0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Computer Architecture and Organization - Fundamentals and Architecture Security (Paperback, 1st ed. 2021): Shuangbao Paul Wang Computer Architecture and Organization - Fundamentals and Architecture Security (Paperback, 1st ed. 2021)
Shuangbao Paul Wang
R1,430 Discovery Miles 14 300 Ships in 10 - 15 working days

In today's workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks. Studying computer architecture and organization from a security perspective is a new area. There are many books on computer architectures and many others on computer security. However, books introducing computer architecture and organization with security as the main focus are still rare. This book addresses not only how to secure computer components (CPU, Memory, I/O, and network) but also how to secure data and the computer system as a whole. It also incorporates experiences from the author's recent award-winning teaching and research. The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU, cache security, virtualization, cloud computing, IoT, and quantum computing, as well as other advanced computing topics into the classroom in order to close the gap in workforce development. The book is chiefly intended for undergraduate and graduate students in computer architecture and computer organization, as well as engineers, researchers, cybersecurity professionals, and middleware designers.

Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992): Dennis Longley, Michael Shain,... Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992)
Dennis Longley, Michael Shain, William Caelli
R1,498 Discovery Miles 14 980 Ships in 18 - 22 working days

Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The dictionary contains extended essays on risk analysis, personal computing, key management, pin management and authentication.

Handbook of Personal Data Protection (Paperback, 1st ed. 1992): Wayne Madsen Handbook of Personal Data Protection (Paperback, 1st ed. 1992)
Wayne Madsen
R4,760 Discovery Miles 47 600 Ships in 18 - 22 working days

Although the concept of personal data protection began in Europe in the early 1970s, data protection legislation has been adopted in many countries. In Europe there is a wide divergence of policies between members of the EC, non-EC members and the new democracies of Eastern Europe. This volume explains these differences and also, uniquely, focuses on the abuses of personal data in the developing nations of Latin America, Asia and Africa. It also includes the latest national and international laws, initiatives and guidelines on personal data protection. It is the first reference work to combine these various documents in a single volume source.

Advances in Computing and Information - ICCI '90 - International Conference on Computing and Information Niagara Falls,... Advances in Computing and Information - ICCI '90 - International Conference on Computing and Information Niagara Falls, Canada, May 23-26, 1990. Proceedings (Paperback, 1990 ed.)
Selim G Akl, Frantisek Fiala, Waldemar W Koczkodaj
R1,577 Discovery Miles 15 770 Ships in 18 - 22 working days

This volume contains selected and invited papers presented at the International Conference on Computing and Information, ICCI '90, Niagara Falls, Ontario, Canada, May 23-26, 1990. ICCI conferences provide an international forum for presenting new results in research, development and applications in computing and information. Their primary goal is to promote an interchange of ideas and cooperation between practitioners and theorists in the interdisciplinary fields of computing, communication and information theory. The four main topic areas of ICCI '90 are: - Information and coding theory, statistics and probability, - Foundations of computer science, theory of algorithms and programming, - Concurrency, parallelism, communications, networking, computer architecture and VLSI, - Data and software engineering, databases, expert systems, information systems, decision making, and AI methodologies.

Information Security in Financial Services (Paperback, 1st ed. 1991): Ken Slater Information Security in Financial Services (Paperback, 1st ed. 1991)
Ken Slater
R2,928 Discovery Miles 29 280 Ships in 18 - 22 working days

Introduction - Risk and Vulnerability in the Financial Sector - The Security Policy - Personnel Security - Physical Security - Security of Computer Operations - Communications Security - Controlling the System - Secure System Development and Maintenance - Logical Access Security - Securing the Customer's Cash - If the Worst Happens: Disaster Recovery and Insurance - Microcomputer Security - Risk Analysis - Managing Security - The Auditor - Security Aspects of Compliance Reviews - Appendices - Glossary: The Language of Security

Modern Cryptology - A Tutorial (Paperback, 1988 ed.): Gilles Brassard Modern Cryptology - A Tutorial (Paperback, 1988 ed.)
Gilles Brassard
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. It can thus be used as independent reading by whoever wishes to get started on the subject. An extensive bibliography of 250 references is included to help the reader deepen his or her understanding and go beyond the topics treated here. This book can also be used as preliminary material for an introductory course on cryptology. Despite its simplicity, it covers enough state-of-the-art material to be nevertheless of interest to the specialist. After a survey of the main secret and public key techniques, various applications are discussed. The last chapter describes 'quantum cryptography', a revolutionary approach to cryptography that remains secure even against an opponent with unlimited computing power. Quantum crytography is based on the principles of quantum physics.

Advances in Cryptology - CRYPTO '89 - Proceedings (Paperback, 1990 ed.): Gilles Brassard Advances in Cryptology - CRYPTO '89 - Proceedings (Paperback, 1990 ed.)
Gilles Brassard
R1,618 Discovery Miles 16 180 Ships in 18 - 22 working days

CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key distribution and network security, fast computation, odds and ends, zero-knowledge and oblivious transfer, multiparty computation.

Advances in Cryptology - CRYPTO '88 - Proceedings (Paperback, 1990 ed.): Shafi Goldwasser Advances in Cryptology - CRYPTO '88 - Proceedings (Paperback, 1990 ed.)
Shafi Goldwasser
R1,662 Discovery Miles 16 620 Ships in 18 - 22 working days

The papers in this voluriic were presented at the CHYP'I'O 'SS conf- ence on theory and applications of cryptography, Iicld August 21-2, j. 19SS in Sarita Uarbara, ('alifornia. The conference was sponsored hy the Int- national AssociatioIi for C'ryptologic Research (IAC'R) and hosted by the computer science depart incnt at the llniversity of California at Sarita D- ha ra . 'rile 4-1 papers presented hcrc coniprise: 35 papers selected from 61 - tcwded abstracts subniittctl in response to the call for papcrs, 1 invitcd prv sentations, and 6 papers sclccted from a large niiiii1, cr of informal UIIIJ) sewion present at ionc. The papers wcrc chosen by the program committee on the lja\is of tlic perceived originality, quality and relevance to the field of cryptography of the cxtcndcd allst ract5 suhriiitted. 'I'hc su1, missioris wv riot otlierwise rc.fcrcc(l. a id ofteri rcprescnt prcliininary reports on continuing rcscarc.11. It is a pleasure to tharik many colleagues. Ilarold Iredrickscri sing- made CRJ'PTO '88 a successful realit, y. Eric Dacli, Pad Ijnrret. haridedly Tom Bersori, Gilles Brassard, Ocled Goldreich, Andrew Odlyzko. C'liarles Rackoff arid Ron Rivest did excellerit work on the program comrriittcc in piittirig the technical program together, assisted by kind outsick reviekvers.

Digital Communication (Paperback, Softcover reprint of the original 1st ed. 1988): Edward A. Lee, David G Messerschmitt Digital Communication (Paperback, Softcover reprint of the original 1st ed. 1988)
Edward A. Lee, David G Messerschmitt
R2,762 Discovery Miles 27 620 Ships in 18 - 22 working days

This book concerns digital communication. Specifically, we treat the transport of bit streams from one geographical location to another over various physical media, such as wire pairs, coaxial cable, optical fiber, and radio waves. Further, we cover the mul tiplexing, multiple access, and synchronization issues relevant to constructing com munication networks that simultaneously transport bit streams from many users. The material in this book is thus directly relevant to the design of a multitude of digital communication systems, including for example local and metropolitan area data net works, voice and video telephony systems, the integrated services digital network (ISDN), computer communication systems, voiceband data modems, and satellite communication systems. We extract the common principles underlying these and other applications and present them in a unified framework. This book is intended for designers and would-be designers of digital communication systems. To limit the scope to manageable proportions we have had to be selective in the topics covered and in the depth of coverage. In the case of advanced information, coding, and detection theory, for example, we have not tried to duplicate the in-depth coverage of many advanced textbooks, but rather have tried to cover those aspects directly relevant to the design of digital communication systems."

Coding Theory and Applications - 3rd International Colloquium, Toulon, France, November 2-4, 1988. Proceedings (Paperback, 1989... Coding Theory and Applications - 3rd International Colloquium, Toulon, France, November 2-4, 1988. Proceedings (Paperback, 1989 ed.)
Gerard Daniel Cohen, Jacques Wolfmann
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This book contains a selection of papers presented at a Symposium on coding theory: "3 Journees sur le Codage," held November 24-26, 1986, in Cachan near Paris, France. It gives an account of the state of the art of research in France on Coding, ranging from rather theoretical topics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and implementation of coding algorithms on microcomputers. The symposium was the second one of this type. With its broad spectrum, it was a unique opportunity for contacts between university and industry on the topics of information and coding theory.

Coding Theory and Applications - 2nd International Colloquium, Cachan-Paris, France, November 24-26, 1986. Proceedings... Coding Theory and Applications - 2nd International Colloquium, Cachan-Paris, France, November 24-26, 1986. Proceedings (Paperback, 1988 ed.)
Gerard Daniel Cohen, Philippe Godlewski
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

This book contains a selection of papers presented at a Symposium on coding theory: "3 Journ es sur le Codage," held November 24-26, 1986, in Cachan near Paris, France. It gives an account of the state of the art of research in France on Coding, ranging from rather theoretical topics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and implementation of coding algorithms on microcomputers. The symposium was the second one of this type. With its broad spectrum, it was a unique opportunity for contacts between university and industry on the topics of information and coding theory.

Advances in Cryptology - CRYPTO '86 - Proceedings (Paperback, 1987 ed.): Andrew M. Odlyzko Advances in Cryptology - CRYPTO '86 - Proceedings (Paperback, 1987 ed.)
Andrew M. Odlyzko
R1,948 Discovery Miles 19 480 Ships in 18 - 22 working days

This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have all been held at the University of California at Santa Barbara. The first conference in this series, CRYPTO 81, organized by A. Gersho, did not have a formal proceedings. The proceedings of the following four conferences in this series have been published as: Advances in Cryptology: Proceedings of Crypto 82, D. Chaum, R. L. Rivest, and A. T. Sherman, eds., Plenum, 1983. Advances in Cryptology: Proceedings of Crypto 83, D. Chaum, ed., Plenum, 1984. Advances in Cryptology: Proceedings of CRYPTO 84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Computer Science #196, Springer, 1985. Advances in Cryptology - CRYPTO '85 Proceedings, H. C. Williams, ed., Lecture Notes in Computer Science #218, Springer, 1986. A parallel series of conferences is held annually in Europe. The first of these had its proceedings published as Cryptography: Proceedings, Burg Feuerstein 1982, T. Beth, ed., Lecture Notes in Computer Science #149, Springer, 1983.

Datenschutz und Datensicherung im Wandel der Informationstechnologien - 1.GI-Fachtagung Munchen, 30. und 31. Oktober 1985... Datenschutz und Datensicherung im Wandel der Informationstechnologien - 1.GI-Fachtagung Munchen, 30. und 31. Oktober 1985 Proceedings (English, German, Paperback)
P. P. Spies
R1,749 Discovery Miles 17 490 Ships in 18 - 22 working days

Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In- formatik sieht es als seine Aufgabe an, Probleme des Datenschutzes und der Datensicherung aus der Sicht der Informatik zu behandeln. Er hat in diesem Rahmen grundsatzliche Aus- sagen zu diesen Themen unter besonderer Berucksichtigung der sich rasch entwickelnden In- formationstechnologien erarbeitet und zu Entwurfen fur Anderungen des Bundesdatenschutz- gesetzes Stellung genommen. Aus dieser Tatigkeit heraus entstand der Plan zur Durchfuh- rung einer Fachtagung mit dem Thema "Datenschutz und Datensicherung im Wandel der Informationstechnologien". Diese Tagung, deren Beitrage dieser Band enthalt, findet am 30. und 31. Oktober 1985 im Rahmen der SYSTEMS 85 statt. Sie soll die Datenschutz- und Datensicherungs-Probleme, die mit den wachsenden technologischen Moglichkeiten entstehen, aus der Sicht der Informa- tionstechnik beleuchten. Sie soll Methoden, Verfahren und Hilfsmittel aufzeigen, mit denen die Datenschutz- und Datensicherungs-Probleme konstruktiv einer Losung naher gebracht werden konnen. Sie soll Anwender von Rechensystemen und Kommunikationsnetzen, Juristen und Informatiker dazu anregen, gemeinsam uber Datenschutz- und Datensicherungs-Probleme nachzudenken und miteinander Losungen dieser Probleme zu erarbeiten.

Advances in Cryptology - Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques -... Advances in Cryptology - Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984 (Paperback, 1985 ed.)
Thomas Beth, Norbert Cot, Ingemar Ingemarsson
R1,944 Discovery Miles 19 440 Ships in 18 - 22 working days

This book contains the proceedings of EUROCRYPT 85, held in Paris in 1984, April 9-11, at the University of Paris, Sorbonne. EIJROCRYPT is now an annual international European meeting in cryptology, intended primarily for the international of researchers in this area. EUROCRYPT 84 was community following previous meetings held at Burg Feuerstein in 1982 and at IJdine in 1983. In fact EUROCRYPT 84 was thc first such meeting being organized under IXCR (International Association of Cryptology Research). Other sponsors were the well-known French association on cybernetics research AFCET, the LITP (Laborstoire d' Informntique thcorique called et de Programmation), which is a laboratory of computer science associated with CNRS, and the department of mathematics and computer science at the Ilniversity RenE Descartcs, Sorbonne. EUROCRYPT 83 was very successfull, with about 180 participants from a great variety of foreign countries and 50 papers addressing all aspects of cryptology, close to applied as well as theoretical. It also had a special feature, i.e. a special session on smart cards particularly welcome at the time, since France was then carrying on an ambitious program on smart cards. EUROCRYPT 84 was a great experience. We like to thank all the sponsors and all the authors for their submission of papers. Pakin, Decemben 74ti4. CONTENTS SECTION I: GENERAL THEORY, CLASSICAL METHODS 3 Cryptology and Complexity Theories ............................ G. RLiGGTU 1 0 On Cryptosystems based on Folynomials md I'inite Fields.. ..... R. irvi 16 Algehraical Structures of Cryptographic lransformations.. .....

Feedback Shift Registers (Paperback, 1984 ed.): Christian Ronse Feedback Shift Registers (Paperback, 1984 ed.)
Christian Ronse
R690 Discovery Miles 6 900 Ships in 18 - 22 working days
Advances in Cryptology - Proceedings of CRYPTO '84 (Paperback, 1985 ed.): G. R Blakely, D. Chaum Advances in Cryptology - Proceedings of CRYPTO '84 (Paperback, 1985 ed.)
G. R Blakely, D. Chaum
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that they pass all probabilistic polynomial time statistical tests. However, despite these nice properties, the secure generators known so far suffer from the han- cap of being inefiicient; the most efiicient of these take n2 steps (one modular multip- cation, n being the length of the seed) to generate one bit. Pseudc-random number g- erators that are currently used in practice output n bits per multiplication (n2 steps). An important open problem was to output even two bits on each multiplication in a cryptographically secure way. This problem was stated by Blum, Blum & Shub [3] in the context of their z2 mod N generator. They further ask: how many bits can be o- put per multiplication, maintaining cryptographic security? In this paper we state a simple condition, the XOR-Condition and show that any generator satisfying this condition can output logn bits on each multiplication. We show that the XOR-Condition is satisfied by the lop least significant bits of the z2-mod N generator. The security of the z2 mod N generator was based on Quadratic Residu- ity [3]. This generator is an example of a Trapdoor Generator [13], and its trapdoor properties have been used in protocol design. We strengthen the security of this gene- tor by proving it as hard as factoring.

Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983... Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983 ed.)
T. Beth
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

T. Beth (Ed.): Cryptography - EUROCRYPT '82, LNCS 149, pp. 1-28, 1983. 0 Springer-Verlag Berlin Heidelberg 1983 3 Having all of a sudden left the shady corner of semi-military art, modern cryptography has become a central topic of research in all areas of communication science. Definitions (cf. Bauer pp. 31 - 48) Cryptographic measures are applied to p- tect valuable data during transmission against unwanted interception INTERCEPTOR Fig. A: passive violation and (possibly undectable) forgery . Fig. 2: acti-se violation In accordance with the subsequent paper of Bauer (pp. 31 - 481, the technique applied to meet these requirements is called en- tion. In this process the transmitter enciphers (or encrypts) a plaintext message into a ciphertext. 4 ciphertexc ciphering Fig. 3: The Wire-tap-channel This transformation is called a cipher(function) which the au- rized receiver deciphers (decrypts). An enemy is a person or institution who wants illegal access to the messages. Assuming that the enemy can only get hold of the ciph- texts, he has to perform a cryptanalysis in order to reconstitute the plaintexts. To add to the difficulties for a cryptanalyst, the cipher functions are chosen to a varying parameter, called the key. A generator cryptosystem consists of a class of injective cipher functions ES: M-C, mapping plaintext messages(EM) into ciphertexts(EC) . The parameter s runs through the set K of keys. These formulations are best demonstrated by the basic, classical examples.

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R1,205 Discovery Miles 12 050 Ships in 9 - 17 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Algebraic Coding Theory and Applications (Paperback, 1979 ed.): Carlos R. P. Hartmann, Giuseppe Longo Algebraic Coding Theory and Applications (Paperback, 1979 ed.)
Carlos R. P. Hartmann, Giuseppe Longo
R1,494 Discovery Miles 14 940 Ships in 18 - 22 working days
An Introduction to Number Theory with Cryptography (Hardcover, 2nd edition): James Kraft, Lawrence Washington An Introduction to Number Theory with Cryptography (Hardcover, 2nd edition)
James Kraft, Lawrence Washington
R3,678 Discovery Miles 36 780 Ships in 10 - 15 working days

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style to reflect number theory's increasing popularity. The book is designed to be used by sophomore, junior, and senior undergraduates, but it is also accessible to advanced high school students and is appropriate for independent study. It includes a few more advanced topics for students who wish to explore beyond the traditional curriculum. Features of the second edition include Over 800 exercises, projects, and computer explorations Increased coverage of cryptography, including Vigenere, Stream, Transposition,and Block ciphers, along with RSA and discrete log-based systems "Check Your Understanding" questions for instant feedback to students New Appendices on "What is a proof?" and on Matrices Select basic (pre-RSA) cryptography now placed in an earlier chapter so that the topic can be covered right after the basic material on congruences Answers and hints for odd-numbered problems About the Authors: Jim Kraft received his Ph.D. from the University of Maryland in 1987 and has published several research papers in algebraic number theory. His previous teaching positions include the University of Rochester, St. Mary's College of California, and Ithaca College, and he has also worked in communications security. Dr. Kraft currently teaches mathematics at the Gilman School. Larry Washington received his Ph.D. from Princeton University in 1974 and has published extensively in number theory, including books on cryptography (with Wade Trappe), cyclotomic fields, and elliptic curves. Dr. Washington is currently Professor of Mathematics and Distinguished Scholar-Teacher at the University of Maryland.

Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.): I.... Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.)
I. Csiszar
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days
Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022):... Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022)
Pethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh Rathore
R1,388 R895 Discovery Miles 8 950 Save R493 (36%) Ships in 9 - 17 working days

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.): P. Herbig Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.)
P. Herbig; Bernd Friedrichs
R2,947 Discovery Miles 29 470 Ships in 18 - 22 working days

Seit der Begriindung der Informations- und Codierungstheorie durch die Ar beiten von Claude E. Shannon sind fast fiinf Jahrzehnte vergangen. In diesem Zeitraum hat sich die Kanalcodierung von einer rein theoretischen Disziplin zu einer ausgedehnten anwendungsorientierten Wissenschaft entwickelt. In fast allen modernen und leistungsfahigen Systemen zur Nachrichteniibertragung oder Nachrichtenspeicherung stellt die Kanalcodierung heute einen zentralen und pragenden Baustein dar. Mit der Compact Disc und mit Modems zur Dateniibertragung dringen Codierungsverfahren inzwischen auch in die privat genutzte Elektronik vor. Durch Kanalcodierung kann die Ubertragungsqualitat enorm gesteigert werden und gleichzeitig kommen die Ubertragungsverfahren mit weniger Sen deleistung und teilweise auch mit weniger Bandbreite aus. Diese Vorteile miissen nicht mit einer Reduktion der Datenrate bezahlt werden, sondern nur mit einem erh6hten Aufwand an digitaler Signalverarbeitung in Sender und Empfanger. Die Codierungstheorie liefert Resultate zur Struktur und zu den Eigenschaften von Codes sowie effiziente und aufwandsgiinstige Verfahren zur Decodierung. Zusammen mit der hochintegrierten Schaltungstechnik, die im mer leistungsfahiger und kostengiinstiger wird, fiihren die Fortschritte in der Kanalcodierung zu einer standigen Weiterentwicklung der Ubertragungsver fahren sowie zu einer effizienteren Nutzung der UbertragungskanaIe."

CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the... CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the Defensive Actions to Protect Yourself from Network Dangers, Including the Basics of Kali Linux (Paperback)
Robert M Huss
R433 R399 Discovery Miles 3 990 Save R34 (8%) Ships in 18 - 22 working days
Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R1,840 Discovery Miles 18 400 Ships in 10 - 15 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Designs From Linear Codes
Cunsheng Ding Hardcover R3,986 Discovery Miles 39 860
Alice and Bob Learn Application Security
T Janca Paperback R1,116 R918 Discovery Miles 9 180
Improving Image Quality in Visual…
Bin Yan, Yong Xiang, … Hardcover R2,653 Discovery Miles 26 530
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Blockchain Applications
Arshdeep Bagha Hardcover R1,870 R1,522 Discovery Miles 15 220
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160

 

Partners