0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,584)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover): Mitch Seymour A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover)
Mitch Seymour; Illustrated by Mitch Seymour, Elyse Seymour
R582 Discovery Miles 5 820 Ships in 18 - 22 working days
Handbook of Research on Wireless Multimedia - Quality of Service and Solutions (Hardcover): Nicola Cranely, Liam Murphy Handbook of Research on Wireless Multimedia - Quality of Service and Solutions (Hardcover)
Nicola Cranely, Liam Murphy
R6,692 Discovery Miles 66 920 Ships in 18 - 22 working days

The recent rapid advances in wireless technologies have created a demand for high quality multimedia applications and services. These advanced multimedia applications give rise to a new set of challenges in providing Quality of Service (QoS) when delivering these services over wireless networks. The Handbook of Research on Wireless Multimedia: Quality of Service and Solutions highlights and discusses the underlying QoS issues that arise in the delivery of real-time multimedia services over wireless networks. This cutting-edge book presents state-of-the-art solutions from leading researchers active in the field to address the QoS issues for different wireless multimedia applications.

A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.): Thomas Baigneres, Pascal Junod, Yi Lu, Jean... A Classical Introduction to Cryptography Exercise Book (Hardcover, 2006 ed.)
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
R1,395 Discovery Miles 13 950 Ships in 10 - 15 working days

TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science]Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.

Multifunction Peripherals for PCs - Technology, Troubleshooting and Repair (Paperback): Marvin Hobbs Multifunction Peripherals for PCs - Technology, Troubleshooting and Repair (Paperback)
Marvin Hobbs
R1,961 Discovery Miles 19 610 Ships in 10 - 15 working days

Multifunction devices combine the essentials of a fax machine, printer, scanner, and copier into one peripheral for small and home offices. As the market for this equipment grows, the need for skilled repair and maintenance increases. Unfortunately the service documentation supplied by the manufacturers is completely inadequate making the repair jobs even harder and more expensive. Marvin Hobbs teaches you how multifunction peripherals work in theory and in practice with lots of hands-on examples and important troubleshooting and repair tips you don't want to miss.
This book fills a gap in the literature, and will be a welcome addition to the library of any technician or do-it-yourselfer.
Written by a knowledgeable practitioner with inside industry information
Fully covers the troubleshooting and repair of multifunction peripherals
A must-have instructional and reference title for anyone who works with computer peripherals

Telecommunications Network Modelling, Planning and Design (Hardcover, New): Sharon Evans Telecommunications Network Modelling, Planning and Design (Hardcover, New)
Sharon Evans
R2,633 Discovery Miles 26 330 Ships in 10 - 15 working days

Telecommunications Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs, ROI modelling and QoS in 3G networks. This practical book will prove a valuable resource to network engineers and managers working in today's competitive telecommunications environment.

Middleware Architecture (Hardcover): Mehdia Ajana El Khaddar Middleware Architecture (Hardcover)
Mehdia Ajana El Khaddar
R3,050 Discovery Miles 30 500 Ships in 18 - 22 working days
Practical Internet Security (Hardcover, 2007 ed.): John R Vacca Practical Internet Security (Hardcover, 2007 ed.)
John R Vacca
R2,795 Discovery Miles 27 950 Ships in 18 - 22 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation - Real and Near Real Time Analysis... Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation - Real and Near Real Time Analysis and Decision Making System (Hardcover, 1st ed. 2017)
Bahman Zohuri, Masoud Moghaddam
R4,636 R3,565 Discovery Miles 35 650 Save R1,071 (23%) Ships in 10 - 15 working days

This book provides a technical approach to a Business Resilience System with its Risk Atom and Processing Data Point based on fuzzy logic and cloud computation in real time. Its purpose and objectives define a clear set of expectations for Organizations and Enterprises so their network system and supply chain are totally resilient and protected against cyber-attacks, manmade threats, and natural disasters. These enterprises include financial, organizational, homeland security, and supply chain operations with multi-point manufacturing across the world. Market shares and marketing advantages are expected to result from the implementation of the system. The collected information and defined objectives form the basis to monitor and analyze the data through cloud computation, and will guarantee the success of their survivability's against any unexpected threats. This book will be useful for advanced undergraduate and graduate students in the field of computer engineering, engineers that work for manufacturing companies, business analysts in retail and e-Commerce, and those working in the defense industry, Information Security, and Information Technology.

Guide to Big Data Applications (Hardcover, 1st ed. 2018): S. Srinivasan Guide to Big Data Applications (Hardcover, 1st ed. 2018)
S. Srinivasan
R4,844 Discovery Miles 48 440 Ships in 18 - 22 working days

This handbook brings together a variety of approaches to the uses of big data in multiple fields, primarily science, medicine, and business. This single resource features contributions from researchers around the world from a variety of fields, where they share their findings and experience. This book is intended to help spur further innovation in big data. The research is presented in a way that allows readers, regardless of their field of study, to learn from how applications have proven successful and how similar applications could be used in their own field. Contributions stem from researchers in fields such as physics, biology, energy, healthcare, and business. The contributors also discuss important topics such as fraud detection, privacy implications, legal perspectives, and ethical handling of big data.

Guide to Reliable Internet Services and Applications (Hardcover, 2010 Ed.): Charles R. Kalmanek, Sudip Misra, Yang (Richard)... Guide to Reliable Internet Services and Applications (Hardcover, 2010 Ed.)
Charles R. Kalmanek, Sudip Misra, Yang (Richard) Yang
R4,367 Discovery Miles 43 670 Ships in 18 - 22 working days

An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. If you can't do all ve, at least do the rst three. " Yet, designing and operating reliable networks and services is a Herculean task. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components. The resulting systems are inherently complex, consisting of many different kinds of components running a variety of different protocols that interact in subtle ways. Inter-networkssuch as the Internet span multiple regions of administrative control, from campus and cor- rate networks to Internet Service Providers, making good end-to-end performance a shared responsibility borne by sometimes uncooperative parties. Moreover, these networks consist not only of routers, but also lower-layer devices such as optical switches and higher-layer components such as rewalls and proxies. And, these components are highly con gurable, leaving ample room for operator error and buggy software. As if that were not dif cult enough, end users understandably care about the performance of their higher-level applications, which has a complicated relationship with the behavior of the underlying network. Despite these challenges, researchers and practitioners alike have made trem- dous strides in improving the reliability of modern networks and services.

Convergence Technologies for 3G Networks - IP, UMTS, EGPRS and ATM (Hardcover): J Bannister Convergence Technologies for 3G Networks - IP, UMTS, EGPRS and ATM (Hardcover)
J Bannister
R3,339 Discovery Miles 33 390 Ships in 10 - 15 working days

The merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential.

Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that integrates traditional telecommunications and the technology of the Internet. In particular, the authors address the application of both IP and ATM technologies to a cellular environment, including IP telephony protocols, the use of ATM/AAL2 and the new AAL2 signalling protocol for voice/multimedia and data transport as well as the future of the UMTS network in UMTS Release 5/6 All-IP architecture.

Convergence Technologies for 3G Networks:

  • Explains the operation and integration of GSM, GPRS, EDGE, UMTS, CDMA2000, IP, and ATM.
  • Provides practical examples of 3G connection scenarios.
  • Uses live captures from 3G networks.
  • Describes signalling flows and protocol stacks.
  • Covers IP and ATM as used in a 3G context.
  • Addresses issues of QoS and real-time application support.
  • Includes IP/SS7 internetworking and IP softswitching.
  • Discusses the use of Voice over IP and SIP in UMTS.
  • Outlines the architecture of the IP Multimedia Subsystem (IMS) for UMTS.

This highly accessible reference is suited for professionals from the telecommunications, data communications and computer networking industries.

Medical Data Mining and Knowledge Discovery (Hardcover, 2001 ed.): Krzysztof J. Cios Medical Data Mining and Knowledge Discovery (Hardcover, 2001 ed.)
Krzysztof J. Cios
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Modern medicine generates, almost daily, huge amounts of heterogeneous data. For example, medical data may contain SPECT images, signals lik e ECG, clinical information like temperature, cholesterol levels, etc., as well as the physician's interpretation. Those who deal with such data understand that there is a widening gap between data collection a nd data comprehension. Computerized techniques are needed to help huma ns address this problem. This volume is devoted to the relatively youn g and growing field of medical data mining and knowledge discovery. As more and more medical procedures employ imaging as a preferred diagno stic tool, there is a need to develop methods for efficient mining in databases of images. Other significant features are security and confi dentiality concerns. Moreover, the physician's interpretation of image s, signals, or other technical data, is written in unstructured Englis h which is very difficult to mine. This book addresses all these speci fic features.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,430 Discovery Miles 34 300 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.): Ajith Abraham, Aboul Ella... Computational Social Network Analysis - Trends, Tools and Research Advances (Hardcover, 2010 ed.)
Ajith Abraham, Aboul Ella Hassanien, Vaclav Snasel
R4,687 R4,414 Discovery Miles 44 140 Save R273 (6%) Ships in 10 - 15 working days

Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.

This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.

Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services.

This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.

Amazon Pinpoint User Guide (Hardcover): Documentation Team Amazon Pinpoint User Guide (Hardcover)
Documentation Team
R893 Discovery Miles 8 930 Ships in 18 - 22 working days
Distributed Video Sensor Networks (Hardcover, 2011 Ed.): Bir Bhanu, Chinya V. Ravishankar, Amit K. Roy-chowdhury, Hamid... Distributed Video Sensor Networks (Hardcover, 2011 Ed.)
Bir Bhanu, Chinya V. Ravishankar, Amit K. Roy-chowdhury, Hamid Aghajan, Demetri Terzopoulos
R4,112 Discovery Miles 41 120 Ships in 18 - 22 working days

Large-scale video networks are of increasing importance in a wide range of applications. However, the development of automated techniques for aggregating and interpreting information from multiple video streams in real-life scenarios is a challenging area of research.

Collecting the work of leading researchers from a broad range of disciplines, this timely text/reference offers an in-depth survey of the state of the art in distributed camera networks. The book addresses a broad spectrum of critical issues in this highly interdisciplinary field: current challenges and future directions; video processing and video understanding; simulation, graphics, cognition and video networks; wireless video sensor networks, communications and control; embedded cameras and real-time video analysis; applications of distributed video networks; and educational opportunities and curriculum-development.

Topics and features: Presents an overview of research in areas of motion analysis, invariants, multiple cameras for detection, object tracking and recognition, and activities in video networks Provides real-world applications of distributed video networks, including force protection, wide area activities, port security, and recognition in night-time environments Describes the challenges in graphics and simulation, covering virtual vision, network security, human activities, cognitive architecture, and displays Examines issues of multimedia networks, registration, control of cameras (in simulations and real networks), localization and bounds on tracking Discusses system aspects of video networks, with chapters on providing testbed environments, data collection on activities, new integrated sensors for airborne sensors, face recognition, and building sentient spaces Investigates educational opportunities and curriculum development from the perspective of computer science and electrical engineering

This unique text will be of great interest to researchers and graduate students of computer vision and pattern recognition, computer graphics and simulation, image processing and embedded systems, and communications, networks and controls. The large number of example applications will also appeal to application engineers.

Performance Analysis of ATM Networks - IFIP TC6 WG6.3 / WG6.4 Fifth International Workshop on Performance Modelling and... Performance Analysis of ATM Networks - IFIP TC6 WG6.3 / WG6.4 Fifth International Workshop on Performance Modelling and Evaluation of ATM Networks July 21-23, 1997, Ilkley, UK (Hardcover, 2000 ed.)
Demetres D. Kouvatsos
R5,460 Discovery Miles 54 600 Ships in 18 - 22 working days

Over recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of Asynchronous Transfer Mode (ATM) networks. This book describes recent advances in ATM networks reflecting the state-of-the-art technology and research achievements worldwide. In addition, it provides a fundamental source of reference in the ATM field. Research topics discussed in detail include: Traffic Modelling and Characterisation; Routing; Switch and Multiplexer Models; Call Admission Control (CAC); Congestion Control; Resource Allocation; Quality of Service (QoS); Tools and Techniques. This volume contains recently extended refereed papers of the 5th International Workshop on Performance Modelling and Evaluation of ATM Networks, which was sponsored by the International Federation for Information Processing (IFIP) and held in Ilkley, UK in July 1997. Performance Analysis of ATM Networks continues the tradition established by the first three IFIP volumes on the subject, and it is ideal for personnel in computer/communication industries as well as academic and research staff in computer science and electrical engineering.

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,110 Discovery Miles 11 100 Ships in 9 - 17 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Secure Integrated Circuits and Systems (Hardcover, 2010 ed.): Ingrid M.R. Verbauwhede Secure Integrated Circuits and Systems (Hardcover, 2010 ed.)
Ingrid M.R. Verbauwhede
R2,786 Discovery Miles 27 860 Ships in 18 - 22 working days

On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits.

Biometrics, Computer Security Systems and Artificial Intelligence Applications (Hardcover, 2006 ed.): Khalid Saeed, Jerzy... Biometrics, Computer Security Systems and Artificial Intelligence Applications (Hardcover, 2006 ed.)
Khalid Saeed, Jerzy Pejas, Romuald Mosdorf
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.

The Future of Open Data (Hardcover): Pamela Robinson, Teresa Scassa The Future of Open Data (Hardcover)
Pamela Robinson, Teresa Scassa
R1,234 Discovery Miles 12 340 Ships in 10 - 15 working days

The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Grant project that set out to explore open government geospatial data from an interdisciplinary perspective. Researchers on the grant adopted a critical social science perspective grounded in the imperative that the research should be relevant to government and civil society partners in the field. This book builds on the knowledge developed during the course of the grant and asks the question, "What is the future of open data?" The contributors' insights into the future of open data combine observations from five years of research about the Canadian open data community with a critical perspective on what could and should happen as open data efforts evolve. Each of the chapters in this book addresses different issues and each is grounded in distinct disciplinary or interdisciplinary perspectives. The opening chapter reflects on the origins of open data in Canada and how it has progressed to the present date, taking into account how the Indigenous data sovereignty movement intersects with open data. A series of chapters address some of the pitfalls and opportunities of open data and consider how the changing data context may impact sources of open data, limits on open data, and even liability for open data. Another group of chapters considers new landscapes for open data, including open data in the global South, the data priorities of local governments, and the emerging context for rural open data.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Hardcover, 2002 ed.): Shambhu Upadhyaya,... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Hardcover, 2002 ed.)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,774 Discovery Miles 27 740 Ships in 18 - 22 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993, Milan, Italy ECSCW... Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993, Milan, Italy ECSCW '93 (Hardcover, 1993 ed.)
Giorgio De Michelis, Carla Simone, K. Schmidt
R5,346 Discovery Miles 53 460 Ships in 18 - 22 working days

Computer-Supported Cooperative Work (CSCW) is an interdisicplinary research area devoted to exploring the issues of designing computer-based systems that enhance the abilities of cooperating workers to coordinate and integrate their activities in an efficient, effective, and flexible manner. This rigorously selected volume represents both practical and theoretical approaches from many of the leading researchers in the field. As an interdisciplinary area of research, CSCW is characterized by bringing together widely disparate research traditions and perspectives into an arena of collaboration and contention. The selected papers reflect the diverse approaches and cultures of this multi-disciplinary field. This collection will be of interest to a wide audience - because of the huge practical import of the issues and because of the interdisciplinary nature of the problems and the solutions proposed. In particular, the volume will be of interest to researchers and professionals in computing, sociology, cognitive science, and human factors.

5G Cyber Risks and Mitigation (Hardcover): Sabhyata Soni 5G Cyber Risks and Mitigation (Hardcover)
Sabhyata Soni
R3,443 Discovery Miles 34 430 Ships in 9 - 17 working days

• Technical language made simple • Researched matter • Maximum illustrations • To the point matter • Authored by a qualified person who is teaching in this field for the last 25 years

The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.): Joan Daemen, Vincent Rijmen The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.)
Joan Daemen, Vincent Rijmen 1
R2,702 Discovery Miles 27 020 Ships in 10 - 15 working days

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network Routing, Volume 8
M.O. Ball, T.L. Magnanti, … Hardcover R1,550 Discovery Miles 15 500
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Cloud Security - Concepts…
Information Reso Management Association Hardcover R8,949 Discovery Miles 89 490
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610

 

Partners