0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (584)
  • R250 - R500 (4,897)
  • R500+ (31,693)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming

Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015): Hans Delfs, Helmut Knebl Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015)
Hans Delfs, Helmut Knebl
R2,770 Discovery Miles 27 700 Ships in 12 - 17 working days

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.

Blue Pelican Java (Hardcover): Charles E. Cook Blue Pelican Java (Hardcover)
Charles E. Cook
R1,240 Discovery Miles 12 400 Ships in 10 - 15 working days

"Blue Pelican Java" is a somewhat unusual high school computer science textbook. Most computer science texts will begin with a section on the history of computers followed with a flurry of definitions that are just "so many words" to the average student. The approach here is to first give the student some experience upon which to hang the definitions that come later. The usual practice of introducing classes and objects is deferred until the student has a firm grasp of the fundamentals (loops, decision structures, etc). Thus, the beginning student is not overwhelmed by the simultaneous introduction of OOPs and the fundamentals. The book includes plenty of exercises (many in "contest" form), programming projects, and a huge appendix.

Embedded Control System Design - A Model Based Approach (Hardcover, 2013 ed.): Alexandru Forrai Embedded Control System Design - A Model Based Approach (Hardcover, 2013 ed.)
Alexandru Forrai
R4,140 Discovery Miles 41 400 Ships in 12 - 17 working days

Control system design is a challenging task for practicing engineers. It requires knowledge of different engineering fields, a good understanding of technical specifications and good communication skills. The current book introduces the reader into practical control system design, bridging the gap between theory and practice. The control design techniques presented in the book are all model based., considering the needs and possibilities of practicing engineers. Classical control design techniques are reviewed and methods are presented how to verify the robustness of the design.

It is how the designed control algorithm can be implemented in real-time and tested, fulfilling different safety requirements. Good design practices and the systematic software development process are emphasized in the book according to the generic standard IEC61508.

The book is mainly addressed to practicing control and embedded software engineers - working in research and development - as well as graduate students who are faced with the challenge to design control systems and implement them in real-time."

Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.): Czeslaw Koscielny,... Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.)
Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
R2,628 Discovery Miles 26 280 Ships in 12 - 17 working days

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.

After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.

The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

IT Crisisology: Smart Crisis Management in Software Engineering - Models, Methods, Patterns, Practices, Case Studies... IT Crisisology: Smart Crisis Management in Software Engineering - Models, Methods, Patterns, Practices, Case Studies (Hardcover, 1st ed. 2021)
Sergey V. Zykov
R4,131 Discovery Miles 41 310 Ships in 12 - 17 working days

This book focuses on crisis management in software development which includes forecasting, responding and adaptive engineering models, methods, patterns and practices. It helps the stakeholders in understanding and identifying the key technology, business and human factors that may result in a software production crisis. These factors are particularly important for the enterprise-scale applications, typically considered very complex in managerial and technological aspects and therefore, specifically addressed by the discipline of software engineering. Therefore, this book throws light on the crisis responsive, resilient methodologies and practices; therewith, it also focuses on their evolutionary changes and the resulting benefits.

Proceedings of International Scientific Conference on Telecommunications, Computing and Control - TELECCON 2019 (Hardcover, 1st... Proceedings of International Scientific Conference on Telecommunications, Computing and Control - TELECCON 2019 (Hardcover, 1st ed. 2021)
Nikita Voinov, Tobias Schreck, Sanowar Khan
R7,533 Discovery Miles 75 330 Ships in 12 - 17 working days

This book provides a platform for academics and practitioners for sharing innovative results, approaches, developments, and research projects in computer science and information technology, focusing on the latest challenges in advanced computing and solutions introducing mathematical and engineering approaches. The book presents discussions in the area of advances and challenges of modern computer science, including telecommunications and signal processing, machine learning and artificial intelligence, intelligent control systems, modeling and simulation, data science and big data, data visualization and graphics systems, distributed, cloud and high-performance computing, and software engineering. The papers included are presented at TELECCON 2019 organized by Peter the Great St. Petersburg University during November 18-19, 2019.

Design and Implementation of the MTX Operating System (Hardcover, 1st ed. 2015): K. C. Wang Design and Implementation of the MTX Operating System (Hardcover, 1st ed. 2015)
K. C. Wang
R4,155 Discovery Miles 41 550 Ships in 12 - 17 working days

This course-tested textbook describes the design and implementation of operating systems, and applies it to the MTX operating system, a Unix-like system designed for Intel x86 based PCs. Written in an evolutional style, theoretical and practical aspects of operating systems are presented as the design and implementation of a complete operating system is demonstrated. Throughout the text, complete source code and working sample systems are used to exhibit the techniques discussed. The book contains many new materials on the design and use of parallel algorithms in SMP. Complete coverage on booting an operating system is included, as well as, extending the process model to implement threads support in the MTX kernel, an init program for system startup and a sh program for executing user commands. Intended for technically oriented operating systems courses that emphasize both theory and practice, the book is also suitable for self-study.

Lean Software Development in Action (Hardcover, 2014 ed.): Andrea Janes, Giancarlo Succi Lean Software Development in Action (Hardcover, 2014 ed.)
Andrea Janes, Giancarlo Succi
R2,537 R2,135 Discovery Miles 21 350 Save R402 (16%) Ships in 12 - 17 working days

This book illustrates how goal-oriented, automated measurement can be used to create Lean organizations and to facilitate the development of Lean software, while also demonstrating the practical implementation of Lean software development by combining tried and trusted tools. In order to be successful, a Lean orientation of software development has to go hand in hand with a company's overall business strategy. To achieve this, two interrelated aspects require special attention: measurement and experience management. In this book, Janes and Succi provide the necessary knowledge to establish "Lean software company thinking," while also exploiting the latest approaches to software measurement. A comprehensive, company-wide measurement approach is exactly what companies need in order to align their activities to the demands of their stakeholders, to their business strategy, etc. With the automatic, non-invasive measurement approach proposed in this book, even small and medium-sized enterprises that do not have the resources to introduce heavyweight processes will be able to make their software development processes considerably more Lean. The book is divided into three parts. Part I, "Motivation for Lean Software Development," explains just what "Lean Production" means, why it can be advantageous to apply Lean concepts to software engineering, and which existing approaches are best suited to achieving this. Part II, "The Pillars of Lean Software Development," presents the tools needed to achieve Lean software development: Non-invasive Measurement, the Goal Question Metric approach, and the Experience Factory. Finally, Part III, "Lean Software Development in Action," shows how different tools can be combined to enable Lean Thinking in software development. The book primarily addresses the needs of all those working in the field of software engineering who want to understand how to establish an efficient and effective software development process. This group includes developers, managers, and students pursuing an M.Sc. degree in software engineering.

Agile Modeling with UML - Code Generation, Testing, Refactoring (Hardcover, 1st ed. 2017): Bernhard Rumpe Agile Modeling with UML - Code Generation, Testing, Refactoring (Hardcover, 1st ed. 2017)
Bernhard Rumpe
R2,967 Discovery Miles 29 670 Ships in 12 - 17 working days

This book focuses on the methodological treatment of UML/P and addresses three core topics of model-based software development: code generation, the systematic testing of programs using a model-based definition of test cases, and the evolutionary refactoring and transformation of models. For each of these topics, it first details the foundational concepts and techniques, and then presents their application with UML/P. This separation between basic principles and applications makes the content more accessible and allows the reader to transfer this knowledge directly to other model-based approaches and languages. After an introduction to the book and its primary goals in Chapter 1, Chapter 2 outlines an agile UML-based approach using UML/P as the primary development language for creating executable models, generating code from the models, designing test cases, and planning iterative evolution through refactoring. In the interest of completeness, Chapter 3 provides a brief summary of UML/P, which is used throughout the book. Next, Chapters 4 and 5 discuss core techniques for code generation, addressing the architecture of a code generator and methods for controlling it, as well as the suitability of UML/P notations for test or product code. Chapters 6 and 7 then discuss general concepts for testing software as well as the special features which arise due to the use of UML/P. Chapter 8 details test patterns to show how to use UML/P diagrams to define test cases and emphasizes in particular the use of functional tests for distributed and concurrent software systems. In closing, Chapters 9 and 10 examine techniques for transforming models and code and thus provide a solid foundation for refactoring as a type of transformation that preserves semantics. Overall, this book will be of great benefit for practical software development, for academic training in the field of Software Engineering, and for research in the area of model-based software development. Practitioners will learn how to use modern model-based techniques to improve the production of code and thus significantly increase quality. Students will find both important scientific basics as well as direct applications of the techniques presented. And last but not least, the book will offer scientists a comprehensive overview of the current state of development in the three core topics it covers.

Interactive 3D Multimedia Content - Models for Creation, Management, Search and Presentation (Hardcover, 2012): Wojciech... Interactive 3D Multimedia Content - Models for Creation, Management, Search and Presentation (Hardcover, 2012)
Wojciech Cellary, Krzysztof Walczak
R2,961 Discovery Miles 29 610 Ships in 10 - 15 working days

The book describes recent research results in the areas of modelling, creation, management and presentation of interactive 3D multimedia content. The book describes the current state of the art in the field and identifies the most important research and design issues. Consecutive chapters address these issues. These are: database modelling of 3D content, security in 3D environments, describing interactivity of content, searching content, visualization of search results, modelling mixed reality content, and efficient creation of interactive 3D content. Each chapter is illustrated with example applications based on the proposed approach. The final chapter discusses some important ethical issues related to the widespread use of virtual environments in everyday life. The book provides ready to use solutions for many important problems related to the creation of interactive 3D multimedia applications and will be a primary reading for researchers and developers working in this domain.

The Application of Artificial Intelligence - Step-by-Step Guide from Beginner to Expert (Hardcover, 1st ed. 2021): Zoltan... The Application of Artificial Intelligence - Step-by-Step Guide from Beginner to Expert (Hardcover, 1st ed. 2021)
Zoltan Somogyi
R3,152 Discovery Miles 31 520 Ships in 12 - 17 working days

This book presents a unique, understandable view of machine learning using many practical examples and access to free professional software and open source code. The user-friendly software can immediately be used to apply everything you learn in the book without the need for programming. After an introduction to machine learning and artificial intelligence, the chapters in Part II present deeper explanations of machine learning algorithms, performance evaluation of machine learning models, and how to consider data in machine learning environments. In Part III the author explains automatic speech recognition, and in Part IV biometrics recognition, face- and speaker-recognition. By Part V the author can then explain machine learning by example, he offers cases from real-world applications, problems, and techniques, such as anomaly detection and root cause analyses, business process improvement, detecting and predicting diseases, recommendation AI, several engineering applications, predictive maintenance, automatically classifying datasets, dimensionality reduction, and image recognition. Finally, in Part VI he offers a detailed explanation of the AI-TOOLKIT, software he developed that allows the reader to test and study the examples in the book and the application of machine learning in professional environments. The author introduces core machine learning concepts and supports these with practical examples of their use, so professionals will appreciate his approach and use the book for self-study. It will also be useful as a supplementary resource for advanced undergraduate and graduate courses on machine learning and artificial intelligence.

Algorithms as a Basis of Modern Applied Mathematics (Hardcover, 1st ed. 2021): Sarka Hoskova-Mayerova, Cristina Flaut, Fabrizio... Algorithms as a Basis of Modern Applied Mathematics (Hardcover, 1st ed. 2021)
Sarka Hoskova-Mayerova, Cristina Flaut, Fabrizio Maturo
R5,512 Discovery Miles 55 120 Ships in 12 - 17 working days

This book offers a self-contained guide to advanced algorithms and their applications in various fields of science. Gathering contributions by authoritative researchers in the field of mathematics, statistics and computer science, it aims at offering a comprehensive and up-to-date view of algorithms, including the theory behind them, as well as practical considerations, current limitations and solutions. It covers applications in energy management, decision making, computer networks, materials science, mechanics and process optimization. It offers an integrated and timely guide to important algorithms, and represents a valuable reference resource for graduate students and researchers in various fields of applied mathematics, statistics and engineering.

Decision Methods for Forest Resource Management (Hardcover, Annotated edition): Joseph Buongiorno, J.Keith Gilless Decision Methods for Forest Resource Management (Hardcover, Annotated edition)
Joseph Buongiorno, J.Keith Gilless
R2,726 Discovery Miles 27 260 Ships in 12 - 17 working days

Decision Methods for Forest Resource Management focuses on decision making for forests that are managed for both ecological and economic objectives. The essential modern decision methods used in the scientific management of forests are described using basic algebra, computer spreadsheets, and numerous examples and applications. Balanced treatment is given throughout the book to the ecological and economic impacts of alternative management decisions in both even-aged and uneven-aged forests.
* In-depth coverage of both ecological and economic issues
* Hands-on examples with Excel spreadsheets; electronic versions available on the authors' website
* Many related exercises with solutions
* Instructor's Manual available upon request

Iterative Learning Control - An Optimization Paradigm (Hardcover, 1st ed. 2016): David H. Owens Iterative Learning Control - An Optimization Paradigm (Hardcover, 1st ed. 2016)
David H. Owens
R4,738 Discovery Miles 47 380 Ships in 12 - 17 working days

This book develops a coherent and quite general theoretical approach to algorithm design for iterative learning control based on the use of operator representations and quadratic optimization concepts including the related ideas of inverse model control and gradient-based design. Using detailed examples taken from linear, discrete and continuous-time systems, the author gives the reader access to theories based on either signal or parameter optimization. Although the two approaches are shown to be related in a formal mathematical sense, the text presents them separately as their relevant algorithm design issues are distinct and give rise to different performance capabilities. Together with algorithm design, the text demonstrates the underlying robustness of the paradigm and also includes new control laws that are capable of incorporating input and output constraints, enable the algorithm to reconfigure systematically in order to meet the requirements of different reference and auxiliary signals and also to support new properties such as spectral annihilation. Iterative Learning Control will interest academics and graduate students working in control who will find it a useful reference to the current status of a powerful and increasingly popular method of control. The depth of background theory and links to practical systems will be of use to engineers responsible for precision repetitive processes.

From Research to Practice in the Design of Cooperative Systems: Results and Open Challenges - Proceedings of the 10th... From Research to Practice in the Design of Cooperative Systems: Results and Open Challenges - Proceedings of the 10th International Conference on the Design of Cooperative Systems, May 30 - 1 June, 2012 (Hardcover, 2012 ed.)
Julie Dugdale, Cedric Masclet, Maria Antonietta Grasso, Jean-Francois Boujut, Parina Hassanaly
R5,741 Discovery Miles 57 410 Ships in 10 - 15 working days

COOP 2012 is the tenth COOP conference, marking twenty years from the first conference in 1992. In this special anniversary edition we asked researchers and practitioners to reflect on what have been the successes and the failures in designing cooperative systems, and what challenges still need to be addressed. We have come a long way in understanding the intricacies of cooperation and in designing systems that support work practices and collective activities. These advances would not have been possible without the concerted effort of contributions from a plethora of domains including CSCW, HCI, Information Systems, Knowledge Engineering, Multi-agent systems, organizational and management sciences, sociology, psychology, anthropology, ergonomics, linguistics, etc. The COOP community is going from strength to strength in developing new technologies, advancing and proposing new methodological approaches, and forging theories.

Gamification-Based E-Learning Strategies for Computer Programming Education (Hardcover): Ricardo Alexandre Peixoto de Queiros,... Gamification-Based E-Learning Strategies for Computer Programming Education (Hardcover)
Ricardo Alexandre Peixoto de Queiros, Mario Teixeira Pinto
R5,531 Discovery Miles 55 310 Ships in 12 - 17 working days

Computer technologies are forever evolving and it is vital that computer science educators find new methods of teaching programming in order to maintain the rapid changes occurring in the field. One of the ways to increase student engagement and retention is by integrating games into the curriculum. Gamification-Based E-Learning Strategies for Computer Programming Education evaluates the different approaches and issues faced in integrating games into computer education settings. Featuring emergent trends on the application of gaming to pedagogical strategies and technological tactics, as well as new methodologies and approaches being utilized in computer programming courses, this book is an essential reference source for practitioners, researchers, computer science teachers, and students pursuing computer science.

Optimization Techniques in Computer Vision - Ill-Posed Problems and Regularization (Hardcover, 1st ed. 2016): Mongi A. Abidi,... Optimization Techniques in Computer Vision - Ill-Posed Problems and Regularization (Hardcover, 1st ed. 2016)
Mongi A. Abidi, Andrei V. Gribok, Joonki Paik
R4,209 Discovery Miles 42 090 Ships in 12 - 17 working days

This book presents practical optimization techniques used in image processing and computer vision problems. Ill-posed problems are introduced and used as examples to show how each type of problem is related to typical image processing and computer vision problems. Unconstrained optimization gives the best solution based on numerical minimization of a single, scalar-valued objective function or cost function. Unconstrained optimization problems have been intensively studied, and many algorithms and tools have been developed to solve them. Most practical optimization problems, however, arise with a set of constraints. Typical examples of constraints include: (i) pre-specified pixel intensity range, (ii) smoothness or correlation with neighboring information, (iii) existence on a certain contour of lines or curves, and (iv) given statistical or spectral characteristics of the solution. Regularized optimization is a special method used to solve a class of constrained optimization problems. The term regularization refers to the transformation of an objective function with constraints into a different objective function, automatically reflecting constraints in the unconstrained minimization process. Because of its simplicity and efficiency, regularized optimization has many application areas, such as image restoration, image reconstruction, optical flow estimation, etc. Optimization plays a major role in a wide variety of theories for image processing and computer vision. Various optimization techniques are used at different levels for these problems, and this volume summarizes and explains these techniques as applied to image processing and computer vision.

Crisis Management for Software Development and Knowledge Transfer (Hardcover, 1st ed. 2016): Sergey V. Zykov Crisis Management for Software Development and Knowledge Transfer (Hardcover, 1st ed. 2016)
Sergey V. Zykov
R3,661 R3,366 Discovery Miles 33 660 Save R295 (8%) Ships in 12 - 17 working days

This well structured book discusses lifecycle optimization of software projects for crisis management by means of software engineering methods and tools. Its outcomes are based on lessons learned from the software engineering crisis which started in the 1960s. The book presents a systematic approach to overcome the crisis in software engineering depends which not only depends on technology-related but also on human-related factors. It proposes an adaptive methodology for software product development, which optimizes the software product lifecycle in order to avoid "local" crises of software production. The general lifecycle pattern and its stages are discussed, and their impact on the time and budget of the software product development is analyzed. The book identifies key advantages and disadvantages for various models selected and concludes that there is no "silver bullet", or universal model, which suits all software products equally well. It approaches software architecture in terms of process, data and system perspectives and proposes an incremental methodology for crisis-agile development of large-scale, distributed heterogeneous applications. The book introduces a number of specialized approaches which are widely used in industry but are often ignored in general writings because of their vendor-specificity. In doing so, the book builds a helpful bridge from academic conceptions of software engineering to the world of software engineering practice. With its systematic coverage of different software engineering methodologies and the presented rich systems engineering examples the book will be beneficial for a broader audience.

GPS - Theory, Algorithms and Applications (Hardcover, 3rd ed. 2016): Guochang Xu, Yan Xu GPS - Theory, Algorithms and Applications (Hardcover, 3rd ed. 2016)
Guochang Xu, Yan Xu
R5,451 Discovery Miles 54 510 Ships in 12 - 17 working days

This reference and handbook describes theory, algorithms and applications of the Global Positioning System (GPS/Glonass/Galileo/Compass). It is primarily based on source-code descriptions of the KSGsoft program developed at the GFZ in Potsdam. The theory and algorithms are extended and verified for a new development of a multi-functional GPS/Galileo software. Besides the concepts such as the unified GPS data processing method, the diagonalisation algorithm, the adaptive Kalman filter, the general ambiguity search criteria, and the algebraic solution of variation equation reported in the first edition, the equivalence theorem of the GPS algorithms, the independent parameterisation method, and the alternative solar radiation model reported in the second edition, the modernisation of the GNSS system, the new development of the theory and algorithms, and research in broad applications are supplemented in this new edition. Mathematically rigorous, the book begins with the introduction, the basics of coordinate and time systems and satellite orbits, as well as GPS observables, and deals with topics such as physical influences, observation equations and their parameterisation, adjustment and filtering, ambiguity resolution, software development and data processing and the determination of perturbed orbits.

Designing Immersive Video Games Using 3DUI Technologies - Improving the Gamer's User Experience (Hardcover, 1st ed. 2018):... Designing Immersive Video Games Using 3DUI Technologies - Improving the Gamer's User Experience (Hardcover, 1st ed. 2018)
Arun K. Kulshreshth, Joseph J. Laviola Jr.
R3,484 Discovery Miles 34 840 Ships in 10 - 15 working days

A 3D user interface (3DUI) is an interface in which the user performs tasks in three dimensions. For example, interactions using hand/body gestures, interaction using a motion controller (e.g. Sony PlayStation Move), interaction with virtual reality devices using tracked motion controllers, etc. All these technologies which let a user interact in three dimensions are called 3D user interface technologies. These 3D user interfaces have the potential to make games more immersive & engaging and thus potentially provide a better user experience to gamers. Although 3D user interface technologies are available for games, it is unclear how their usage affects game play and if there are any user performance benefits. This book presents state of the art research on exploring 3D user interface technologies for improving video games. It also presents a review of research work done in this area and describes experiments focused on usage of stereoscopic 3D, head tracking, and hand gesture-based control in gaming scenarios. These experiments are systematic studies in gaming environments and are aimed at understanding the effect of the underlined 3D interface technology on the gaming experience of a user. Based on these experiments, several design guidelines are presented which can aid game designers in designing better immersive games.

Code Breaking in the Pacific (Hardcover, 2014 ed.): Peter Donovan, John Mack Code Breaking in the Pacific (Hardcover, 2014 ed.)
Peter Donovan, John Mack
R4,155 Discovery Miles 41 550 Ships in 12 - 17 working days

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource."

Modern Embedded Computing - Designing Connected, Pervasive, Media-Rich Systems (Paperback): Peter Barry, Patrick Crowley Modern Embedded Computing - Designing Connected, Pervasive, Media-Rich Systems (Paperback)
Peter Barry, Patrick Crowley
R1,708 Discovery Miles 17 080 Ships in 12 - 17 working days

Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions for industrial applications. While most books focus on these controllers, "Modern Embedded Computing" provides a thorough understanding of the platform architecture of modern embedded computing systems that drive mobile devices.

The book offers a comprehensive view of developing a framework for embedded systems-on-chips. Examples feature the Intel Atom processor, which is used in high-end mobile devices such as e-readers, Internet-enabled TVs, tablets, and net books. Beginning with a discussion of embedded platform architecture and Intel Atom-specific architecture, modular chapters cover system boot-up, operating systems, power optimization, graphics and multi-media, connectivity, and platform tuning. Companion lab materials compliment the chapters, offering hands-on embedded design experience.
Learn embedded systems design with the Intel Atom Processor, based on the dominant PC chip architecture. Examples use Atom and offer comparisons to other platformsDesign embedded processors for systems that support gaming, in-vehicle infotainment, medical records retrieval, point-of-sale purchasing, networking, digital storage, and many more retail, consumer and industrial applicationsExplore companion lab materials online that offer hands-on embedded design experience

Concurrency Control in Distributed System Using Mutual Exclusion (Hardcover, 1st ed. 2018): Sukhendu Kanrar, Nabendu Chaki,... Concurrency Control in Distributed System Using Mutual Exclusion (Hardcover, 1st ed. 2018)
Sukhendu Kanrar, Nabendu Chaki, Samiran Chattopadhyay
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

The book presents various state-of-the-art approaches for process synchronization in a distributed environment. The range of algorithms discussed in the book starts from token based mutual exclusion algorithms that work on tree based topology. Then there are interesting solutions for more flexible logical topology like a directed graph, with or without cycle. In a completely different approach, one of the chapters presents two recent voting-based DME algorithms. All DME algorithms presented in the book aim to ensure fairness in terms of first come first serve (FCFS) order among equal priority processes. At the same time, the solutions consider the priority of the requesting processes and allocate resource for the earliest request when no such request from a higher priority process is pending.

Analyzing the Role of Risk Mitigation and Monitoring in Software Development (Hardcover): Rohit Kumar, Anjali Tayal, Sargam... Analyzing the Role of Risk Mitigation and Monitoring in Software Development (Hardcover)
Rohit Kumar, Anjali Tayal, Sargam Kapil
R6,159 Discovery Miles 61 590 Ships in 12 - 17 working days

The biggest challenges faced by the software industry are cost control and schedule control. As such, effective strategies for process improvement must be researched and implemented. Analyzing the Role of Risk Mitigation and Monitoring in Software Development is a critical scholarly resource that explores software risk and development as organizations continue to implement more applications across multiple technologies and a multi-tiered environment. Featuring coverage on a broad range of topics such as quantitative risk assessment, threat analysis, and software vulnerability management, this book is a vital resource for engineers, academicians, professionals, and researchers seeking current research on the importance of risk management in software development.

Code Clone Analysis - Research, Tools, and Practices (Hardcover, 1st ed. 2021): Katsuro Inoue, Chanchal K. Roy Code Clone Analysis - Research, Tools, and Practices (Hardcover, 1st ed. 2021)
Katsuro Inoue, Chanchal K. Roy
R4,473 Discovery Miles 44 730 Ships in 12 - 17 working days

This is the first book organized around code clone analysis. To cover the broad studies of code clone analysis, this book selects past research results that are important to the progress of the field and updates them with new results and future directions. The first chapter provides an introduction for readers who are inexperienced in the foundation of code clone analysis, defines clones and related terms, and discusses the classification of clones. The chapters that follow are categorized into three main parts to present 1) major tools for code clone analysis, 2) fundamental topics such as evaluation benchmarks, clone visualization, code clone searches, and code similarities, and 3) applications to actual problems. Each chapter includes a valuable reference list that will help readers to achieve a comprehensive understanding of this diverse field and to catch up with the latest research results. Code clone analysis relies heavily on computer science theories such as pattern matching algorithms, computer language, and software metrics. Consequently, code clone analysis can be applied to a variety of real-world tasks in software development and maintenance such as bug finding and program refactoring. This book will also be useful in designing an effective curriculum that combines theory and application of code clone analysis in university software engineering courses.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Programming Logic & Design…
Joyce Farrell Paperback R1,253 R1,123 Discovery Miles 11 230
Object-Oriented Game Development
Julian Gold Paperback R2,202 R1,724 Discovery Miles 17 240
FORTRAN 90 for Scientists and Engineers
Brian Hahn Paperback R1,393 Discovery Miles 13 930
Using UML - Software Engineering with…
Perdita Stevens Paperback R2,274 Discovery Miles 22 740
Essential Java for Scientists and…
Brian Hahn, Katherine Malan Paperback R1,296 Discovery Miles 12 960
C++ Programming - Program Design…
D. Malik Paperback R1,660 R1,485 Discovery Miles 14 850
Formal Verification - An Essential…
Erik Seligman, Tom Schubert, … Paperback R2,555 R2,376 Discovery Miles 23 760
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,199 Discovery Miles 11 990
Sams Teach Yourself: Beginning…
Greg Perry, Dean Miller Paperback R742 R570 Discovery Miles 5 700
Software Requirements And Specifications…
M. Jackson Paperback R1,478 Discovery Miles 14 780

 

Partners