0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R1,309 Discovery Miles 13 090 Ships in 9 - 17 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Privacy-Preserving Data Mining - Models and Algorithms (Paperback, Softcover reprint of hardcover 1st ed. 2008): Charu C.... Privacy-Preserving Data Mining - Models and Algorithms (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Charu C. Aggarwal, Philip S. Yu
R6,115 Discovery Miles 61 150 Ships in 10 - 15 working days

Advances in hardware technology have increased the capability to store and record personal data. This has caused concerns that personal data may be abused. This book proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. This edited volume contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy. The book is designed for researchers, professors, and advanced-level students in computer science, but is also suitable for practitioners in industry.

Intrusion Detection Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008): Roberto Di Pietro, Luigi V. Mancini Intrusion Detection Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Roberto Di Pietro, Luigi V. Mancini
R4,570 Discovery Miles 45 700 Ships in 10 - 15 working days

To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.

Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30... Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura
R4,447 Discovery Miles 44 470 Ships in 10 - 15 working days

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009 and Second International... Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers (Paperback, Edition.)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009.

The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2009 papers cover topics such as privacy in service oriented architectures, privacy-preserving mechanisms, crossmatching and indistinguishability techniques, privacy policies, and disclosure of information. The SETOP 2009 papers address all current issues within the sope of security policies, identification and privacy, as well as security mechanisms.

Intelligent Agents - Theory and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2004): Germano Resconi Intelligent Agents - Theory and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Germano Resconi
R4,384 Discovery Miles 43 840 Ships in 10 - 15 working days

This research book presents the agent theory and adaptation of agents in different contexts. Agents of different orders of complexity must be autonomous in the rules used. The agent must have a brain by which it can discover rules contained within the data. Because rules are the instruments by which agents change the environment, any adaptation of the rules can be considered as an evolution of the agents. Because uncertainty is present in every context, we shall describe in this book how it is possible to introduce global uncertainty from the local world into the description of the rules. This book contains ten chapters. Chapter 1 gives a general dscription of the evolutionary adaptation agent. Chapter 2 describes the actions and meta actions of the agent at different orders. Chapter 3 presents in an abstract and formal way the actions at different orders. Chapter 4 connects systems and meta systems with the adaptive agent. Chapter 5 describes the brain of the agent by the morphogenetic neuron theory. Chapter 6 introduces the logic structure of the adaptive agent. Chapter 7 describes the feedback and hyper-feedback in the adaptive agent. Chapter 8 introduces the adaptation field into the modal logic space as logic instrument in the adaptive agent. Chapter 9 describes the action of the agent in the physical domain. Chapter 10 presents the practical application of agents in robots and evolutionary computing."

Security in E-Learning (Paperback, Softcover reprint of hardcover 1st ed. 2005): Edgar R. Weippl Security in E-Learning (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Edgar R. Weippl
R2,847 Discovery Miles 28 470 Ships in 10 - 15 working days

As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.

Botnet Detection - Countering the Largest Security Threat (Paperback, Softcover reprint of hardcover 1st ed. 2008): Wenke Lee,... Botnet Detection - Countering the Largest Security Threat (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Wenke Lee, Cliff Wang, David Dagon
R4,324 Discovery Miles 43 240 Ships in 10 - 15 working days

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.

Handbook of Biometrics (Paperback, Softcover reprint of hardcover 1st ed. 2008): Anil K. Jain, Patrick Flynn, Arun A. Ross Handbook of Biometrics (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Anil K. Jain, Patrick Flynn, Arun A. Ross
R4,650 Discovery Miles 46 500 Ships in 10 - 15 working days

Biometrics is a rapidly evolving field with applications ranging from accessing one 's computer to gaining entry into a country. The deployment of large-scale biometric systems in both commercial and government applications has increased public awareness of this technology. Recent years have seen significant growth in biometric research resulting in the development of innovative sensors, new algorithms, enhanced test methodologies and novel applications. This book addresses this void by inviting some of the prominent researchers in Biometrics to contribute chapters describing the fundamentals as well as the latest innovations in their respective areas of expertise.

Understanding Intrusion Detection through Visualization (Paperback, Softcover reprint of hardcover 1st ed. 2006): Stefan... Understanding Intrusion Detection through Visualization (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Stefan Axelsson, David Sands
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection. Four different visualization approaches are presented, mainly applied to data from web server access logs.

Foundations and Applications of Sensor Management (Paperback, Softcover reprint of hardcover 1st ed. 2008): Alfred Olivier... Foundations and Applications of Sensor Management (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Alfred Olivier Hero, David Castanon, Doug Cochran, Keith Kastella
R4,358 Discovery Miles 43 580 Ships in 10 - 15 working days

This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.

Privacy, Security and Trust within the Context of Pervasive Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005):... Privacy, Security and Trust within the Context of Pervasive Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Philip Robinson, Harald Vogt, Waleed Wagealla
R2,841 Discovery Miles 28 410 Ships in 10 - 15 working days

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.

The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Secure Multi-Party Non-Repudiation Protocols and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2009): Jose A.... Secure Multi-Party Non-Repudiation Protocols and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jose A. Onieva, Jianying Zhou
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.

The Theory of Partial Algebraic Operations (Paperback, Softcover reprint of hardcover 1st ed. 1997): E.S. Ljapin, A.E. Evseev The Theory of Partial Algebraic Operations (Paperback, Softcover reprint of hardcover 1st ed. 1997)
E.S. Ljapin, A.E. Evseev
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Nowadays algebra is understood basically as the general theory of algebraic oper ations and relations. It is characterised by a considerable intrinsic naturalness of its initial notions and problems, the unity of its methods, and a breadth that far exceeds that of its basic concepts. It is more often that its power begins to be displayed when one moves outside its own limits. This characteristic ability is seen when one investigates not only complete operations, but partial operations. To a considerable extent these are related to algebraic operators and algebraic operations. The tendency to ever greater generality is amongst the reasons that playa role in explaining this development. But other important reasons play an even greater role. Within this same theory of total operations (that is, operations defined everywhere), there persistently arises in its different sections a necessity of examining the emergent feature of various partial operations. It is particularly important that this has been found in those parts of algebra it brings together and other areas of mathematics it interacts with as well as where algebra finds applica tion at the very limits of mathematics. In this connection we mention the theory of the composition of mappings, category theory, the theory of formal languages and the related theory of mathematical linguistics, coding theory, information theory, and algebraic automata theory. In all these areas (as well as in others) from time to time there arises the need to consider one or another partial operation."

Video Coding with Superimposed Motion-Compensated Signals - Applications to H.264 and Beyond (Paperback, Softcover reprint of... Video Coding with Superimposed Motion-Compensated Signals - Applications to H.264 and Beyond (Paperback, Softcover reprint of the original 1st ed. 2004)
Markus Flierl, Bernd Girod
R2,839 Discovery Miles 28 390 Ships in 10 - 15 working days

Appendices 133 A Mathematical Results 133 A.1 Singularities of the Displacement Error Covariance Matrix 133 A.2 A Class of Matrices and their Eigenvalues 134 A.3 Inverse of the Power Spectral Density Matrix 134 A.4 Power Spectral Density of a Frame 136 Glossary 137 References 141 Index 159 Preface This book aims to capture recent advances in motion compensation for - ficient video compression. It investigates linearly combined motion comp- sated signals and generalizes the well known superposition for bidirectional prediction in B-pictures. The number of superimposed signals and the sel- tion of reference pictures will be important aspects of the discussion. The application oriented part of the book employs this concept to the well known ITU-T Recommendation H.263 and continues with the improvements by superimposed motion-compensated signals for the emerging ITU-T R- ommendation H.264 and ISO/IEC MPEG-4 (Part 10). In addition, it discusses a new approach for wavelet-based video coding. This technology is currently investigated by MPEG to develop a new video compression standard for the mid-term future.

Computer Viruses and Malware (Paperback, Softcover reprint of hardcover 1st ed. 2006): John Aycock Computer Viruses and Malware (Paperback, Softcover reprint of hardcover 1st ed. 2006)
John Aycock
R3,611 Discovery Miles 36 110 Ships in 10 - 15 working days

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.

Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.

CryptoGraphics - Exploiting Graphics Cards For Security (Paperback, Softcover reprint of hardcover 1st ed. 2006): Debra Cook,... CryptoGraphics - Exploiting Graphics Cards For Security (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Debra Cook, Angelos D. Keromytis
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.

Statistical and Inductive Inference by Minimum Message Length (Paperback, Softcover reprint of hardcover 1st ed. 2005): C.S.... Statistical and Inductive Inference by Minimum Message Length (Paperback, Softcover reprint of hardcover 1st ed. 2005)
C.S. Wallace
R3,164 Discovery Miles 31 640 Ships in 10 - 15 working days

Mythanksareduetothemanypeoplewhohaveassistedintheworkreported here and in the preparation of this book. The work is incomplete and this account of it rougher than it might be. Such virtues as it has owe much to others; the faults are all mine. MyworkleadingtothisbookbeganwhenDavidBoultonandIattempted to develop a method for intrinsic classi?cation. Given data on a sample from some population, we aimed to discover whether the population should be considered to be a mixture of di?erent types, classes or species of thing, and, if so, how many classes were present, what each class looked like, and which things in the sample belonged to which class. I saw the problem as one of Bayesian inference, but with prior probability densities replaced by discrete probabilities re?ecting the precision to which the data would allow parameters to be estimated. Boulton, however, proposed that a classi?cation of the sample was a way of brie?y encoding the data: once each class was described and each thing assigned to a class, the data for a thing would be partially implied by the characteristics of its class, and hence require little further description. After some weeks' arguing our cases, we decided on the maths for each approach, and soon discovered they gave essentially the same results. Without Boulton's insight, we may never have made the connection between inference and brief encoding, which is the heart of this work.

Data Warehousing and Data Mining Techniques for Cyber Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): Anoop... Data Warehousing and Data Mining Techniques for Cyber Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Anoop Singhal
R4,324 Discovery Miles 43 240 Ships in 10 - 15 working days

The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks. These security breaches include attacks on single computers, computer networks, wireless networks, databases, or authentication compromises. This book describes data warehousing and data mining techniques that can be used to detect attacks. It is designed to be a useful handbook for practitioners and researchers in industry, and is also suitable as a text for advanced-level students in computer science.

Network Security Policies and Procedures (Paperback, Softcover reprint of hardcover 1st ed. 2007): Douglas W. Frye Network Security Policies and Procedures (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Douglas W. Frye
R4,078 Discovery Miles 40 780 Ships in 10 - 15 working days

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will thus be better equipped to act in a way that forwards an organization s goals.

Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering."

Information Criteria and Statistical Modeling (Paperback, 1st ed. Softcover of orig. ed. 2008): Sadanori Konishi, Genshiro... Information Criteria and Statistical Modeling (Paperback, 1st ed. Softcover of orig. ed. 2008)
Sadanori Konishi, Genshiro Kitagawa
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Statistical modeling is a critical tool in scientific research. This book provides comprehensive explanations of the concepts and philosophy of statistical modeling, together with a wide range of practical and numerical examples. The authors expect this work to be of great value not just to statisticians but also to researchers and practitioners in various fields of research such as information science, computer science, engineering, bioinformatics, economics, marketing and environmental science. It 's a crucial area of study, as statistical models are used to understand phenomena with uncertainty and to determine the structure of complex systems. They re also used to control such systems, as well as to make reliable predictions in various natural and social science fields.

Binary Quadratic Forms - An Algorithmic Approach (Paperback, Softcover reprint of hardcover 1st ed. 2007): Johannes Buchmann,... Binary Quadratic Forms - An Algorithmic Approach (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Johannes Buchmann, Ulrich Vollmer
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

The book deals with algorithmic problems related to binary quadratic forms. It uniquely focuses on the algorithmic aspects of the theory. The book introduces the reader to important areas of number theory such as diophantine equations, reduction theory of quadratic forms, geometry of numbers and algebraic number theory. The book explains applications to cryptography and requires only basic mathematical knowledge. The author is a world leader in number theory.

Entropy, Search, Complexity (Paperback, Softcover reprint of hardcover 1st ed. 2007): Imre Csisz ar, Gyula O.H. Katona, Gabor... Entropy, Search, Complexity (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Imre Csisz ar, Gyula O.H. Katona, Gabor Tardos
R2,875 Discovery Miles 28 750 Ships in 10 - 15 working days

This book collects survey papers in the fields of entropy, search and complexity, summarizing the latest developments in their respective areas. More than half of the papers belong to search theory which lies on the borderline of mathematics and computer science, information theory and combinatorics, respectively. The book will be useful to experienced researchers as well as young scientists and students both in mathematics and computer science.

Quantum Communication and Quantum Networking - First International Conference, QuantumComm 2009, Naples, Italy, October 26-30,... Quantum Communication and Quantum Networking - First International Conference, QuantumComm 2009, Naples, Italy, October 26-30, 2009, Revised Selected Papers (Paperback, Edition.)
Alexander Sergienko, Saverio Pascazio, Paolo Villoresi
R1,531 Discovery Miles 15 310 Ships in 10 - 15 working days

QUANTUMCOMM 2009--the International Conference on Quantum Communi- tion and Quantum Networking (from satellite to nanoscale)--took place in Vico Equense near Naples, Italy, during October 26-30, 2009. The conference made a significant step toward stimulating direct dialogue between the communities of quantum physics and quantum information researchers who work with photons, atoms, and electrons in pursuit of the common goal of investigating and utilizing the transfer of physical information between quantum systems. This meeting brought together experts in quantum communication, quantum inf- mation processing, quantum nanoscale physics, quantum photonics, and networking. In the light of traditional approaches to quantum information processing, quantum communication mainly deals with encoding and securely distributing quantum states of light in optical fiber or in free space in order to provide the technical means for quantum cryptography applications. Exciting advances in the area of quantum c- munication over the last decade have made the metropolitan quantum network a re- ity. Several papers presented at this meeting have demonstrated that quantum crypt- raphy is approaching the point of becoming a high-tech application rather than a - search subject. The natural distance limitation of quantum cryptography has been significantly augmented using ideas of global quantum communication with stab- orbit satellites. The results presented at this conference demonstrated that practical secure satellite communication is clearly within reach.

Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007): Friedrich L. Bauer Decrypted Secrets - Methods and Maxims of Cryptology (Paperback, 4th ed. 2007)
Friedrich L. Bauer
R5,654 Discovery Miles 56 540 Ships in 10 - 15 working days

In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the unscrupulous. The revised and extended third edition of this classic reference work on cryptology offers a wealth of new technical and biographical details. The book presupposes only elementary mathematical knowledge. Spiced with exciting, amusing, and sometimes personal accounts from the history of cryptology, it will interest general a broad readership.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Bibliographic Guide to Resources in…
Jeffrey R. Yost Hardcover R2,103 Discovery Miles 21 030
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek Hardcover R1,550 Discovery Miles 15 500
Software Requirements - Styles and…
Soren Lauesen Paperback R2,205 Discovery Miles 22 050
Exploring the Cognitive, Social…
Brock R Dubbels Hardcover R5,138 Discovery Miles 51 380
Programming Logic & Design
Joyce Farrell Paperback R800 Discovery Miles 8 000
Graph Data Management - Fundamental…
George Fletcher, Jan Hidders, … Hardcover R1,525 Discovery Miles 15 250
The Best Damn Windows Server 2008 Book…
Anthony Piltzecker Paperback R1,358 Discovery Miles 13 580
Research Issues in Systems Analysis and…
Hardcover R2,819 Discovery Miles 28 190
Beginning Windows 8 Data Development…
Vinodh Kumar Paperback R2,000 Discovery Miles 20 000
A First Course in Network Theory
Ernesto Estrada, Philip A Knight Hardcover R3,570 Discovery Miles 35 700

 

Partners