0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (8)
  • R100 - R250 (571)
  • R250 - R500 (2,121)
  • R500+ (29,785)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

Flexible Databases Supporting Imprecision and Uncertainty (Hardcover, 2006 ed.): Gloria Bordogna, Giuseppe Psaila Flexible Databases Supporting Imprecision and Uncertainty (Hardcover, 2006 ed.)
Gloria Bordogna, Giuseppe Psaila
R4,206 Discovery Miles 42 060 Ships in 18 - 22 working days

This volume offers the advice of selected expert contributors on the application of heterogeneous methods for managing uncertainty and imprecision in databases. It contains both survey chapters on classic topics such as "flexible querying in databases," and up to date information on "database models to represent imperfect data." Further, it includes specific contributions on uncertainty management in database integration, and in representing and querying semistructured and spatial data.

A Platform-Centric Approach to System-on-Chip (SOC) Design (Hardcover, 2005 ed.): Vijay Madisetti, Chonlameth Arpnikanondt A Platform-Centric Approach to System-on-Chip (SOC) Design (Hardcover, 2005 ed.)
Vijay Madisetti, Chonlameth Arpnikanondt
R4,125 Discovery Miles 41 250 Ships in 18 - 22 working days

Increasing system complexity has created a pressing need for better design tools and associated methodologies and languages for meeting the stringent time to market and cost constraints. Platform-centric and platfo- based system-on-chip (SoC) design methodologies, based on reuse of software and hardware functionality, has also gained increasing exposure and usage within the Electronic System-Level (ESL) design communities. The book proposes a new methodology for realizing platform-centric design of complex systems, and presents a detailed plan for its implementation. The proposed plan allows component vendors, system integrators and product developers to collaborate effectively and efficiently to create complex products within budget and schedule constraints. This book focuses more on the use of platforms in the design of products, and not on the design of platforms themselves. Platform-centric design is not for everyone, as some may feel that it does not allow them to differentiate their offering from competitors to a significant degree. However, its proponents may claim that the time-- market and cost advantages of platform-centric design more than compensate for any drawbacks.

Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019): Song Y. Yan Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019)
Song Y. Yan
R3,174 Discovery Miles 31 740 Ships in 18 - 22 working days

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New): Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New)
R2,383 Discovery Miles 23 830 Ships in 18 - 22 working days

Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.

Classic Works of the Dempster-Shafer Theory of Belief Functions (Hardcover, 2008 ed.): Ronald R. Yager, Liping Liu Classic Works of the Dempster-Shafer Theory of Belief Functions (Hardcover, 2008 ed.)
Ronald R. Yager, Liping Liu
R8,080 Discovery Miles 80 800 Ships in 18 - 22 working days

This is a collection of classic research papers on the Dempster-Shafer theory of belief functions. The book is the authoritative reference in the field of evidential reasoning and an important archival reference in a wide range of areas including uncertainty reasoning in artificial intelligence and decision making in economics, engineering, and management. The book includes a foreword reflecting the development of the theory in the last forty years.

Information Systems Research - Relevant Theory and Informed Practice (Hardcover, 2004 ed.): Bonnie Kaplan, Duane P. Truex,... Information Systems Research - Relevant Theory and Informed Practice (Hardcover, 2004 ed.)
Bonnie Kaplan, Duane P. Truex, David Wastell, A. Trevor Wood-Harper, Janice I. DeGross
R4,427 Discovery Miles 44 270 Ships in 18 - 22 working days

In 1984, Working Group 8.2 of the International Federation for Information Processing (IFIP) threw down the gauntlet at its Manchester conference, challenging the traditionalist orthodoxy with its uncommon research approaches and topics. Manchester 1984, followed by research methods conferences in Copenhagen (1990) and Philadelphia (1997), marked the growing legitimacy of the linguistic and qualitative turns in Information Systems research and played a key role in making qualitative methods a respected part of IS research. As evidenced by the papers in this volume, Working Group 8.2 conferences showcase fresh thinking, provocative sessions, and intellectual stimulation. The spirited, at times boisterous, and always enlivening debate has turned WG8.2 conferences into life-changing and discipline-changing inspirational events.
Information Systems Research: Relevant Theory and Informed Practice comprises the edited proceedings of the WG8.2 conference, "Relevant Theory and Informed Practice: Looking Forward from a 20-Year Perspective on IS Research," which was sponsored by IFIP and held in Manchester, England, in July 2004. The conference attracted a record number of high-quality manuscripts, all of which were subjected to a rigorous reviewing process in which four to eight track chairs, associate editors, and reviewers thoughtfully scrutinized papers by the highly regarded as well as the newcomers. No person or idea was considered sacrosanct and no paper made it through this process unscathed. All authors were asked to revise the accepted papers, some more than once; thus, good papers got better. With only 29 percent of the papers accepted, these proceedings are significantly moreselective than is typical of many conference proceedings.
This volume is organized in 7 sections, with 33 full research papers providing panoramic views and reflections on the Information Systems (IS) discipline followed by papers featuring critical interpretive studies, action research, theoretical perspectives on IS research, and the methods and politics of IS development. Also included are 6 panel descriptions and a new category of "bright idea" position papers, 11 in all, wherein main points are summarized in a pithy and provocative fashion.

Escalation in Decision-Making - The Tragedy of Taurus (Hardcover, New): Helga Drummond Escalation in Decision-Making - The Tragedy of Taurus (Hardcover, New)
Helga Drummond
R5,192 Discovery Miles 51 920 Ships in 10 - 15 working days

Getting organizations going is one thing. Stopping them is another. This book examines how and why organizations become trapped in disastrous decisions. The focal point is Project Taurus, an IT venture commissioned by the London Stock Exchange and supported by numerous City Institutions. Taurus was intended to transform London's antiquated manual share settlement procedures into a state of the art electronic system that would be the envy of the world. The project collapsed after three year's intensive work and investments totalling almost GBP500 million. This book is an in depth study of escalation in decision making. The author has interviewed a number of people who played a key role and presents a most readable account of what actually happened. At the same time she sets the case in the broader literature of decision making.

Recent Advances in Computer Science and Information Engineering - Volume 3 (Hardcover, 2012 ed.): Zhihong Qian, Lei Cao,... Recent Advances in Computer Science and Information Engineering - Volume 3 (Hardcover, 2012 ed.)
Zhihong Qian, Lei Cao, Weilian Su, Tingkai Wang, Huamin Yang
R5,336 Discovery Miles 53 360 Ships in 18 - 22 working days

CSIE 2011 is an international scientific Congress for distinguished scholars engaged in scientific, engineering and technological research, dedicated to build a platform for exploring and discussing the future of Computer Science and Information Engineering with existing and potential application scenarios. The congress has been held twice, in Los Angeles, USA for the first and in Changchun, China for the second time, each of which attracted a large number of researchers from all over the world. The congress turns out to develop a spirit of cooperation that leads to new friendship for addressing a wide variety of ongoing problems in this vibrant area of technology and fostering more collaboration over the world.

The congress, CSIE 2011, received 2483 full paper and abstract submissions from 27 countries and regions over the world. Through a rigorous peer review process, all submissions were refereed based on their quality of content, level of innovation, significance, originality and legibility. 688 papers have been accepted for the international congress proceedings ultimately.

"

802.11 Wireless Networks - Security and Analysis (Hardcover, 2010): Alan Holt, Chi-Yu Huang 802.11 Wireless Networks - Security and Analysis (Hardcover, 2010)
Alan Holt, Chi-Yu Huang
R2,774 Discovery Miles 27 740 Ships in 18 - 22 working days

This book is about wireless local area networks (WLANs) based upon the IEEE 802.11 standards. It has three primary objectives: * To introduce the principles of 802.11 wireless networks and show how to con- ure equipment in order to implement various network solutions. * To provide an understandingof the security implicationsof wireless networks and demonstrate how vulnerabilities can be mitigated. * To introduce the underlying 802.11 protocols and build mathematical models in order to analyse performance in a WLAN environment. The book is aimed at industry professionals as well as undergraduate and gra- ate level students. It is intended as a companion for a university course on wireless networking. A practical approach is adopted in this book; examples are provided throughout, supported by detailed instructions. We cover a number of wireless vendors; namely, Cisco's Aironet, Alactel-Lucent's Omniaccess and Meru Networks. While separate vendors, all three systems have a Cisco IOS-like command-line interface. The GNU/Linux operating system is used extensively throughout this book.

Arithmetic and Logic in Computer Systems (Hardcover): M. Lu Arithmetic and Logic in Computer Systems (Hardcover)
M. Lu
R2,800 Discovery Miles 28 000 Ships in 18 - 22 working days

A practical introduction to fundamentals of computer arithmetic

Computer arithmetic is one of the foundations of computer science and engineering. Designed as both a practical reference for engineers and computer scientists and an introductory text for students of electrical engineering and the computer and mathematical sciences, Arithmetic and Logic in Computer Systems describes the various algorithms and implementations in computer arithmetic and explains the fundamental principles that guide them.

Focusing on promoting an understanding of the concepts, Professor Mi Lu addresses:

  • Number representations, including the Conventional Radix and
  • Signed-Digit Number Systems as well as Floating Point, Residue, and Logarithmic Number Systems
  • Ripple Carry Adders and high-speed adders
  • Sequential multiplication, parallel multiplication, sequential division, and fast array dividers
  • Floating point operations, Residue Number operations, and operations through logarithms

To assist the reader, alternative methods are examined and thorough explanations of the material are supplied, along with discussions of the reasoning behind the theory. Ample examples and problems help the reader master the concepts.

Digital Twin Technologies and Smart Cities (Hardcover, 1st ed. 2020): Maryam Farsi, Alireza Daneshkhah, Amin Hosseinian-Far,... Digital Twin Technologies and Smart Cities (Hardcover, 1st ed. 2020)
Maryam Farsi, Alireza Daneshkhah, Amin Hosseinian-Far, Hamid Jahankhani
R3,987 Discovery Miles 39 870 Ships in 10 - 15 working days

This book provides a holistic perspective on Digital Twin (DT) technologies, and presents cutting-edge research in the field. It assesses the opportunities that DT can offer for smart cities, and covers the requirements for ensuring secure, safe and sustainable smart cities. Further, the book demonstrates that DT and its benefits with regard to: data visualisation, real-time data analytics, and learning leading to improved confidence in decision making; reasoning, monitoring and warning to support accurate diagnostics and prognostics; acting using edge control and what-if analysis; and connection with back-end business applications hold significant potential for applications in smart cities, by employing a wide range of sensory and data-acquisition systems in various parts of the urban infrastructure. The contributing authors reveal how and why DT technologies that are used for monitoring, visualising, diagnosing and predicting in real-time are vital to cities' sustainability and efficiency. The concepts outlined in the book represents a city together with all of its infrastructure elements, which communicate with each other in a complex manner. Moreover, securing Internet of Things (IoT) which is one of the key enablers of DT's is discussed in details and from various perspectives. The book offers an outstanding reference guide for practitioners and researchers in manufacturing, operations research and communications, who are considering digitising some of their assets and related services. It is also a valuable asset for graduate students and academics who are looking to identify research gaps and develop their own proposals for further research.

Mathematical Techniques in Multi-sensor Data Fusion (Hardcover): David L. Hall Mathematical Techniques in Multi-sensor Data Fusion (Hardcover)
David L. Hall
R2,869 Discovery Miles 28 690 Ships in 18 - 22 working days

This invaluable reference offers the most comprehensive introduction available to the concepts of multisensor data fusion. It introduces key algorithms, provides advice on their utilization, and raises issues associated with their implementation. With a diverse set of mathematical and heuristic techniques for combining data from multiple sources, the book shows how to implement a data fusion system, describes the process for algorithm selection, functional architectures and requirements for ancillary software, and illustrates man-machine interface requirements an database issues.

Mathematics and Computing - ICMC, Haldia, India, January 2015 (Hardcover, 2015 ed.): Ram. N. Mohapatra, Dipanwita Roy... Mathematics and Computing - ICMC, Haldia, India, January 2015 (Hardcover, 2015 ed.)
Ram. N. Mohapatra, Dipanwita Roy Chowdhury, Debasis Giri
R5,319 R4,998 Discovery Miles 49 980 Save R321 (6%) Ships in 10 - 15 working days

This book discusses recent developments and contemporary research in mathematics, statistics and their applications in computing. All contributing authors are eminent academicians, scientists, researchers and scholars in their respective fields, hailing from around the world. This is the second conference on mathematics and computing organized at Haldia Institute of Technology, India. The conference has emerged as a powerful forum, offering researchers a venue to discuss, interact and collaborate, and stimulating the advancement of mathematics and its applications in computer science. The book will allow aspiring researchers to update their knowledge of cryptography, algebra, frame theory, optimizations, stochastic processes, compressive sensing, functional analysis, complex variables, etc. Educating future consumers, users, producers, developers and researchers in mathematics and computing is a challenging task and essential to the development of modern society. Hence, mathematics and its applications in computing are of vital importance to a broad range of communities, including mathematicians and computing professionals across different educational levels and disciplines. In current research, modeling and simulation, making decisions under uncertainty and pattern recognition have become very common. Professionals across different educational levels and disciplines need exposure to advances in mathematics and computing. In this context, this book presents research papers on applicable areas of current interest. It also includes papers in which experts summarize research findings, such as signal processing and analysis and low-rank-matrix approximation for solving large systems, which will emerge as powerful tools for further research. These new advances and cutting-edge research in the fields of mathematics and their applications to computing are of paramount importance for young researchers.

Optimized ASIP Synthesis from Architecture Description Language Models (Hardcover, 2007 ed.): Oliver Schliebusch, Heinrich... Optimized ASIP Synthesis from Architecture Description Language Models (Hardcover, 2007 ed.)
Oliver Schliebusch, Heinrich Meyr, Rainer Leupers
R2,759 Discovery Miles 27 590 Ships in 18 - 22 working days

For the first time advances in semiconductor manufacturing do not lead to a corresponding increase in performance. At 65 nm and below it is predicted that only a small portion of performance increase will be attributed to shrinking geometries while the lion share is due to innovative processor architectures. To substantiate this assertion it is instructive to look at major drivers of the semiconductor industry: wireless communications and multimedia. Both areas are characterized by an exponentially increasing demand of computational power, which cannot be provided in an energy-efficient manner by traditional processor architectures. Todaya (TM)s applications in wireless communications and multimedia require highly specialized and optimized architectures.

New software tools and a sophisticated methodology above RTL are required to answer the challenges of designing an optimized application specific processor (ASIP). This book offers an automated and fully integrated implementation flow and compares it to common implementation practice. Case-studies emphasise that neither the architectural advantages nor the design space of ASIPs are sacrificed for an automated implementation. Realizing a building block which fulfils the requirements on programmability and computational power is now efficiently possible for the first time.

Optimized ASIP Synthesis from Architecture Description Language Models inspires hardware designers as well as application engineers to design powerful ASIPs that will make their SoC designs unique.

Fifth IFIP International Conference on Theoretical Computer Science - TCS 2008 - IFIP 20th World Computer Congress, TC 1,... Fifth IFIP International Conference on Theoretical Computer Science - TCS 2008 - IFIP 20th World Computer Congress, TC 1, Foundations of Computer Science, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Giorgio Ausiello, Juhani Karhumaki, Giancarlo Mauri, Luke Ong
R4,317 Discovery Miles 43 170 Ships in 18 - 22 working days

The papers containedin this volume were presentedat the 5th IFIP InternationalC- ference on Theoretical Computer Science (IFIP TCS), 7-10 September 2008, Milan, Italy. TCS is a bi-annual conference.The ?rst conferenceof the series was held in Sendai (Japan, 2000), followed by Montreal (Canada, 2002), Toulouse (France, 2004) and Santiago (Chile, 2006).TCS is organizedby IFIP TC1 (Technical Committee 1: Fo- dations of Computer Science) and Working Group 2.2 of IFIP TC2 (Technical C- mittee 2: Software: Theory and Practice). TCS 2008 was part of the 20th IFIP World Computer Congress (WCC 2008), constituting the TC1 Track of WCC 2008. The contributed papers were selected from 36+45 submissions from altogether 30 countries. A total of 14+16 submissions were accepted as full papers. Papers in this volume are original contributions in two general areas: Track A: Algorithms, C- plexity and Models of Computation;and Track B: Logic, Semantics, Speci?cation and Veri?cation. The conference also included seven invited presentations, from Luca Cardelli, Thomas Ehrhard, Javier Esparza, Antonio Restivo, Tim Roughgarden, Gr- gorz Rozenberg and Avraham Trakhtman. These presentations are included (except one) in this volume. In particular, Luca Cardelli, Javier Esparza, Antonio Restivo, Tim Roughgarden and Avraham Trakhtman accepted our invitation to write full papers - lated to their talks.

Symbolic Integration I - Transcendental Functions (Hardcover, 2nd ed. 2005): Manuel Bronstein Symbolic Integration I - Transcendental Functions (Hardcover, 2nd ed. 2005)
Manuel Bronstein
R3,286 Discovery Miles 32 860 Ships in 18 - 22 working days

Symbolic Integration I is destined to become the standard reference work in the field. Manuel Bronstein is a leading expert on this topic and his book is the first to treat the subject both comprehensively and in sufficient detail - incorporating new results along the way. The book addresses mathematicians and computer scientists interested in symbolic computation, developers and programmers of computer algebra systems as well as users of symbolic integration methods. Many algorithms are given in pseudocode ready for immediate implementation, making the book equally suitable as a textbook for lecture courses on symbolic integration.

This second edition offers a new chapter on parallel integration, a number of other improvements and a couple of additional exercises.

From the reviews of the first edition: ..". The writing is excellent, and the author provides a clear and coherent treatment of the problem of symbolic integration of transcendental functions " F. Winkler, Computing Reviews 1997 "

VLSI-SoC: Forward-Looking Trends in IC and Systems Design - 18th IFIP WG 10.5/IEEE International Conference on Very Large Scale... VLSI-SoC: Forward-Looking Trends in IC and Systems Design - 18th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2010, Madrid, Spain, September 27-29, 2010, Revised Selected Papers (Hardcover, 2012)
Jose L. Ayala, David Atienza Alonso, Ricardo Reis
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book contains extended and revised versions of the best papers presented at the 18th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2010, held in Madrid, Spain, in September 2010. The 14 papers included in the book were carefully reviewed and selected from the 52 full papers presented at the conference. The papers cover a wide variety of excellence in VLSI technology and advanced research. They address the current trend toward increasing chip integration and technology process advancements bringing about stimulating new challenges both at the physical and system-design levels, as well as in the test of theses systems.

Smart Card Security and Applications (Hardcover): Mike Hendry Smart Card Security and Applications (Hardcover)
Mike Hendry
R2,845 Discovery Miles 28 450 Ships in 18 - 22 working days

Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.

Internetware - A New Software Paradigm for Internet Computing (Hardcover, 1st ed. 2016): Hong Mei, Jian Lu Internetware - A New Software Paradigm for Internet Computing (Hardcover, 1st ed. 2016)
Hong Mei, Jian Lu
R2,830 Discovery Miles 28 300 Ships in 18 - 22 working days

This book presents a comprehensive introduction to Internetware, covering aspects ranging from the fundamental principles and engineering methodologies to operational platforms, quality measurements and assurance and future directions. It also includes guidelines and numerous representative real-world case studies that serve as an invaluable reference resource for software engineers involved in the development of Internetware applications. Providing a detailed analysis of current trends in modern software engineering in the Internet, it offers an essential blueprint and an important contribution to the research on software engineering and systems for future Internet computing.

Computational Science and High Performance Computing IV - The 4th Russian-German Advanced Research Workshop, Freiburg, Germany,... Computational Science and High Performance Computing IV - The 4th Russian-German Advanced Research Workshop, Freiburg, Germany, October 12 to 16, 2009 (Hardcover, Edition.)
Egon Krause, Yurii Shokin, Michael M Resch, Dietmar Kroener, Nina Shokina
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

This volume contains 27 contributions to the Forth Russian-German Advanced Research Workshop on Computational Science and High Performance Computing presented in October 2009 in Freiburg, Germany. The workshop was organized jointly by the High Performance Computing Center Stuttgart (HLRS), the Institute of Computational Technologies of the Siberian Branch of the Russian Academy of Sciences (ICT SB RAS) and the Section of Applied Mathematics of the University of Freiburg (IAM Freiburg) The contributions range from computer science, mathematics and high performance computing to applications in mechanical and aerospace engineering. They show a wealth of theoretical work and simulation experience with a potential of bringing together theoretical mathematical modelling and usage of high performance computing systems presenting the state of the art of computational technologies.

Advanced Technologies for Intelligent Systems of National Border Security (Hardcover, 2013 ed.): Aleksander Nawrat, Krzysztof... Advanced Technologies for Intelligent Systems of National Border Security (Hardcover, 2013 ed.)
Aleksander Nawrat, Krzysztof Simek, Andrzej Swierniak
R2,682 Discovery Miles 26 820 Ships in 18 - 22 working days

One of the world s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated

methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles.

The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed services. Scientists and researchers involved in computer vision, image processing, data fusion, control algorithms or IC can find many valuable suggestions and solutions. Multiple challenges for such systems are also presented. "

Hacking: Hacking for Beginners and Basic Security: How to Hack (Hardcover): Jacob Hatcher Hacking: Hacking for Beginners and Basic Security: How to Hack (Hardcover)
Jacob Hatcher
R861 Discovery Miles 8 610 Ships in 18 - 22 working days

HACKING: Ultimate Hacking for Beginners Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent. In HACKING: Ultimate Hacking for Beginners you will learn: The advantages and disadvantages of Bluetooth technology. The tools and software that is used for Bluetooth hacking with a brief description The four primary methods of hacking a website and a brief explanation of each Seven different types of spamming, with a focus on email spamming and how to prevent it. Eight common types of security breaches How to understand the process of hacking computers and how to protect against it Using CAPTCHA to prevent hacking

Hardness of Approximation Between P and NP (Hardcover): Aviad Rubinstein Hardness of Approximation Between P and NP (Hardcover)
Aviad Rubinstein
R2,714 Discovery Miles 27 140 Ships in 18 - 22 working days

Nash equilibrium is the central solution concept in Game Theory. Since Nash's original paper in 1951, it has found countless applications in modeling strategic behavior of traders in markets, (human) drivers and (electronic) routers in congested networks, nations in nuclear disarmament negotiations, and more. A decade ago, the relevance of this solution concept was called into question by computer scientists, who proved (under appropriate complexity assumptions) that computing a Nash equilibrium is an intractable problem. And if centralized, specially designed algorithms cannot find Nash equilibria, why should we expect distributed, selfish agents to converge to one? The remaining hope was that at least approximate Nash equilibria can be efficiently computed.Understanding whether there is an efficient algorithm for approximate Nash equilibrium has been the central open problem in this field for the past decade. In this book, we provide strong evidence that even finding an approximate Nash equilibrium is intractable. We prove several intractability theorems for different settings (two-player games and many-player games) and models (computational complexity, query complexity, and communication complexity). In particular, our main result is that under a plausible and natural complexity assumption ("Exponential Time Hypothesis for PPAD"), there is no polynomial-time algorithm for finding an approximate Nash equilibrium in two-player games. The problem of approximate Nash equilibrium in a two-player game poses a unique technical challenge: it is a member of the class PPAD, which captures the complexity of several fundamental total problems, i.e., problems that always have a solution; and it also admits a quasipolynomial time algorithm. Either property alone is believed to place this problem far below NP-hard problems in the complexity hierarchy; having both simultaneously places it just above P, at what can be called the frontier of intractability. Indeed, the tools we develop in this book to advance on this frontier are useful for proving hardness of approximation of several other important problems whose complexity lies between P and NP: Brouwer's fixed point, market equilibrium, CourseMatch (A-CEEI), densest k-subgraph, community detection, VC dimension and Littlestone dimension, and signaling in zero-sum games.

Uncertainty Theory (Hardcover, 4th ed. 2015): Baoding Liu Uncertainty Theory (Hardcover, 4th ed. 2015)
Baoding Liu
R4,697 R3,626 Discovery Miles 36 260 Save R1,071 (23%) Ships in 10 - 15 working days

When no samples are available to estimate a probability distribution, we have to invite some domain experts to evaluate the belief degree that each event will happen. Perhaps some people think that the belief degree should be modeled by subjective probability or fuzzy set theory. However, it is usually inappropriate because both of them may lead to counterintuitive results in this case. In order to rationally deal with belief degrees, uncertainty theory was founded in 2007 and subsequently studied by many researchers. Nowadays, uncertainty theory has become a branch of axiomatic mathematics for modeling belief degrees. This is an introductory textbook on uncertainty theory, uncertain programming, uncertain statistics, uncertain risk analysis, uncertain reliability analysis, uncertain set, uncertain logic, uncertain inference, uncertain process, uncertain calculus, and uncertain differential equation. This textbook also shows applications of uncertainty theory to scheduling, logistics, networks, data mining, control, and finance.

Networks: From Biology to Theory (Hardcover, 2007 ed.): Jianfeng Feng, Jurgen Jost, Minping Qian Networks: From Biology to Theory (Hardcover, 2007 ed.)
Jianfeng Feng, Jurgen Jost, Minping Qian
R2,691 Discovery Miles 26 910 Ships in 18 - 22 working days

Recent decades have witnessed the thriving development of new mathematical, computational and theoretical approaches, such as bioinformatics and neuroinformatics, to tackle fundamental issues in biology. These approaches focus no longer on individual units, such as nerve cells or genes, but rather on dynamic patterns of interactions between them. This volume explores the concept in full, featuring contributions from a global group of contributors, many of whom are pre-eminent in their field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Axiomatic Design - Advances and…
Nam P Suh Hardcover R5,972 Discovery Miles 59 720
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,247 R1,166 Discovery Miles 11 660
Systems Analysis And Design
Scott Tilley Hardcover R1,356 R1,259 Discovery Miles 12 590
Introduction to the Theory of…
Michael Sipser Hardcover R1,326 R1,230 Discovery Miles 12 300
Introduction to Computer Theory
Daniel I. A. Cohen Paperback  (4)
R7,003 Discovery Miles 70 030
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,000 R599 Discovery Miles 5 990
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, … Paperback R1,136 Discovery Miles 11 360
Early Scientific Computing in Britain
Mary Croarken Hardcover R1,326 Discovery Miles 13 260
Real-Time Systems Development
Rob Williams Paperback R1,319 Discovery Miles 13 190

 

Partners