0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (359)
  • R250 - R500 (930)
  • R500+ (14,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Data Communications and Networking: Volume I (Hardcover): Michel Levine Data Communications and Networking: Volume I (Hardcover)
Michel Levine
R2,991 Discovery Miles 29 910 Ships in 12 - 17 working days
Advanced Wirebond Interconnection Technology (Mixed media product, 2004 ed.): Shankara K. Prasad Advanced Wirebond Interconnection Technology (Mixed media product, 2004 ed.)
Shankara K. Prasad
R8,464 Discovery Miles 84 640 Ships in 12 - 17 working days

From the reviews:

"This book is intended for an assembly production house setting, appropriate for management, designers, chief operators, as well as wirebond production engineers. Operational issues such as specifying and optimizing wire and automatic bonders for a product line are included.

The book is very good with "visual" explanations for quick grasping of the issues. In addition, the fundamental metallurgical or mechanical root causes behind material and process choices are presented.

The book has a clear prose style and a very readable font and page layout. The figures, although effective, are simply low resolution screen prints from a personal computer and thus have aliasing and fuzziness.

This book has excellent overall tutorial and enough description of wire and bonding equipment so the reader could specify and negotiate correctly for with suppliers. The majority of the book dwells on establishing the bonding process for a particular product; determining the "window" of adjustments. The book ends with discussions on establishing quality metrics and reliability assurance tests.

Each chapter of the book includes enough tutorial information to allow it to alone with little need to page backwards. A short but good reference section is at the end.

If you have not read a wirebonding book, or the one you read 10 years ago was borrowed and never returned, now is the time to buy this book." (" CMPT Newsletter," June 2005)

Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July... Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada (Hardcover, 2007 ed.)
Sandro Etalle, Stephen Marsh
R2,857 Discovery Miles 28 570 Ships in 10 - 15 working days

This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada from July 29 to August 2, 2007.

The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. The annual PST conference has quickly established itself as a leader in multidisciplinary research on a wide range of topics related to Privacy, Security and Trust, looked at from research and practice, through academe, business, and government. The two conferences have come together this year to take a more thorough look at all elements of trust management.

The highlights of IFIPTM 2007 included invited talks by industrial and academic experts including Larry Korba from NRC-IIT, Brian O'Higgins of 3rd Brigade, Jim Robbins from EWA, Jonathan Cave from RAND, Roger London, and Bruce Cowper from Microsoft Canada.

Combatting Cybercrime and Cyberterrorism - Challenges, Trends and Priorities (Hardcover, 1st ed. 2016): Babak Akhgar, Ben... Combatting Cybercrime and Cyberterrorism - Challenges, Trends and Priorities (Hardcover, 1st ed. 2016)
Babak Akhgar, Ben Brewster
R4,149 Discovery Miles 41 490 Ships in 12 - 17 working days

This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues. Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT. This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.

Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function... Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function Evaluation (Paperback, 2012 ed.)
Thomas Schneider
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.

CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) (Paperback, 4th edition): Glen Clarke CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) (Paperback, 4th edition)
Glen Clarke
R896 Discovery Miles 8 960 Ships in 12 - 17 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ exam This highly effective test preparation guide covers every objective for the latest version of the CompTIA Security+ exam (exam SY0-601). Written by CompTIA training expert Glen E. Clarke, this new edition has been thoroughly revised to align with the 2020 update to the exam. "Exam Watch" and "On-the-Job" special elements reinforce salient points throughout. With hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) covers what you need to know and shows you how to prepare for the challenging exam. The book features chapter-ending self-tests along with in-depth explanations for the correct and incorrect answers. All questions closely match those on the live test in content, format, tone, and feel. Online content includes more than 400 practice questions, a lab exercises PDF, video training from the author, and performance-based question simulations Includes a 10% off exam voucher coupon, a $35 value Written by a CompTIA certification expert and experienced author

High-Performance Networks for Multimedia Applications (Hardcover, 1999 ed.): Andre Danthine, Otto Spaniol, Wolfgang Effelsberg,... High-Performance Networks for Multimedia Applications (Hardcover, 1999 ed.)
Andre Danthine, Otto Spaniol, Wolfgang Effelsberg, Domenico Ferrari
R2,902 Discovery Miles 29 020 Ships in 10 - 15 working days

High-Performance Networks for Multimedia Applications presents the latest research on the services and protocols for networks providing the communication support for distributed multimedia applications. The need for end-to-end QoS for these multimedia applications is raising the stakes for a powerful shaping and scheduling in the network adapter. It is also creating a need for new services at the ATM layer, CBR and VBR being augmented by UBR, ABR and GFR which have to be evaluated in the TCP/IP environment of today and tomorrow. With the pressure of all the new technologies available today, the backbone architecture needs to be revisited and the success of the TCP/IP must not eliminate the possibility of adding a native ATM access to it. Most of the research in communication services such as IntServ, DiffServ and Native ATM is driven by the requirements of multimedia systems and this book illustrates the new emphasis by bringing telecommunication and computer communication experts together with application designers. This is particularly true for the security issues also addressed here. Last but not least, modeling techniques and mathematical models are essential to assess the performance of the networks to be built and to evaluate next century scenarios unachievable by a simple scaling of today's solutions. High-Performance Networks for Multimedia Applications is a collection of high quality research papers and the in-depth treatment of the subjects provides interesting and innovative solutions. It is an essential reference for telecommunication and computer experts and QoS-based application designers. It is also a comprehensive text for graduate students in high-perforrnance networks and multimedia applications.

Cloud Computing - Technology and Practices (Hardcover): Dinesh G. Harkut, Kashmira N. Kasat, Saurabh A. Shah Cloud Computing - Technology and Practices (Hardcover)
Dinesh G. Harkut, Kashmira N. Kasat, Saurabh A. Shah
R2,861 R2,681 Discovery Miles 26 810 Save R180 (6%) Ships in 10 - 15 working days
Broadband Fixed Wireless Access - A System Perspective (Hardcover, 2006 ed.): Marc Engels, Frederik Petre Broadband Fixed Wireless Access - A System Perspective (Hardcover, 2006 ed.)
Marc Engels, Frederik Petre
R2,919 Discovery Miles 29 190 Ships in 10 - 15 working days

Broadband Fixed Wireless Access provides a systematic overview of the emerging WiMAX technology, and much of the material is based on the practical experiences of the authors in building new systems. This material will be of significant interest to network architects and developers of broadband fixed wireless access products. With the advent of the IEEE 802.16 standard (has the standard or any part of it been adopted or is likely to be adopted soon) and next generation equipment, this technology has been growing in interest. The authors discuss applications at microwave frequencies between 2 and 11 GHz that could be attractive options for operators without an existing access infrastructure for reaching end users. This introductory volume demystifies the technology and provides technical exposure to the various system trade-offs. Additionally, the book features the following highlights: detailed modeling of broadband fixed wireless access propagation channel, including new measurements for its time variation; an extensive overview of the IEEE 802.1 discussion of the suitability of various multi-antenna techniques; and elaboration of various techniques, i.e. autodirecting antennas, bridging with WLAN, and multi-hop networking, that can be used to reduce the cost of ownership of a WiMAX network for an operator. The authors cover a wide range of topics, from network deployment to implementation of terminals. Wireless professionals will gain a head start from the information on WiMAX technology. This is a must read book when starting with broadband fixed wireless access.

Wideband, Multiband, and Smart Antenna Systems (Hardcover, 1st ed. 2021): Mohammad Abdul Matin Wideband, Multiband, and Smart Antenna Systems (Hardcover, 1st ed. 2021)
Mohammad Abdul Matin
R3,345 Discovery Miles 33 450 Ships in 10 - 15 working days

This book provides current R&D trends and novel approaches in design and analysis of broadband, multiband, and smart antennas for 5G and B5G mobile and wireless applications, as well as the identification of integration techniques of these antennas in a diverse range of devices. The book presents theoretical and experimental approaches to help the reader in understanding the unique design issues and more advanced research. Moreover, the book includes chapters on the fundamentals of antenna theory. The book is pertinent to professionals and researchers working in the field of antenna engineering; it is written for graduate students, researchers, academics, and industry practitioners who want to improve their understanding in the current research trends in design analysis of broadband, multiband, and smart antennas for wireless applications.

Energy Scavenging for Wireless Sensor Networks - with Special Focus on Vibrations (Hardcover, 2004 ed.): Shad Roundy, Paul... Energy Scavenging for Wireless Sensor Networks - with Special Focus on Vibrations (Hardcover, 2004 ed.)
Shad Roundy, Paul Kenneth Wright, Jan M Rabaey
R5,560 Discovery Miles 55 600 Ships in 10 - 15 working days

The vast reduction in size and power consumption of CMOS circuitry has led to a large research effort based around the vision of ubiquitous networks of wireless communication nodes. The wireless devices are usually designed to run on batteries. However, as the networks increase in number and the devices decrease in size, the replacement of depleted batteries is not practical. Furthermore, a battery that is large enough to last the lifetime of the device would dominate the overall system size, and thus is not very attractive. There is clearly a need to explore alternative methods of powering these small communication nodes. This book, therefore, focuses on potential "ambient" sources of power that can be scavenged or harvested and subsequently used to run low power electronics and wireless transceivers.
A wide range of potential power sources are briefly explored. Based on a comparison of these many potential sources, commonly occurring vibrations was chosen as an attractive, and little explored, power source. Models for different types of power converters using both electrostatic and piezoelectric conversion mechanisms have been developed. The models have been validated by testing prototypes driven at vibrations similar to those found in many industrial and commercial building environments. Finally, integration of a piezoelectric generator, power circuit, and custom design radio transceiver is demonstrated.
Power sources are becoming a bottleneck to the widespread deployment of wireless sensor networks. This work reviews many potential alternative sources of ambient power that can be scavenged. Vibration to electricity converters are explored in great detail, and based onstudies and experiments, are shown to be an attractive power source in many applications.
Energy Scavenging for Wireless Sensor Networks with Special Focus on Vibrations will be of interest to researchers and professionals in the areas of wireless electronics, smart structures and MEMS as well as power electronics.

Multi-Technology Positioning (Hardcover, 1st ed. 2017): Jari Nurmi, Elena Simona Lohan, Henk Wymeersch, Gonzalo Seco-Granados,... Multi-Technology Positioning (Hardcover, 1st ed. 2017)
Jari Nurmi, Elena Simona Lohan, Henk Wymeersch, Gonzalo Seco-Granados, Ossi Nykanen
R4,505 Discovery Miles 45 050 Ships in 12 - 17 working days

This book provides an overview of positioning technologies, applications and services in a format accessible to a wide variety of readers. Readers who have always wanted to understand how satellite-based positioning, wireless network positioning, inertial navigation, and their combinations work will find great value in this book. Readers will also learn about the advantages and disadvantages of different positioning methods, their limitations and challenges. Cognitive positioning, adding the brain to determine which technologies to use at device runtime, is introduced as well. Coverage also includes the use of position information for Location Based Services (LBS), as well as context-aware positioning services, designed for better user experience.

Enterprise Architecture for Connected E-Government - Practices and Innovations (Hardcover, New): Pallab Saha Enterprise Architecture for Connected E-Government - Practices and Innovations (Hardcover, New)
Pallab Saha
bundle available
R4,914 Discovery Miles 49 140 Ships in 12 - 17 working days

Enterprise Architecture is the inherent design and management approach essential for organizational coherence leading to alignment, agility, and assurance. Structured Enterprise Architecture approach is often used to plan and implement efficient and effective transformation efforts. However, the strongest driver for Enterprise Architecture is to improve service delivery and overall performance within the organization's business segments. Enterprise Architecture for Connected E-Government: Practices and Innovations addresses the gap in current literature in terms of linking and understanding the relationship between e-government and government Enterprise Architecture. Within this broader context, the focus is specifically on uncovering and comprehending the relationship between government Enterprise Architecture and connected government. Perfect for Government CIOs, IT/IS Managers, Chief Architects, Analysts and Designers seeking better, quicker, and easier approaches to respond to needs of their internal and external customers.

Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017): Chungwei Lin, Alberto... Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017)
Chungwei Lin, Alberto Sangiovanni-Vincentelli
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.

WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.): Deji Chen, Mark Nixon, Aloysius Mok WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.)
Deji Chen, Mark Nixon, Aloysius Mok
R2,959 Discovery Miles 29 590 Ships in 10 - 15 working days

The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.

Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover): Amy Wenxuan Ding Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover)
Amy Wenxuan Ding
R4,441 Discovery Miles 44 410 Ships in 10 - 15 working days

The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.

Wideband CDMA for Third Generation Mobile Communications (Hardcover): Tero Ojanpera, Ramjee Prasad Wideband CDMA for Third Generation Mobile Communications (Hardcover)
Tero Ojanpera, Ramjee Prasad
R3,967 Discovery Miles 39 670 Ships in 10 - 15 working days

This text evaluates wideband CDMA as an effective third generation technology option, giving a picture of the various wideband CDMA standardization activities underway worldwide in the late 1990s. The book compares a range of CDMA design techniques and examines how each affects system performance. It also describes how third generation system applications will impact radio access system design and compares and contrasts each major wideband CDMA standardization proposal currently on the table, including FRAMES wideband CDMA in Europe, Core-A in Japan, wideband IS-95 in the US, and wideband CDMA in Korea. It identifies and describes various air interface access schemes for third and fourth generation mobile communications systems; analyzes wideband CDMA performance in varying radio environments; and discusses the integration of the GSM core network with wideband CDMA.

Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022):... Age-Inclusive ICT Innovation for Service Delivery in South Africa - A Developing Country Perspective (Hardcover, 1st ed. 2022)
Vera Roos, Jaco Hoffman
bundle available
R1,582 Discovery Miles 15 820 Ships in 12 - 17 working days
Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,982 Discovery Miles 99 820 Ships in 10 - 15 working days
Optical Networks - Recent Advances - Recent Advances (Hardcover, 2001 ed.): Lu Ruan, Dingzhu Du Optical Networks - Recent Advances - Recent Advances (Hardcover, 2001 ed.)
Lu Ruan, Dingzhu Du
R4,434 Discovery Miles 44 340 Ships in 10 - 15 working days

With the rapid growth of bandwidth demand from network users and the advances in optical technologies, optical networks with multiterabits per-second capacity has received significant interest from both researchers and practitioners. Optical networks deployment raises a number of challenging problems that require innovative solutions, including net work architectures, scalable and fast network management, resource efficient routing and wavelength assignment algorithms, QoS support and scheduling algorithms, and switch and router architectures. In this book, we put together some important developments in this exiting area during last several years. Some of the articles are research papers and some are surveys. All articles were reviewed by two reviewers. The paper, "On Dynamic Wavelength Assignment in WDM Optical Networks," by Alanyali gives an overview of some issues in the analy sis and synthesis of dynamic wavelength assignment policies for optical WDM networks and illustrates a new method of analysis. The paper by Ellinas and Bala, "Wavelength Assignment Algorithms for WDM Ring Architectures," presents two optimal wavelength assignment algorithms that assign the minimum number of wavelengths between nodes on WDM rings to achieve full mesh connectivity. In the paper, "Optimal Placement of Wavelength Converters in WDM Networks for Parallel and Distributed Computing Systems," Jia et al."

Communication Infrastructures for Cloud Computing (Hardcover, New): Hussein T. Mouftah, Burak Kantarci Communication Infrastructures for Cloud Computing (Hardcover, New)
Hussein T. Mouftah, Burak Kantarci
R5,303 Discovery Miles 53 030 Ships in 12 - 17 working days

Cloud computing has provided multiple advantages as well as challenges to software and infrastructure services. In order to be fully beneficial, these challenges facing cloud specific communication protocols must be addressed. Communication Infrastructures for Cloud Computing presents the issues and research directions for a broad range of cloud computing aspects of software, computing, and storage systems. This book will highlight a broad range of topics in communication infrastructures for cloud computing that will benefit researchers, academics, and practitioners in the active fields of engineering, computer science, and software.

Distance Learning Technology and Applications (Hardcover): Daniel Minoli Distance Learning Technology and Applications (Hardcover)
Daniel Minoli
R2,919 Discovery Miles 29 190 Ships in 10 - 15 working days

An all-encompassing guide to the business, engineering, and regulatory factors shaping the growth of the distance learning industry. This book examines potential providers, users, applications, and problem solutions, and includes actual case studies. An outstanding reference for educators, network service providers, public policy makers, and graduate level engineering students specializing in telecommunications.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Hardcover, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,802 Discovery Miles 28 020 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

Secret Colors (Hardcover): Martin Kleppmann Secret Colors (Hardcover)
Martin Kleppmann; Illustrated by Mitch Seymour
R572 Discovery Miles 5 720 Ships in 12 - 17 working days
Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018): Tongtong Li, Tianlong Song,... Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018)
Tongtong Li, Tianlong Song, Yuan Liang
R2,804 Discovery Miles 28 040 Ships in 10 - 15 working days

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Life Impossible
Matt Haig Hardcover R550 R369 Discovery Miles 3 690
The Overstory - Pulitzer Prize-winner…
Richard Powers Paperback  (2)
R270 R211 Discovery Miles 2 110
Notes and Illustrations on the…
War Office Paperback R752 Discovery Miles 7 520
Linux Command Line and Shell Scripting…
R. Blum Paperback R944 Discovery Miles 9 440
The Memoirs of the Crown Prince of…
Crown Prince of Germany 188 William Hardcover R885 Discovery Miles 8 850
Notes on Horse Management in the Field…
War Office Paperback R250 Discovery Miles 2 500
Emily Hobhouse - Beloved traitor
Elsabe Brits Paperback  (3)
R495 R425 Discovery Miles 4 250
The Swordbearers - Supreme Command in…
Correlli Barnett Paperback R622 Discovery Miles 6 220
Southern Man
Greg Iles Paperback R443 Discovery Miles 4 430
Desolation Road
Christine Feehan Paperback R264 R238 Discovery Miles 2 380

 

Partners