0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (86)
  • R500+ (1,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Management Of Information Security (Paperback, 6th Edition): Michael Whitman, Herbert Mattord Management Of Information Security (Paperback, 6th Edition)
Michael Whitman, Herbert Mattord
R1,321 R1,228 Discovery Miles 12 280 Save R93 (7%) Ships in 10 - 15 working days

Equip your students with a management-focused overview of information security as well as the tools to effectively administer it with Whitman/Mattord's MANAGEMENT OF INFORMATION SECURITY, Sixth Edition.

More than ever, we need to prepare information security management students to build and staff security programs capable of securing systems and networks to meet the challenges in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate weaknesses in current information technologies. This text offers an exceptional blend of skills and experiences to administer and manage the more secure computing environments that organizations need.

Reflecting the latest developments from the field, it includes updated coverage of NIST, ISO and security governance along with emerging concerns like Ransomware, Cloud Computing and the Internet of Things.

Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Hardcover): S. B. Goyal, Nijalingappa Pradeep,... Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Hardcover)
S. B. Goyal, Nijalingappa Pradeep, Piyush Kumar Shukla, Mangesh M. Ghonge, Renjith V. Ravi
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

Blockchain has potential to revolutionize how manufacturers design, engineer, make and scale their products. Blockchain is gradually proving to be an effective "middleware" solution for enabling seamless interoperability within complex supply chains. Due to its technological nature, blockchain enables secure, transparent and fast data exchanges as well as allowing for the creation of immutable records databases The main advantage of Blockchain in Manufacturing Industries is product traceability, supply chain transparency, compliance monitoring, and auditability. Moreover, leveraging blockchain technology into a manufacturing enterprise can enhance its security and reduce the rates of systematic failures. So, blockchain is now used in various sectors of the manufacturing industry, such as automotive, aerospace, defense, pharmaceutical, consumer electronics, textile, food and beverages, and more. Hence, Blockchain should be seen as an investment in future-readiness and customer-centricity, not as an experimental technology - because, the evidence is overwhelming. This book will explore the strengths of Blockchain adaptation in Manufacturing Industries and Logistics Management, cover different use cases of Blockchain Technology for Manufacturing Industries and Logistics Management, and will discuss the role, impact and challenges of adopting Blockchain in Manufacturing industries and Logistics Management. The chapters will also provide the current open issues and future research trends of Blockchain, especially for Manufacturing Industries and Logistics, and will encapsulate quantitative and qualitative research for a wide spectrum of readers of the book.

Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Hardcover): Paul Paxton Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Hardcover)
Paul Paxton
R549 R503 Discovery Miles 5 030 Save R46 (8%) Ships in 18 - 22 working days
Cybersecurity in Smart Homes - Architectures, Solutions and Technologies (Hardcover): Khatoun Cybersecurity in Smart Homes - Architectures, Solutions and Technologies (Hardcover)
Khatoun
R3,483 Discovery Miles 34 830 Ships in 18 - 22 working days

Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.

Conflicts, Crimes and Regulations in Cyberspace (Hardcover): SY Laurent Conflicts, Crimes and Regulations in Cyberspace (Hardcover)
SY Laurent
R3,743 Discovery Miles 37 430 Ships in 18 - 22 working days

The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies. This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and "meso" scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared.

Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Hardcover): Zeph... Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Hardcover)
Zeph Pascall
R761 Discovery Miles 7 610 Ships in 18 - 22 working days
Technical Articles about the Voynich Manuscript (Hardcover): National Security Agency Technical Articles about the Voynich Manuscript (Hardcover)
National Security Agency
R597 Discovery Miles 5 970 Ships in 10 - 15 working days
New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover): National Security Agency New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover)
National Security Agency
R539 Discovery Miles 5 390 Ships in 10 - 15 working days
Cryptocurrencies - An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin... Cryptocurrencies - An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin Basics Including Mining, Ethereum Smart Contracts, Trading and Some Info on Programming (Hardcover)
Herbert Jones
R697 R626 Discovery Miles 6 260 Save R71 (10%) Ships in 18 - 22 working days
Limitations and Future Applications of Quantum Cryptography (Hardcover): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Hardcover)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Simple Steps to Data Encryption - A Practical Guide to Secure Computing (Paperback, New): Pete Loshin Simple Steps to Data Encryption - A Practical Guide to Secure Computing (Paperback, New)
Pete Loshin
R682 Discovery Miles 6 820 Ships in 10 - 15 working days

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

Simple descriptions of actual threat scenarios

Simple, step-by-step instructions for securing data

How to use open source, time-proven and peer-reviewed cryptographic software

Easy to follow tips for safer computing

Unbiased and platform-independent coverage of encryption tools and techniques
Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing dataHow to use open source, time-proven and peer-reviewed cryptographic software Easy-to-follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques

Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Hardcover)
Harper Fraley
R778 R682 Discovery Miles 6 820 Save R96 (12%) Ships in 18 - 22 working days
Information Security and Ethics - Social and Organizational Issues (Hardcover, illustrated Edition): Marian Quigley Information Security and Ethics - Social and Organizational Issues (Hardcover, illustrated Edition)
Marian Quigley
R2,140 Discovery Miles 21 400 Ships in 18 - 22 working days

Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including web accessibility; the digital divide; youth protection and surveillance; Information security; education; ethics in the Information professions and Internet voting; this book provides an invaluable resource for students, scholars and professionals currently working in information Technology related areas.

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,278 Discovery Miles 12 780 Ships in 10 - 15 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,146 Discovery Miles 11 460 Ships in 10 - 15 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer... Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security (Hardcover)
L. Reznik
R2,554 Discovery Miles 25 540 Ships in 10 - 15 working days

INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device's owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.

Corporate Cybersecurity - Identifying Risks and the Bug Bounty Program (Hardcover): J. Jackson Corporate Cybersecurity - Identifying Risks and the Bug Bounty Program (Hardcover)
J. Jackson
R2,573 Discovery Miles 25 730 Ships in 18 - 22 working days

CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: Contains a much-needed guide aimed at cyber and application security engineers Presents a unique defensive guide for understanding and resolving security vulnerabilities Encourages research, configuring, and managing programs from the corporate perspective Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover)
Oded Goldreich
R3,016 Discovery Miles 30 160 Ships in 18 - 22 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Information Security - Foundations, technologies and applications (Hardcover): Ali Ismail Awad, Michael Fairhurst Information Security - Foundations, technologies and applications (Hardcover)
Ali Ismail Awad, Michael Fairhurst
R3,433 R3,098 Discovery Miles 30 980 Save R335 (10%) Ships in 18 - 22 working days

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.

TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R893 R812 Discovery Miles 8 120 Save R81 (9%) Ships in 18 - 22 working days
Architectures and Frameworks for Developing and Applying Blockchain Technology (Hardcover): Nansi Shi Architectures and Frameworks for Developing and Applying Blockchain Technology (Hardcover)
Nansi Shi
R6,093 Discovery Miles 60 930 Ships in 18 - 22 working days

The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Cryptographic Solutions for Secure Online Banking and Commerce (Hardcover): Kannan Balasubramanian, K. Mala, M. Rajakan Cryptographic Solutions for Secure Online Banking and Commerce (Hardcover)
Kannan Balasubramanian, K. Mala, M. Rajakan
R5,077 Discovery Miles 50 770 Ships in 18 - 22 working days

Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking and Commerce discusses the challenges of providing security for online applications and transactions. Highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols, this book is an essential reference source for financial planners, academicians, researchers, advanced-level students, government officials, managers, and technology developers.

Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R656 R585 Discovery Miles 5 850 Save R71 (11%) Ships in 18 - 22 working days
Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover): Rajeev Singh, Mangey Ram Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover)
Rajeev Singh, Mangey Ram
R4,457 Discovery Miles 44 570 Ships in 10 - 15 working days

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications. De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Genetic Programming Theory and Practice…
Rick Riolo, Bill Worzel, … Hardcover R1,422 Discovery Miles 14 220
Experimental Methods for the Analysis of…
Thomas Bartz-beielstein, Marco Chiarandini, … Hardcover R3,878 Discovery Miles 38 780
Why Cryptography Should Not Rely on…
Juliane Kramer Hardcover R3,193 Discovery Miles 31 930
Discriminative Learning in Biometrics
David Zhang, Yong Xu, … Hardcover R3,380 Discovery Miles 33 800
Parameter Advising for Multiple Sequence…
Dan DeBlasio, John Kececioglu Hardcover R1,411 Discovery Miles 14 110
Reachable Sets of Dynamic Systems…
Stanislaw Raczynski Paperback R3,927 Discovery Miles 39 270
Handbook of Research on Modeling…
Sujata Dash, B. K. Tripathy, … Hardcover R6,518 Discovery Miles 65 180
Computational and Statistical Methods…
Shen Liu, James McGree, … Hardcover R1,802 Discovery Miles 18 020
Evolutionary Algorithms, Swarm Dynamics…
Ivan Zelinka, Guanrong Chen Hardcover R4,511 R3,441 Discovery Miles 34 410
Principles of Radio Navigation for…
Sauta O.I., Shatrakov A.Y., … Hardcover R2,653 Discovery Miles 26 530

 

Partners