0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (38)
  • R500+ (635)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Information theory > General

Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016): Chuankun... Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R3,721 Discovery Miles 37 210 Ships in 10 - 15 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Evolution of Cyber Technologies and Operations to 2035 (Paperback, Softcover reprint of the original 1st ed. 2015): Misty... Evolution of Cyber Technologies and Operations to 2035 (Paperback, Softcover reprint of the original 1st ed. 2015)
Misty Blowers
R4,739 Discovery Miles 47 390 Ships in 10 - 15 working days

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.

Information Theory for Electrical Engineers (Hardcover, 1st ed. 2018): Orhangazi Information Theory for Electrical Engineers (Hardcover, 1st ed. 2018)
Orhangazi
R2,733 Discovery Miles 27 330 Ships in 10 - 15 working days

This book explains the fundamental concepts of information theory, so as to help students better understand modern communication technologies. It was especially written for electrical and communication engineers working on communication subjects. The book especially focuses on the understandability of the topics, and accordingly uses simple and detailed mathematics, together with a wealth of solved examples. The book consists of four chapters, the first of which explains the entropy and mutual information concept for discrete random variables. Chapter 2 introduces the concepts of entropy and mutual information for continuous random variables, along with the channel capacity. In turn, Chapter 3 is devoted to the typical sequences and data compression. One of Shannon's most important discoveries is the channel coding theorem, and it is critical for electrical and communication engineers to fully comprehend the theorem. As such, Chapter 4 solely focuses on it. To gain the most from the book, readers should have a fundamental grasp of probability and random variables; otherwise, they will find it nearly impossible to understand the topics discussed.

Innovations for Community Services - 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised... Innovations for Community Services - 16th International Conference, I4CS 2016, Vienna, Austria, June 27-29, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Gunter Fahrnberger, Gerald Eichler, Christian Erfurth
R2,257 Discovery Miles 22 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th International Conference on Innovations for Community Services, I4CS 2016, held in Vienna, Austria, in June 2016. The 12 revised full papers presented together with two short papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on navigation and data management; monitoring and decision making; coding and security; collaboration and workflow; routing and technology; topic and object tracking.

Why Cryptography Should Not Rely on Physical Attack Complexity (Paperback, Softcover reprint of the original 1st ed. 2015):... Why Cryptography Should Not Rely on Physical Attack Complexity (Paperback, Softcover reprint of the original 1st ed. 2015)
Juliane Kramer
R3,347 Discovery Miles 33 470 Ships in 10 - 15 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Youtube - The Secret to Building an Audience and Creating a Massive Passive Income (Paperback): Anthony Smith Youtube - The Secret to Building an Audience and Creating a Massive Passive Income (Paperback)
Anthony Smith
R357 Discovery Miles 3 570 Ships in 10 - 15 working days
Quantum Zero-Error Information Theory (Hardcover, 1st ed. 2016): Elloa B. Guedes, Francisco Marcos De Assis, Rex A C Medeiros Quantum Zero-Error Information Theory (Hardcover, 1st ed. 2016)
Elloa B. Guedes, Francisco Marcos De Assis, Rex A C Medeiros
R4,057 Discovery Miles 40 570 Ships in 10 - 15 working days

This book aims at presenting the field of Quantum Information Theory in an intuitive, didactic and self-contained way, taking into account several multidisciplinary aspects. Therefore, this books is particularly suited to students and researchers willing to grasp fundamental concepts in Quantum Computation and Quantum Information areas. The field of Quantum Information Theory has increased significantly over the last three decades. Many results from classical information theory were translated and extended to a scenario where quantum effects become important. Most of the results in this area allows for an asymptotically small probability of error to represent and transmit information efficiently. Claude E.Shannon was the first scientist to realize that error-free classical information transmission can be accomplished under certain conditions. More recently, the concept of error-free classical communication was translated to the quantum context. The so-called Quantum Zero-Error Information Theory completes and extends the Shannon Zero-Error Information Theory.

Redundancy of Lossless Data Compression for Known Sources by Analytic Methods (Paperback): Michael Drmota, Wojciech Szpankowski Redundancy of Lossless Data Compression for Known Sources by Analytic Methods (Paperback)
Michael Drmota, Wojciech Szpankowski
R2,357 Discovery Miles 23 570 Ships in 10 - 15 working days

The term analytic information theory has been coined to describe problems of information theory studied by analytic tools. The approach of applying tools from analysis of algorithms to problems of source coding and, in general, to information theory lies at the crossroad of computer science and information theory. Combining the tools from both areas often provides powerful results, such as computer scientist Abraham Lempel and information theorist Jacob Ziv working together in the late 1970s to develop compression algorithms that are now widely referred to as Lempel-Ziv algorithms and are the basis of the ZIP compression still used extensively in computing today. This monograph surveys the use of these techniques for the rigorous analysis of code redundancy for known sources in lossless data compression. A separate chapter is devoted to precise analyses of each of three types of lossless data compression schemes, namely fixed-to-variable length codes, variable-to-fixed length codes, and variable-to-variable length codes. Each one of these schemes is described in detail, building upon work done in the latter part of the 20th century to present new and powerful techniques. For the first time, this survey presents redundancy for universal variable-to-fixed and variable-to-variable length codes in a comprehensive and coherent manner. The monograph will be of interest to computer scientists and information theorists working on modern coding techniques. Written by two leading experts, it provides the reader with a unique, succinct starting point for their own research into the area.

Geometry, Algebra and Applications: From Mechanics to Cryptography (Hardcover, 1st ed. 2016): Marco Castrillon Lopez, Luis... Geometry, Algebra and Applications: From Mechanics to Cryptography (Hardcover, 1st ed. 2016)
Marco Castrillon Lopez, Luis Hernandez Encinas, Pedro Martinez Gadea, M* Eugenia Rosado Maria
R3,803 Discovery Miles 38 030 Ships in 10 - 15 working days

This volume collects contributions written by different experts in honor of Prof. Jaime Munoz Masque. It covers a wide variety of research topics, from differential geometry to algebra, but particularly focuses on the geometric formulation of variational calculus; geometric mechanics and field theories; symmetries and conservation laws of differential equations, and pseudo-Riemannian geometry of homogeneous spaces. It also discusses algebraic applications to cryptography and number theory. It offers state-of-the-art contributions in the context of current research trends. The final result is a challenging panoramic view of connecting problems that initially appear distant.

Furious - Technological Feminism and Digital Futures (Paperback): Caroline Bassett, Sarah Kember, Kate O'Riordan Furious - Technological Feminism and Digital Futures (Paperback)
Caroline Bassett, Sarah Kember, Kate O'Riordan
R611 Discovery Miles 6 110 Ships in 12 - 17 working days

As digital transformations continue to accelerate in the world, discourses of big data have come to dominate in a number of fields, from politics and economics, to media and education. But how can we really understand the digital world when so much of the writing through which we grapple with it remains deeply problematic? In a compelling new work of feminist critical theory, Bassett, Kember and O'Riordan scrutinise many of the assumptions of a masculinist digital world, highlighting the tendency of digital humanities scholarship to venerate and essentialise technical forms, and to adopt gendered writing and citation practices. Contesting these writings, practices and politics, the authors foreground feminist traditions and contributions to the field, offering alternative modes of knowledge production, and a radically different, poetic writing style. Through this prism, Furious brings into focus themes including the automation of home and domestic work, the Anthropocene, and intersectional feminist technofutures.

Quantum Information Science and Computing (Paperback): Douglass Pittenger Quantum Information Science and Computing (Paperback)
Douglass Pittenger
R3,063 R2,840 Discovery Miles 28 400 Save R223 (7%) Ships in 10 - 15 working days
Metadata for Content Management - Designing Taxonomy, Metadata, Policy and Workflow to Make Digital Content Systems Better for... Metadata for Content Management - Designing Taxonomy, Metadata, Policy and Workflow to Make Digital Content Systems Better for Users. (Paperback)
David Diamond
R660 Discovery Miles 6 600 Ships in 10 - 15 working days
One Data - Achieving business outcomes through data (Paperback): Shane J Downey One Data - Achieving business outcomes through data (Paperback)
Shane J Downey
R755 Discovery Miles 7 550 Ships in 10 - 15 working days
Information Theory and Coding - Solved Problems (Hardcover, 1st ed. 2017): Predrag Ivanis, Dusan Drajic Information Theory and Coding - Solved Problems (Hardcover, 1st ed. 2017)
Predrag Ivanis, Dusan Drajic
R7,593 Discovery Miles 75 930 Ships in 10 - 15 working days

This book is offers a comprehensive overview of information theory and error control coding, using a different approach then in existed literature. The chapters are organized according to the Shannon system model, where one block affects the others. A relatively brief theoretical introduction is provided at the beginning of every chapter, including a few additional examples and explanations, but without any proofs. And a short overview of some aspects of abstract algebra is given at the end of the corresponding chapters. The characteristic complex examples with a lot of illustrations and tables are chosen to provide detailed insights into the nature of the problem. Some limiting cases are presented to illustrate the connections with the theoretical bounds. The numerical values are carefully selected to provide in-depth explanations of the described algorithms. Although the examples in the different chapters can be considered separately, they are mutually connected and the conclusions for one considered problem relate to the others in the book.

Information Theory - A Tutorial Introduction (Hardcover): James V Stone Information Theory - A Tutorial Introduction (Hardcover)
James V Stone
R2,150 Discovery Miles 21 500 Ships in 10 - 15 working days
Multiterminal Secrecy by Public Discussion (Paperback): Prakash Narayan, Himanshu Tyagi Multiterminal Secrecy by Public Discussion (Paperback)
Prakash Narayan, Himanshu Tyagi
R2,354 Discovery Miles 23 540 Ships in 10 - 15 working days

This monograph describes the principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper's observation of the communication. The focus is on secrecy generation in two settings: a multiterminal source model and a multiterminal channel model, in both of which the legitimate parties are given privileged access to correlated data of which the eavesdropper has only partial knowledge. Part I is concerned with basic technical tools for secrecy generation, many of which are potentially of independent interest beyond secrecy settings. Part II applies the methods of Part I to secrecy generation for the multiterminal source and channel models. Based largely on known recent results, this self-contained tutorial also includes new formulations with associated new proofs.

SharePoint 2016 Search Explained - SharePoint 2016 and Office 365 Search On-Premises, Cloud and Hybrid for Search Managers and... SharePoint 2016 Search Explained - SharePoint 2016 and Office 365 Search On-Premises, Cloud and Hybrid for Search Managers and Decision Makers (Paperback)
Agnes Molnar
R760 Discovery Miles 7 600 Ships in 10 - 15 working days
Effective Threat Intelligence - Building and running an intel team for your organization (Paperback): James Dietle Effective Threat Intelligence - Building and running an intel team for your organization (Paperback)
James Dietle
R298 Discovery Miles 2 980 Ships in 10 - 15 working days
Longitudinal Author Cocitation Mapping - The Changing Structure of Decision Support Systems Research (1969-2012) (Paperback):... Longitudinal Author Cocitation Mapping - The Changing Structure of Decision Support Systems Research (1969-2012) (Paperback)
Sean Eom
R2,027 Discovery Miles 20 270 Ships in 10 - 15 working days

Longitudinal Author Cocitation Mapping focuses on specific aspects of the decision support systems (DSS) history by means of an empirical assessment of the DSS literature over three consecutive time periods: 1969-1990, 1991- 2005, and 2006-2012. This includes: Patterns of social constructions (the intellectual structure and ) of the DSS field. Major schools of thoughts, Cumulative research tradition, Reference disciplines. On-going dynamic changes in the intellectual structure. Diffusion of ideas: From the reference disciplines to DSS research subspecialties, Within DSS research subspecialties.

Turing - The Tragic Life of Alan Turing (Paperback): Fergus Mason Turing - The Tragic Life of Alan Turing (Paperback)
Fergus Mason; Edited by Lifecaps
R401 R332 Discovery Miles 3 320 Save R69 (17%) Ships in 10 - 15 working days
Zhang Functions and Various Models (Hardcover, 2015 ed.): Yunong Zhang, Dongsheng Guo Zhang Functions and Various Models (Hardcover, 2015 ed.)
Yunong Zhang, Dongsheng Guo
R2,653 Discovery Miles 26 530 Ships in 10 - 15 working days

This book focuses on solving different types of time-varying problems. It presents various Zhang dynamics (ZD) models by defining various Zhang functions (ZFs) in real and complex domains. It then provides theoretical analyses of such ZD models and illustrates their results. It also uses simulations to substantiate their efficacy and show the feasibility of the presented ZD approach (i.e., different ZFs leading to different ZD models), which is further applied to the repetitive motion planning (RMP) of redundant robots, showing its application potential.

How To Improve SEO - Search Engine Optimization (Paperback): Matthew Silva How To Improve SEO - Search Engine Optimization (Paperback)
Matthew Silva
R385 Discovery Miles 3 850 Ships in 10 - 15 working days

There are many different ways that you can improve you websites Search Engine Optimization or SEO. SEO can help you to get your website at the very top of google, yahoo and other well known search engines. Whenever you begin creating your new website than you need to keep in mind all of these upcoming tips inorder to make your website strong for SEO from beginning to end. The tips that are provided here will not guarantee you get to the top of google or yahoo, but will greatly improve your current SEO situation. SEO can greatly increase the hits on your site, which in turn will increase your business means. Becoming fluent with these tips on improving your SEO will greatly benefit you on your future projects. Trust me when I say that making sure your SEO is as good as it can be, is more rewarding than can be imagined, espcaially today in the internet era, it is manditory to be SEO efficent.

The You Tube American Video Keyword Manual - The Official You Tube Keywords Guide (Paperback): Duncan M. Scott The You Tube American Video Keyword Manual - The Official You Tube Keywords Guide (Paperback)
Duncan M. Scott
R2,608 R2,434 Discovery Miles 24 340 Save R174 (7%) Ships in 10 - 15 working days

The Complete Manual of American Amateur Video Keywords for You Tube searches. This guide will help you find almost any type of youth video on You Tube with thousands of slang terms. It took five years to create this index. Just copy and paste terms.

Application of Dual-process Theory to Information Systems - Current and Future Research Directions (Paperback): Stephanie Watts Application of Dual-process Theory to Information Systems - Current and Future Research Directions (Paperback)
Stephanie Watts
R1,795 Discovery Miles 17 950 Ships in 10 - 15 working days

Application of Dual-Process Theory to Information Systems addresses the dual-process approach to attitude formation as it has been applied to the domain of Information Systems (IS). It describes twenty six empirical research studies published in the IS literature that have been based on the Elaboration Likelihood Model (ELM) or the Heuristic Systematic Model (HSM) - variants of the dual-process approach. Some of the IS phenomena that these studies have explored include the IS training process, website trust and privacy assurance, perceptions of online health records, adoption of expert systems' advice, design of recommendation systems, computer-mediated communication, and knowledge management. This book starts by clarifying exactly what a dual-process approach is and how to apply it. The author then defines a logical schema for categorizing the extant dual-process IS research, using it to group these studies into these categories and briefly reviewing each study. This helps to address the need to understand these studies in relation to each other with the aim of integrating them and forestalling fragmentation of this body of work. The discussion section begins by identifying three streams of this research that are outliers, and then examines those heuristic cues and moderating factors in the studies reviewed that are clearly IS constructs; suggesting they bear further dual-process based IS research. Finally, the author elucidates three particular IS phenomena that present excellent opportunities for applying this approach in the future: (1) information filtering during complex problem solving, (2) how trust and credibility assessment interact with system design features, and (3) organizational knowledge work.

Introduction to the Theory of Quantum Information Processing (Paperback, 2013 ed.): Janos A. Bergou, Mark Hillery Introduction to the Theory of Quantum Information Processing (Paperback, 2013 ed.)
Janos A. Bergou, Mark Hillery
R2,518 Discovery Miles 25 180 Ships in 10 - 15 working days

Introduction to the Theory of Quantum Information Processing provides the material for a one-semester graduate level course on quantum information theory and quantum computing for students who have had a one-year graduate course in quantum mechanics. Many standard subjects are treated, such as density matrices, entanglement, quantum maps, quantum cryptography, and quantum codes. Also included are discussions of quantum machines and quantum walks. In addition, the book provides detailed treatments of several underlying fundamental principles of quantum theory, such as quantum measurements, the no-cloning and no-signaling theorems, and their consequences. Problems of various levels of difficulty supplement the text, with the most challenging problems bringing the reader to the forefront of active research. This book provides a compact introduction to the fascinating and rapidly evolving interdisciplinary field of quantum information theory, and it prepares the reader for doing active research in this area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mac Unlocked - Everything You Need to…
David Pogue Paperback R837 R699 Discovery Miles 6 990
Research Handbook on Information Policy
Alistair S. Duff Hardcover R6,640 Discovery Miles 66 400
The Medium is the Massage - An Inventory…
Marshall McLuhan, Quentin Fiore, … Paperback R371 R281 Discovery Miles 2 810
The Universal Service Desk…
IT Governance Paperback R1,249 Discovery Miles 12 490
Information Environmentalism - A…
Robert Cunningham Paperback R936 Discovery Miles 9 360
Politics in Wired Nations - Selected…
Ithiel De Sola Pool Hardcover R4,021 Discovery Miles 40 210
Understanding Information and…
Philip Tetlow Hardcover R4,290 Discovery Miles 42 900
The Science of Deep Learning
Iddo Drori Hardcover R1,519 R1,432 Discovery Miles 14 320
The Virtual Embodied - Practice…
John Wood Paperback R1,266 Discovery Miles 12 660
Information Society Studies
Alistair S. Duff Hardcover R4,433 Discovery Miles 44 330

 

Partners