![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Information theory
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools
and techniques
The discipline of engineering presumes certain foundational truths that are not reducible to mathematical formulas. It presupposes certain things about creativity, beauty, and abstraction in order to operate effectively. In short, engineering relies on philosophy. Conversely, philosophy can draw profound truths from principles derived from engineering experience. Engineering and the Ultimate crosses boundaries between a wide variety of disciplines to find truths both new and old that can be transformative to modern thought and practice.
Despite their widespread impact, computer networks that provide the foundation for the World Wide Web and Internet have many limitations. These networks are vulnerable to security threats, break easily, and have a limited ability to respond to changing conditions. Recent research on overcoming these limitations has used biological systems for inspiration, resulting in the development of biologically-inspired computer networks. These networks are designed and developed using principles that are commonly found in natural and biological systems. Biologically Inspired Networking and Sensing: Algorithms and Architectures offers current perspectives and trends in biologically-inspired networking, exploring various approaches aimed at improving network paradigms. Research contained within this compendium of papers and surveys introduces studies in the fields of communication networks, performance modeling, and distributed computing, as well as new advances in networking.
Make the most of your Mac with this witty, authoritative guide to macOS Big Sur. Apple updates its Mac operating system every year, adding new features with every revision. But after twenty years of this updating cycle without a printed user guide to help customers, feature bloat and complexity have begun to weigh down the works. For thirty years, the Mac faithful have turned to David Pogue's Mac books to guide them. With Mac Unlocked, New York Times bestselling author Pogue introduces readers to the most radical Mac software redesign in Apple history, macOS Big Sur. Beginning Mac users and Windows refugees will gain an understanding of the Mac philosophy; Mac veterans will find a concise guide to what's new in Big Sur, including its stunning visual and sonic redesign, the new Control Center for quick settings changes, and the built-in security auditing features. With a 300 annotated illustrations, sparkling humor, and crystal-clear prose, Mac Unlocked is the new gold-standard guide to the Mac.
"Fire Service THE OTHER SIDE" is a resourceful training Journal beginning with the founding of Fire Departments, manufacturers of fire department apparatus and equipment, failures, trivia, history of "Third Party" Inspections, and Testing of Fire Department apparatus and ground ladders, including maintenance education.
Information is a recognized fundamental notion across the sciences
and humanities, which is crucial to understanding physical
computation, communication, and human cognition. The Philosophy of
Information brings together the most important perspectives on
information. It includes major technical approaches, while also
setting out the historical backgrounds of information as well as
its contemporary role in many academic fields. Also, special
unifying topics are high-lighted that play across many fields,
while we also aim at identifying relevant themes for philosophical
reflection. There is no established area yet of Philosophy of
Information, and this Handbook can help shape one, making sure it
is well grounded in scientific expertise. As a side benefit, a book
like this can facilitate contacts and collaboration among diverse
academic milieus sharing a common interest in information.
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
Philosophical paradigms, theoretical frameworks, and methodologies make up the answering and problem solving systems that define current research approaches. While there are multiple research method books, the subject lacks an update and integrated source of reference for graduate courses. Research Methodologies, Innovations and Philosophies in Software Systems Engineering and Information Systems aims to advance scientific knowledge on research approaches used in systems engineering, software engineering, and information systems and to update and integrate disperse and valuable knowledge on research approaches. This aims to be a collection of knowledge for PhD students, research-oriented faculty, and instructors of graduate courses.
This volume collects the edited and reviewed contributions presented in the 8th iTi Conference on Turbulence, held in Bertinoro, Italy, in September 2018. In keeping with the spirit of the conference, the book was produced afterwards, so that the authors had the opportunity to incorporate comments and discussions raised during the event. The respective contributions, which address both fundamental and applied aspects of turbulence, have been structured according to the following main topics: I TheoryII Wall-bounded flowsIII Simulations and modellingIV ExperimentsV Miscellaneous topicsVI Wind energy
Across numerous industries in modern society, there is a constant need to gather precise and relevant data efficiently and quickly. As such, it is imperative to research new methods and approaches to increase productivity in these areas. Ontologies and Big Data Considerations for Effective Intelligence is a key source on the latest advancements in multidisciplinary research methods and applications and examines effective techniques for managing and utilizing information resources. Featuring extensive coverage across a range of relevant perspectives and topics, such as visual analytics, spatial databases, retrieval systems, and ontology models, this book is ideally designed for researchers, graduate students, academics, and industry professionals seeking ways to optimize knowledge management processes.
This monograph presents a technique, developed by the author, to design asymptotically exponentially stabilizing finite-dimensional boundary proportional-type feedback controllers for nonlinear parabolic-type equations. The potential control applications of this technique are wide ranging in many research areas, such as Newtonian fluid flows modeled by the Navier-Stokes equations; electrically conducted fluid flows; phase separation modeled by the Cahn-Hilliard equations; and deterministic or stochastic semi-linear heat equations arising in biology, chemistry, and population dynamics modeling. The text provides answers to the following problems, which are of great practical importance: Designing the feedback law using a minimal set of eigenfunctions of the linear operator obtained from the linearized equation around the target state Designing observers for the considered control systems Constructing time-discrete controllers requiring only partial knowledge of the state After reviewing standard notations and results in functional analysis, linear algebra, probability theory and PDEs, the author describes his novel stabilization algorithm. He then demonstrates how this abstract model can be applied to stabilization problems involving magnetohydrodynamic equations, stochastic PDEs, nonsteady-states, and more. Boundary Stabilization of Parabolic Equations will be of particular interest to researchers in control theory and engineers whose work involves systems control. Familiarity with linear algebra, operator theory, functional analysis, partial differential equations, and stochastic partial differential equations is required.
"Find it hard to extract and utilise valuable knowledge from the
ever-increasing data deluge?" If so, this book will help, as it
explores pattern recognition technology and its concomitant role in
extracting useful information to build technical and business
models to gain competitive industrial advantage. Two wave fronts are upon us today: we are being bombarded by an
enormous amount of data, and we are confronted by continually
increasing technical and business advances. Ideally, the endless stream of data should be one of our major
assets. However, this potential asset often tends to overwhelm
rather than enrich. Competitive advantage depends on our ability to
extract and utilize nuggets of valuable knowledge and insight from
this data deluge. The challenges that need to be overcome include
the under-utilization of available data due to competing
priorities, and the separate and somewhat disparate existing data
systems that have difficulty interacting with each other. Conventional approaches to formulating models are becoming
progressively more expensive in time and effort. To impart a
competitive edge, engineering science in the 21st century needs to
augment traditional modelling processes by auto-classifying and
self-organizing data; developing models directly from operating
experience, and then optimizing the results to provide effective
strategies and operating decisions. This approach has wide
applicability; in areas ranging from manufacturing processes,
product performance and scientific research, to financial and
business fields. This monograph explores pattern recognition technology, and its
concomitant role in extracting useful knowledge to build technical
and business models directly from data, and in optimizing the
results derived from these models within the context of delivering
competitive industrial advantage. It is not intended to serve as a
comprehensive reference source on the subject. Rather, it is based
on first-hand experience in the practice of this technology: its
development and deployment for profitable application in
industry. The technical topics covered in the monograph will focus on the
triad of technological areas that constitute the contemporary
workhorses of successful industrial application of pattern
recognition. These are: systems for self-organising data;
data-driven modelling; and genetic algorithms as robust
optimizers.
This book is specially designed to refresh and elevate the level of understanding of the foundational background in probability and distributional theory required to be successful in a graduate-level statistics program. Advanced undergraduate students and introductory graduate students from a variety of quantitative backgrounds will benefit from the transitional bridge that this volume offers, from a more generalized study of undergraduate mathematics and statistics to the career-focused, applied education at the graduate level. In particular, it focuses on growing fields that will be of potential interest to future M.S. and Ph.D. students, as well as advanced undergraduates heading directly into the workplace: data analytics, statistics and biostatistics, and related areas.
This comprehensive treatment of network information theory and its applications provides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon's point-to-point information theory, single-hop networks, multihop networks, and extensions to distributed computing, secrecy, wireless communication, and networking. Elementary mathematical tools and techniques are used throughout, requiring only basic knowledge of probability, whilst unified proofs of coding theorems are based on a few simple lemmas, making the text accessible to newcomers. Key topics covered include successive cancellation and superposition coding, MIMO wireless communication, network coding, and cooperative relaying. Also covered are feedback and interactive communication, capacity approximations and scaling laws, and asynchronous and random access channels. This book is ideal for use in the classroom, for self-study, and as a reference for researchers and engineers in industry and academia.
This revised edition of McEliece's classic is a self-contained introduction to all basic results in the theory of information and coding. This theory was developed to deal with the fundamental problem of communication, that of reproducing at one point, either exactly or approximately, a message selected at another point. There is a short and elementary overview introducing the reader to the concept of coding. Following the main results, the channel and source coding theorems is a study of specific coding schemes which can be used for channel and source coding. This volume can be used either for self-study, or for a graduate/undergraduate level course at university. It includes dozens of worked examples and several hundred problems for solution.
This book focuses on theoretical aspects of dynamical systems in the broadest sense. It highlights novel and relevant results on mathematical and numerical problems that can be found in the fields of applied mathematics, physics, mechanics, engineering and the life sciences. The book consists of contributed research chapters addressing a diverse range of problems. The issues discussed include (among others): numerical-analytical algorithms for nonlinear optimal control problems on a large time interval; gravity waves in a reservoir with an uneven bottom; value distribution and growth of solutions for certain Painleve equations; optimal control of hybrid systems with sliding modes; a mathematical model of the two types of atrioventricular nodal reentrant tachycardia; non-conservative instability of cantilevered nanotubes using the Cell Discretization Method; dynamic analysis of a compliant tensegrity structure for use in a gripper application; and Jeffcott rotor bifurcation behavior using various models of hydrodynamic bearings.
Quantum Computation and Quantum Information (QIP) deals with the
identification and use of quantum resources for information
processing. This includes three main branches of investigation:
quantum algorithm design, quantum simulation and
In these ground-breaking essays, Heinz von Foerster discusses some of the fundamental principles that govern how we know the world and how we process the information from which we derive that knowledge. The author was one of the founders of the science of cybernetics.
This book tells the story of radical transparency in a datafied world. It is a story that not only includes the beginnings of WikiLeaks and its endings as a weapon of the GRU, but also exposes numerous other decentralised disclosure networks designed to crack open democracy - for good or ill - that followed in its wake. This is a story that can only be understood through rethinking how technologies of government, practices of media, and assumptions of democracy interact. By combining literatures of governmentality, media studies, and democracy, this illuminating account offers novel insights and critiques of the transparency ideal through its material-political practice. Case studies uncover evolving media practices that, regardless of being scraped from public records or leaked from internal sources, still divulge secrets. The narrative also traces new corporate players such as Clearview AI, the civic-minded ICIJ, and state-based public health disclosures in times of pandemic to reveal how they all form unique proto-institutional instances of disclosure as a technology of government. The analysis of novel forms of digital radical transparency - from a trickle of paper-based leaks to the modern digital .torrent - is grounded in analogues from the analogue past, which combine to tell the whole story of how transparency functions in and helps form democracy. |
You may like...
Understanding Counterfactuals…
Christoph Hoerl, Teresa McCormack, …
Hardcover
R3,316
Discovery Miles 33 160
Toward Robotic Socially Believable…
Anna Esposito, Lakhmi C. Jain
Hardcover
|