0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (54)
  • R250 - R500 (369)
  • R500+ (14,865)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Introduction to Data Systems - Building from Python (Hardcover, 1st ed. 2020): Thomas Bressoud, David White Introduction to Data Systems - Building from Python (Hardcover, 1st ed. 2020)
Thomas Bressoud, David White
R2,423 Discovery Miles 24 230 Ships in 12 - 19 working days

Encompassing a broad range of forms and sources of data, this textbook introduces data systems through a progressive presentation. Introduction to Data Systems covers data acquisition starting with local files, then progresses to data acquired from relational databases, from REST APIs and through web scraping. It teaches data forms/formats from tidy data to relationally defined sets of tables to hierarchical structure like XML and JSON using data models to convey the structure, operations, and constraints of each data form. The starting point of the book is a foundation in Python programming found in introductory computer science classes or short courses on the language, and so does not require prerequisites of data structures, algorithms, or other courses. This makes the material accessible to students early in their educational career and equips them with understanding and skills that can be applied in computer science, data science/data analytics, and information technology programs as well as for internships and research experiences. This book is accessible to a wide variety of students. By drawing together content normally spread across upper level computer science courses, it offers a single source providing the essentials for data science practitioners. In our increasingly data-centric world, students from all domains will benefit from the "data-aptitude" built by the material in this book.

Uncovering Essential Software Artifacts through Business Process Archeology (Hardcover): Ricardo Perez-Castillo, Mario G.... Uncovering Essential Software Artifacts through Business Process Archeology (Hardcover)
Ricardo Perez-Castillo, Mario G. Piattini
R5,416 Discovery Miles 54 160 Ships in 10 - 15 working days

Corporations accumulate a lot of valuable data and knowledge over time, but storing and maintaining this data can be a logistic and financial headache for business leaders and IT specialists. Uncovering Essential Software Artifacts through Business Process Archaeology introduces an emerging method of software modernisation used to effectively manage legacy systems and company operations supported by such systems. This book presents methods, techniques, and new trends on business process archaeology as well as some industrial success stories. Business experts, professionals, and researchers working in the field of information and knowledge management will use this reference source to efficiently and effectively implement and utilise business knowledge.

New Approaches to Data Analytics and Internet of Things Through Digital Twin (Hardcover): P. Karthikeyan, Polinpapilinho F.... New Approaches to Data Analytics and Internet of Things Through Digital Twin (Hardcover)
P. Karthikeyan, Polinpapilinho F. Katina, S.P. Anandaraj
R7,251 Discovery Miles 72 510 Ships in 10 - 15 working days

Even though many data analytics tools have been developed in the past years, their usage in the field of cyber twin warrants new approaches that consider various aspects including unified data representation, zero-day attack detection, data sharing across threat detection systems, real-time analysis, sampling, dimensionality reduction, resource-constrained data processing, and time series analysis for anomaly detection. Further study is required to fully understand the opportunities, benefits, and difficulties of data analytics and the internet of things in today's modern world. New Approaches to Data Analytics and Internet of Things Through Digital Twin considers how data analytics and the internet of things can be used successfully within the field of digital twin as well as the potential future directions of these technologies. Covering key topics such as edge networks, deep learning, intelligent data analytics, and knowledge discovery, this reference work is ideal for computer scientists, industry professionals, researchers, scholars, practitioners, academicians, instructors, and students.

e-Democracy - Toward a New Model of (Inter)active Society (Hardcover, 1st ed. 2019): Alfredo M. Ronchi e-Democracy - Toward a New Model of (Inter)active Society (Hardcover, 1st ed. 2019)
Alfredo M. Ronchi
R1,541 Discovery Miles 15 410 Ships in 10 - 15 working days

This book explores the main elements of e-Democracy, the term normally used to describe the implementation of democratic government processes by electronic means. It provides insights into the main technological and human issues regarding governance, government, participation, inclusion, empowerment, procurement and, last but not least, ethical and privacy issues. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services totally or partially delivered by governments or non-government organizations. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflows, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. This includes having a significant population of citizens who are willing and able to adopt and use online services; as well as developing the managerial and technical capability to implement applications that meet citizens' needs. This book helps readers understand the mutual dependencies involved; further, a selection of success stories and failures, duly commented on, enables readers to identify the right approach to innovation in governmental e-Services. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.

Temporal and Spatio-temporal Data Mining (Hardcover): Wynne Hsu, Mong Li Lee, Junmei Wang Temporal and Spatio-temporal Data Mining (Hardcover)
Wynne Hsu, Mong Li Lee, Junmei Wang
R2,817 Discovery Miles 28 170 Ships in 10 - 15 working days

Addresses different scenarios when finding complex relationships in spatiotemporal data by modeling them as graphs, giving readers a comprehensive synopsis on two successful partition-based algorithms designed by the authors.

Dynamic Profiles for Voting Advice Applications - An Implementation for the 2017 Ecuador National Elections (Hardcover, 1st ed.... Dynamic Profiles for Voting Advice Applications - An Implementation for the 2017 Ecuador National Elections (Hardcover, 1st ed. 2020)
Luis Teran
R2,874 Discovery Miles 28 740 Ships in 10 - 15 working days

Electronic participation is an emerging and growing research area that makes use of internet solutions to enhance citizens' participation in government processes in order to provide a fair and efficient society. This book examines recommender-system technologies and voting advice applications as tools to enable electronic citizen participation during election campaigns. Further, making use of fuzzy classification, it provides an evaluation framework for eParticipation. A dynamic voting advice application developed for the 2017 Ecuador national election serves as a real-world case study to introduce readers to the practical implementation and evaluation issues. The book concludes with a comprehensive analysis of the 2017 election project based on altmetrics, Google Analytics and statistics from the case study.

Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia,... Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers (Hardcover, 1st ed. 2021)
Michael Friedewald, Stefan Schiffner, Stephan Krenn
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.

Innovative Computing Trends and Applications (Hardcover, 1st ed. 2019): Pandian Vasant, Igor Litvinchev, Jose Antonio... Innovative Computing Trends and Applications (Hardcover, 1st ed. 2019)
Pandian Vasant, Igor Litvinchev, Jose Antonio Marmolejo-Saucedo
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book provides a survey on research, development, and trends in innovative computing in communications engineering and computer science. It features selected and expanded papers from the EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018), with contributions by top global researchers and practitioners in the field. The content is of relevance to computer science graduates, researchers and academicians in computer science and engineering. The authors discuss new technologies in computer science and engineering that have reduced the dimension of data coverage worldwide, reducing the gaps and coverage of domains globally. They discuss how these advances have also contributed to strength in prediction, analysis, and decision in the areas such as Technology, Management, Social Computing, Green Computing, and Telecom. Contributions show how nurturing the research in technology and computing is essential to finding the right pattern in the ocean of data. Focuses on research areas of innovative computing and its application in engineering and technology; Includes contributions from researchers in computing and engineering from around the world; Features selected and expanded papers from EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018).

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,203 Discovery Miles 12 030 Ships in 12 - 19 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Hardcover, 1st ed. 2021): Debahuti Mishra, Rajkumar... Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Hardcover, 1st ed. 2021)
Debahuti Mishra, Rajkumar Buyya, Prasant Mohapatra, Srikanta Patnaik
R5,779 Discovery Miles 57 790 Ships in 10 - 15 working days

This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.

Automating Cities - Design, Construction, Operation and Future Impact (Hardcover, 1st ed. 2021): Brydon T. Wang, C.M. Wang Automating Cities - Design, Construction, Operation and Future Impact (Hardcover, 1st ed. 2021)
Brydon T. Wang, C.M. Wang
R4,647 Discovery Miles 46 470 Ships in 10 - 15 working days

This book highlights the latest advancements in the use of automated systems in the design, construction, operation and future of the built environment and its occupants. It considers how the use of automated decision-making frameworks, artificial intelligence and other technologies of automation are presently impacting the practice of architects, engineers, project managers and contractors, and articulates the near future changes to workflows, legal frameworks and the wider AEC industry. This book surveys and compiles the use of city apps, robots that operate buildings and fabricate structural elements, 3D printing, drones, sensors, algorithms, and advanced prefabricated modules. The book also contributes to the growing literature on smart cities, and explores the impacts on data privacy and data sovereignty that arise through the use of sensors, digital twins and intelligent transport systems. It provides a useful reference for further research and development in the area of automation in design and construction to architects, engineers, project managers, superintendents and construction lawyers, contractors, policy makers, and students.

Pattern Recognition And Big Data (Hardcover): Sankar Kumar Pal, Amita Pal Pattern Recognition And Big Data (Hardcover)
Sankar Kumar Pal, Amita Pal
R8,185 Discovery Miles 81 850 Ships in 10 - 15 working days

Containing twenty six contributions by experts from all over the world, this book presents both research and review material describing the evolution and recent developments of various pattern recognition methodologies, ranging from statistical, linguistic, fuzzy-set-theoretic, neural, evolutionary computing and rough-set-theoretic to hybrid soft computing, with significant real-life applications.Pattern Recognition and Big Data provides state-of-the-art classical and modern approaches to pattern recognition and mining, with extensive real life applications. The book describes efficient soft and robust machine learning algorithms and granular computing techniques for data mining and knowledge discovery; and the issues associated with handling Big Data. Application domains considered include bioinformatics, cognitive machines (or machine mind developments), biometrics, computer vision, the e-nose, remote sensing and social network analysis.

Data Science for Business - Predictive Modeling, Data Mining, Data Analytics, Data Warehousing, Data Visualization, Regression... Data Science for Business - Predictive Modeling, Data Mining, Data Analytics, Data Warehousing, Data Visualization, Regression Analysis, Database Querying, and Machine Learning for Beginners (Hardcover)
Herbert Jones
R716 R632 Discovery Miles 6 320 Save R84 (12%) Ships in 10 - 15 working days
Advanced Practical Approaches to Web Mining Techniques and Application (Hardcover): Ahmed Obaid, Zdzislaw Polkowski Advanced Practical Approaches to Web Mining Techniques and Application (Hardcover)
Ahmed Obaid, Zdzislaw Polkowski
R7,211 Discovery Miles 72 110 Ships in 10 - 15 working days

This book illustrates all the concepts of web mining from gathering the web data sources to discovering and representing the extracted knowledge. This book is ideal for many researchers and scholars who are interested in a reference book that involves all the techniques and algorithms that are applied to a Web environment. This book illustrates, analyzes, and compares all the techniques, applications, and algorithms that are used in Web mining categories and provides a thorough overview to undergraduates, postgraduates, and scholars who wish to learn more about Web and data mining. The goal of this book is to foster transformative, multidisciplinary, and novel approaches that introduce the practical approach of analyzing various web data sources and extracting knowledge by taking into consideration the unique challenges present in the environment. This book provides a complete overview of Web mining techniques and applications; it will be crucial for postgraduate students who want to understand the Web environment better and do not know the differences between Web mining and data mining. It will also be helpful for companies and organizations to discover practical solutions to handle their internet data in a more efficient way, as well as undergraduate students in software engineering and computer science engineering departments who do not have a complete reference book that offers them a full explanation about Web mining.

Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
R4,931 Discovery Miles 49 310 Ships in 12 - 19 working days

This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.

New Developments of IT, IoT and ICT Applied to Agriculture - Proceedings of ICAIT 2019 (Hardcover, 1st ed. 2021): Kazumi... New Developments of IT, IoT and ICT Applied to Agriculture - Proceedings of ICAIT 2019 (Hardcover, 1st ed. 2021)
Kazumi Nakamatsu, Roumen Kountchev, Ari Aharari, Nashwa El-Bendary, Bin Hu
R9,533 Discovery Miles 95 330 Ships in 10 - 15 working days

The proceedings publishes new research results of scholars from the First International Conference on Agriculture and Information (ICAIT2019) organized by IRNet International Academic Communication Center, held during November 22-24, 2019. The book covers works from active researchers who are working on collaboration of agriculture and various information technologies such as ICT (Information and Communication Technologies) applicable/applied to agricultural produce, manufacturing preservation and distribution of agricultural products, etc. The book focuses on theory, design, development, testing and evaluation of all information technologies applicable/applied to various parts of agriculture and its infrastructure. The topics included are information technologies applicable to smart agriculture, intelligent information systems for smart farm systems, web-based intelligent information systems on agriculture, ICT-based marketing of agricultural products, agricultural product consumption network systems, IoT for agricultural produce and products, soft computing theories, intelligent management for agriculture, data science techniques for agriculture.

Handbook of Big Geospatial Data (Hardcover, 1st ed. 2021): Martin Werner, Yao-Yi Chiang Handbook of Big Geospatial Data (Hardcover, 1st ed. 2021)
Martin Werner, Yao-Yi Chiang
R6,450 Discovery Miles 64 500 Ships in 10 - 15 working days

This handbook covers a wide range of topics related to the collection, processing, analysis, and use of geospatial data in their various forms. This handbook provides an overview of how spatial computing technologies for big data can be organized and implemented to solve real-world problems. Diverse subdomains ranging from indoor mapping and navigation over trajectory computing to earth observation from space, are also present in this handbook. It combines fundamental contributions focusing on spatio-textual analysis, uncertain databases, and spatial statistics with application examples such as road network detection or colocation detection using GPUs. In summary, this handbook gives an essential introduction and overview of the rich field of spatial information science and big geospatial data. It introduces three different perspectives, which together define the field of big geospatial data: a societal, governmental, and governance perspective. It discusses questions of how the acquisition, distribution and exploitation of big geospatial data must be organized both on the scale of companies and countries. A second perspective is a theory-oriented set of contributions on arbitrary spatial data with contributions introducing into the exciting field of spatial statistics or into uncertain databases. A third perspective is taking a very practical perspective to big geospatial data, ranging from chapters that describe how big geospatial data infrastructures can be implemented and how specific applications can be implemented on top of big geospatial data. This would include for example, research in historic map data, road network extraction, damage estimation from remote sensing imagery, or the analysis of spatio-textual collections and social media. This multi-disciplinary approach makes the book unique. This handbook can be used as a reference for undergraduate students, graduate students and researchers focused on big geospatial data. Professionals can use this book, as well as practitioners facing big collections of geospatial data.

Data Science and Digital Transformation in the Fourth Industrial Revolution (Hardcover, 1st ed. 2021): Jongbae Kim, Roger Lee Data Science and Digital Transformation in the Fourth Industrial Revolution (Hardcover, 1st ed. 2021)
Jongbae Kim, Roger Lee
R4,611 Discovery Miles 46 110 Ships in 10 - 15 working days

This edited book presents scientific results of the International Semi-Virtual Workshop on Data Science and Digital Transformation in the Fourth Industrial Revolution (DSDT 2020) which was held on October 15, 2020, at Soongsil University, Seoul, Korea. The aim of this workshop was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The workshop organizers selected the best papers from those papers accepted for presentation at the workshop. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 17 of the conference's most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.

A Manager's Primer on e-Networking - An Introduction to Enterprise Networking in e-Business ACID Environment (Hardcover,... A Manager's Primer on e-Networking - An Introduction to Enterprise Networking in e-Business ACID Environment (Hardcover, New)
Dragan Nikolik
R2,672 Discovery Miles 26 720 Ships in 10 - 15 working days

This book negotiates the hyper dimensions of the Internet through stories from myriads of Web sites, with its fluent presentation and simple but chronological organization of topics highlighting numerous opportunities and providing a solid starting point not only for inexperienced entrepreneurs and managers but anyone interested in applying information technology in business through real or virtual enterprise networks to date. "A Manager's Primer on e-Networking" is an easy to follow primer on modern enterprise networking that every manager needs to read.

Innovations in XML Applications and Metadata Management - Advancing Technologies (Hardcover, New): Jose Carlos Ramalho, Alberto... Innovations in XML Applications and Metadata Management - Advancing Technologies (Hardcover, New)
Jose Carlos Ramalho, Alberto Simoes, Ricardo Queiros
R5,316 Discovery Miles 53 160 Ships in 10 - 15 working days

As new concepts such as virtualisation, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technologies towards application development based on previous concepts. This book aims to highlights the variety of purposes for XML applications and how the technology development brings together advancements in the virtual world.

Encyclopedia of Information Ethics and Security (Hardcover): Encyclopedia of Information Ethics and Security (Hardcover)
R8,884 Discovery Miles 88 840 Ships in 10 - 15 working days

The "Encyclopedia of Information Ethics and Security" is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool covers such topics as computer crime, information warfare, privacy, surveillance, intellectual property, and education.

Big Data Security (Hardcover): Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya Big Data Security (Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
R3,852 Discovery Miles 38 520 Ships in 12 - 19 working days

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,262 Discovery Miles 12 620 Ships in 12 - 19 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover): Husrev T. Sencar, Mahalingam... Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover)
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
R2,515 R1,744 Discovery Miles 17 440 Save R771 (31%) Ships in 12 - 19 working days

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Arithmetic and Algebraic Circuits (Hardcover, 1st ed. 2021): Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla... Arithmetic and Algebraic Circuits (Hardcover, 1st ed. 2021)
Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla Roure, Antonio Garcia Rios, Maria Jose Lloris Meseguer
R5,234 Discovery Miles 52 340 Ships in 10 - 15 working days

This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Parallel Computing: Fundamentals…
E.H. D'Hollander, G.R. Joubert, … Hardcover R7,110 Discovery Miles 71 100
Heterogeneous Information Network…
Chuan Shi, Philip S. Yu Hardcover R4,574 Discovery Miles 45 740
Productivity and Efficiency Measurement…
Boon L. Lee Paperback R2,528 Discovery Miles 25 280
The Sourcebook of Parallel Computing
Jack Dongarra, Ian Foster, … Hardcover R2,109 Discovery Miles 21 090
Artificial Intelligence in China…
Qilian Liang, Wei Wang, … Hardcover R9,653 Discovery Miles 96 530
Next-Generation Applications and…
Filipe Portela, Ricardo Queiros Hardcover R7,211 Discovery Miles 72 110
6th International Symposium of Space…
H. Paul Urbach, Qifeng Yu Hardcover R3,172 Discovery Miles 31 720
Joomla! Bible, Second Edition
R Shreves Paperback R1,192 R1,026 Discovery Miles 10 260
Design of Control Laws and State…
Arturo Tadeo Espinoza-Fraire, Alejandro Enrique Dzul Lopez, … Paperback R4,171 Discovery Miles 41 710
How Confidence Works - The New Science…
Ian Robertson Paperback R433 Discovery Miles 4 330

 

Partners