Intelligence can be measured from observations alone. The required mathematical framework is provided so that readers unfamiliar with information theory will be able to understand and apply the measures. Case studies from biomechanics and soft robotics illustrate how the presented quantifications can, for example, be used to measure the contribution of muscle physics to jumping and optimise the shape of a soft robotic hand. To summarise, this monograph presents various examples of how the physical properties of the body and the body's interaction with the environment contribute to intelligence. Furthermore, it treats theoretical and practical aspects of Morphological Intelligence and demonstrates the value in two case studies.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition)
Branden Williams, James Adamson
R1,371 Discovery Miles 13 710 Ships in 9 - 17 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Geometric Structures of Information (Hardcover, 1st ed. 2019): Frank Nielsen Geometric Structures of Information (Hardcover, 1st ed. 2019)
Frank Nielsen
R4,068 Discovery Miles 40 680 Ships in 18 - 22 working days

This book focuses on information geometry manifolds of structured data/information and their advanced applications featuring new and fruitful interactions between several branches of science: information science, mathematics and physics. It addresses interrelations between different mathematical domains like shape spaces, probability/optimization & algorithms on manifolds, relational and discrete metric spaces, computational and Hessian information geometry, algebraic/infinite dimensional/Banach information manifolds, divergence geometry, tensor-valued morphology, optimal transport theory, manifold & topology learning, and applications like geometries of audio-processing, inverse problems and signal processing. The book collects the most important contributions to the conference GSI'2017 - Geometric Science of Information.

Hacking Connected Cars - Tactics, Techniques, and Procedures (Paperback): A. Knight Hacking Connected Cars - Tactics, Techniques, and Procedures (Paperback)
A. Knight
R1,113 R931 Discovery Miles 9 310 Save R182 (16%) Ships in 18 - 22 working days

A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.

Communications and Cryptography - Two Sides of One Tapestry (Hardcover, 1994 ed.): Richard E Blahut, Daniel J. Costello Jr,... Communications and Cryptography - Two Sides of One Tapestry (Hardcover, 1994 ed.)
Richard E Blahut, Daniel J. Costello Jr, Ueli Maurer, Thomas Mittelholzer
R5,528 Discovery Miles 55 280 Ships in 18 - 22 working days

Information theory is an exceptional field in many ways. Technically, it is one of the rare fields in which mathematical results and insights have led directly to significant engineering payoffs. Professionally, it is a field that has sustained a remarkable degree of community, collegiality and high standards. James L. Massey, whose work in the field is honored here, embodies the highest standards of the profession in his own career. The book covers the latest work on: block coding, convolutional coding, cryptography, and information theory. The 44 contributions represent a cross-section of the world's leading scholars, scientists and researchers in information theory and communication. The book is rounded off with an index and a bibliography of publications by James Massey.

Sensor Networks - Where Theory Meets Practice (Hardcover, 2009 ed.): Gianluigi Ferrari Sensor Networks - Where Theory Meets Practice (Hardcover, 2009 ed.)
Gianluigi Ferrari
R4,228 Discovery Miles 42 280 Ships in 18 - 22 working days

The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts: PartIisdenotedas"Theory,"sincethetopicsofits vechaptersareapparently "detached" from real scenarios; Part II is denoted as "Theory and Practice," since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as "Practice," since the topics of its ve chapters are clearly related to practical applications.

Cryptographic Methods (Hardcover): Abdul Razaque, Fathi Amsaad, Abrar Alajlan Cryptographic Methods (Hardcover)
Abdul Razaque, Fathi Amsaad, Abrar Alajlan
R1,333 Discovery Miles 13 330 Ships in 18 - 22 working days
Algorithmic Strategies for Solving Complex Problems in Cryptography (Hardcover): Kannan Balasubramanian, M. Rajakani Algorithmic Strategies for Solving Complex Problems in Cryptography (Hardcover)
Kannan Balasubramanian, M. Rajakani
R6,019 Discovery Miles 60 190 Ships in 18 - 22 working days

Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Algorithmic Strategies for Solving Complex Problems in Cryptography is an essential reference source that discusses the evolution and current trends in cryptology, and it offers new insight into how to use strategic algorithms to aid in solving intricate difficulties within this domain. Featuring relevant topics such as hash functions, homomorphic encryption schemes, two party computation, and integer factoring, this publication is ideal for academicians, graduate students, engineers, professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Digital Communication - Communication, Multimedia, Security (Hardcover, 2014): Christoph Meinel, Harald Sack Digital Communication - Communication, Multimedia, Security (Hardcover, 2014)
Christoph Meinel, Harald Sack
R2,837 R2,071 Discovery Miles 20 710 Save R766 (27%) Ships in 10 - 15 working days

The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities including a glossary for each chapter increase the practical benefit of this book that is well suited as well as for undergraduate students as for working practitioners.

Complexity Theory and Cryptology - An Introduction to Cryptocomplexity (Hardcover, 2005 ed.): Joerg Rothe Complexity Theory and Cryptology - An Introduction to Cryptocomplexity (Hardcover, 2005 ed.)
Joerg Rothe
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in complexity theory are often motivated by questions and problems from cryptology. This book takes account of this situation, and therefore its subject is what may be dubbed "cryptocomplexity'', a kind of symbiosis of these two areas.

This book is written for undergraduate and graduate students of computer science, mathematics, and engineering, and can be used for courses on complexity theory and cryptology, preferably by stressing their interrelation. Moreover, it may serve as a valuable source for researchers, teachers, and practitioners working in these fields. Starting from scratch, it works its way to the frontiers of current research in these fields and provides a detailed overview of their history and their current research topics and challenges.

Foundations of Genetic Programming (Hardcover, 2002 ed.): William B. Langdon, Riccardo Poli Foundations of Genetic Programming (Hardcover, 2002 ed.)
William B. Langdon, Riccardo Poli
R2,799 Discovery Miles 27 990 Ships in 18 - 22 working days

Genetic programming (GP), one of the most advanced forms of evolutionary computation, has been highly successful as a technique for getting computers to automatically solve problems without having to tell them explicitly how. Since its inceptions more than ten years ago, GP has been used to solve practical problems in a variety of application fields. Along with this ad-hoc engineering approaches interest increased in how and why GP works. This book provides a coherent consolidation of recent work on the theoretical foundations of GP. A concise introduction to GP and genetic algorithms (GA) is followed by a discussion of fitness landscapes and other theoretical approaches to natural and artificial evolution. Having surveyed early approaches to GP theory it presents new exact schema analysis, showing that it applies to GP as well as to the simpler GAs. New results on the potentially infinite number of possible programs are followed by two chapters applying these new techniques.

Cryptography and Network Security (Hardcover): Marcelo Sampaio De Alencar Cryptography and Network Security (Hardcover)
Marcelo Sampaio De Alencar
R3,456 Discovery Miles 34 560 Ships in 9 - 17 working days
Multi-photon Quantum Secure Communication (Hardcover, 1st ed. 2019): Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan Multi-photon Quantum Secure Communication (Hardcover, 1st ed. 2019)
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
R3,798 Discovery Miles 37 980 Ships in 18 - 22 working days

This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using the polarization channel of an optical fiber for conventional data encryption. The work presented in this book has largely been practically realized, albeit in a laboratory environment, to offer proof of concept rather than building a rugged instrument that can withstand the rigors of a commercial environment.

On the Learnability of Physically Unclonable Functions (Hardcover, 1st ed. 2018): Fatemeh Ganji On the Learnability of Physically Unclonable Functions (Hardcover, 1st ed. 2018)
Fatemeh Ganji
R2,632 Discovery Miles 26 320 Ships in 18 - 22 working days

This book addresses the issue of Machine Learning (ML) attacks on Integrated Circuits through Physical Unclonable Functions (PUFs). It provides the mathematical proofs of the vulnerability of various PUF families, including Arbiter, XOR Arbiter, ring-oscillator, and bistable ring PUFs, to ML attacks. To achieve this goal, it develops a generic framework for the assessment of these PUFs based on two main approaches. First, with regard to the inherent physical characteristics, it establishes fit-for-purpose mathematical representations of the PUFs mentioned above, which adequately reflect the physical behavior of these primitives. To this end, notions and formalizations that are already familiar to the ML theory world are reintroduced in order to give a better understanding of why, how, and to what extent ML attacks against PUFs can be feasible in practice. Second, the book explores polynomial time ML algorithms, which can learn the PUFs under the appropriate representation. More importantly, in contrast to previous ML approaches, the framework presented here ensures not only the accuracy of the model mimicking the behavior of the PUF, but also the delivery of such a model. Besides off-the-shelf ML algorithms, the book applies a set of algorithms hailing from the field of property testing, which can help to evaluate the security of PUFs. They serve as a "toolbox", from which PUF designers and manufacturers can choose the indicators most relevant for their requirements. Last but not least, on the basis of learning theory concepts, the book explicitly states that the PUF families cannot be considered as an ultimate solution to the problem of insecure ICs. As such, it provides essential insights into both academic research on and the design and manufacturing of PUFs.

Protocols and Procedures of Cryptography and Network Security (Hardcover): Stephen Mason Protocols and Procedures of Cryptography and Network Security (Hardcover)
Stephen Mason
R1,801 Discovery Miles 18 010 Ships in 10 - 15 working days
The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs)... The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs) (Hardcover)
Alex Caine, Matthew Thrush
R711 Discovery Miles 7 110 Ships in 10 - 15 working days
Alice and Bob Learn Application Security (Paperback): T Janca Alice and Bob Learn Application Security (Paperback)
T Janca
R1,116 R918 Discovery Miles 9 180 Save R198 (18%) Ships in 9 - 17 working days

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

Invariant Methods in Discrete and Computational Geometry - Proceedings of the Curacao Conference, 13-17 June, 1994 (Hardcover,... Invariant Methods in Discrete and Computational Geometry - Proceedings of the Curacao Conference, 13-17 June, 1994 (Hardcover, 1995 ed.)
Neil L. White
R2,837 Discovery Miles 28 370 Ships in 18 - 22 working days

Invariant, or coordinate-free methods provide a natural framework for many geometric questions. Invariant Methods in Discrete and Computational Geometry provides a basic introduction to several aspects of invariant theory, including the supersymmetric algebra, the Grassmann-Cayler algebra, and Chow forms. It also presents a number of current research papers on invariant theory and its applications to problems in geometry, such as automated theorem proving and computer vision. Audience: Researchers studying mathematics, computers and robotics.

Finite Commutative Rings and Their Applications (Hardcover, 2002 ed.): Gilberto Bini, Flaminio Flamini Finite Commutative Rings and Their Applications (Hardcover, 2002 ed.)
Gilberto Bini, Flaminio Flamini
R2,750 Discovery Miles 27 500 Ships in 18 - 22 working days

Foreword by Dieter Jungnickel
Finite Commutative Rings and their Applications answers a need for an introductory reference in finite commutative ring theory as applied to information and communication theory. This book will be of interest to both professional and academic researchers in the fields of communication and coding theory.

The book is a concrete and self-contained introduction to finite commutative local rings, focusing in particular on Galois and Quasi-Galois rings. The reader is provided with an active and concrete approach to the study of the purely algebraic structure and properties of finite commutative rings (in particular, Galois rings) as well as to their applications to coding theory.

Finite Commutative Rings and their Applications is the first to address both theoretical and practical aspects of finite ring theory. The authors provide a practical approach to finite rings through explanatory examples, thereby avoiding an abstract presentation of the subject. The section on Quasi-Galois rings presents new and unpublished results as well. The authors then introduce some applications of finite rings, in particular Galois rings, to coding theory, using a solid algebraic and geometric theoretical background.

This text is suitable for courses in commutative algebra, finite commutative algebra, and coding theory. It is also suitable as a supplementary text for courses in discrete mathematics, finite fields, finite rings, etc.

Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Hardcover, Hardback ed.): Aida S?ibic? Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Hardcover, Hardback ed.)
Aida Šibić; Edited by Laura L Bush
R697 R646 Discovery Miles 6 460 Save R51 (7%) Ships in 18 - 22 working days
Recent Advances in RSA Cryptography (Hardcover, 2001 ed.): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Hardcover, 2001 ed.)
Stefan Katzenbeisser
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Classical, Semi-classical and Quantum Noise (Hardcover, 2012): Leon Cohen, H. Vincent Poor, Marlan O. Scully Classical, Semi-classical and Quantum Noise (Hardcover, 2012)
Leon Cohen, H. Vincent Poor, Marlan O. Scully
R4,642 Discovery Miles 46 420 Ships in 10 - 15 working days

David Middleton was a towering figure of 20th Century engineering and science and one of the founders of statistical communication theory. During the second World War, the young David Middleton, working with Van Fleck, devised the notion of the matched filter, which is the most basic method used for detecting signals in noise. Over the intervening six decades, the contributions of Middleton have become classics. This collection of essays by leading scientists, engineers and colleagues of David are in his honor and reflect the wide influence that he has had on many fields. Also included is the introduction by Middleton to his forthcoming book, which gives a wonderful view of the field of communication, its history and his own views on the field that he developed over the past 60 years. Focusing on classical noise modeling and applications, Classical, Semi-Classical and Quantum Noise includes coverage of statistical communication theory, non-stationary noise, molecular footprints, noise suppression, Quantum error correction, and other related topics.

Computational Techniques for Text Summarization based on Cognitive Intelligence (Hardcover): K.Uma Maheswari, V. Priya Computational Techniques for Text Summarization based on Cognitive Intelligence (Hardcover)
K.Uma Maheswari, V. Priya
R2,871 Discovery Miles 28 710 Ships in 9 - 17 working days

The book is concerned with contemporary methodologies used for automatic text summarization. It proposes interesting approaches to solve well-known problems on text-summarization using computational intelligence (CI) techniques including cognitive approaches. A better understanding of the cognitive basis of the summarization task is still an open research issue, an extent of its use in text summarization is highlighted for further exploration. With the ever-growing text and people on research has little time to spare for extensive reading, where, summarized information helps for a better understanding of the context at a shorter time. This book helps students and researchers to automatically summarize the text documents in an efficient and effective way. The computational approaches and the research techniques presented guides to achieve text summarization at ease. The summarized text generated supports readers to learn the context or the domain at a quicker pace. The book is presented with reasonable amount of illustrations and examples convenient for the readers to understand and implement for their use. The book is not to make readers understand what text summarization is, but for people to perform text summarization using various approaches. This also describes measures that can help to evaluate, determine and explore the best possibilities for text summarization to analyse and use for any specific purpose. The illustration is based on social media and healthcare domain, which shows the possibilities to work with any domain for summarization. The new approach for text summarization based on cognitive intelligence is presented for further exploration in the field.

Quantum Attacks on Public-Key Cryptosystems (Hardcover, 2013 ed.): Song Y. Yan Quantum Attacks on Public-Key Cryptosystems (Hardcover, 2013 ed.)
Song Y. Yan
R3,571 R3,311 Discovery Miles 33 110 Save R260 (7%) Ships in 10 - 15 working days

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

"Quantum Attacks on Public-Key Cryptosystems" presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Ubiquitous Computing Application and Wireless Sensor - UCAWSN-14 (Hardcover, 2015 ed.): James J (Jong Hyuk) Park, Yi Pan,... Ubiquitous Computing Application and Wireless Sensor - UCAWSN-14 (Hardcover, 2015 ed.)
James J (Jong Hyuk) Park, Yi Pan, Han-Chieh Chao, Gangman Yi
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

IT changes everyday's life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Micro-Tec Socket Set Standard & Long…
Cloud Security - Concepts…
Information Reso Management Association Hardcover R8,951 Discovery Miles 89 510
King Tony Spanner Combination (17mm)
Universal Joint 1/2" Drive
King Tony Spark Plug Socket Chrome…
King Tony Socket Deep 12P (1/2" x 14mm)
Research Anthology on Securing Medical…
Information R Management Association Hardcover R11,321 Discovery Miles 113 210
King Tony Spanner Combination (24mm)
Computer Networking - The Complete…
Benjamin Walker Hardcover R570 R524 Discovery Miles 5 240
Micro-Tec Spanner Offset Combination…

 

Partners