![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Information theory
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools
and techniques
The discipline of engineering presumes certain foundational truths that are not reducible to mathematical formulas. It presupposes certain things about creativity, beauty, and abstraction in order to operate effectively. In short, engineering relies on philosophy. Conversely, philosophy can draw profound truths from principles derived from engineering experience. Engineering and the Ultimate crosses boundaries between a wide variety of disciplines to find truths both new and old that can be transformative to modern thought and practice.
Despite their widespread impact, computer networks that provide the foundation for the World Wide Web and Internet have many limitations. These networks are vulnerable to security threats, break easily, and have a limited ability to respond to changing conditions. Recent research on overcoming these limitations has used biological systems for inspiration, resulting in the development of biologically-inspired computer networks. These networks are designed and developed using principles that are commonly found in natural and biological systems. Biologically Inspired Networking and Sensing: Algorithms and Architectures offers current perspectives and trends in biologically-inspired networking, exploring various approaches aimed at improving network paradigms. Research contained within this compendium of papers and surveys introduces studies in the fields of communication networks, performance modeling, and distributed computing, as well as new advances in networking.
Make the most of your Mac with this witty, authoritative guide to macOS Big Sur. Apple updates its Mac operating system every year, adding new features with every revision. But after twenty years of this updating cycle without a printed user guide to help customers, feature bloat and complexity have begun to weigh down the works. For thirty years, the Mac faithful have turned to David Pogue's Mac books to guide them. With Mac Unlocked, New York Times bestselling author Pogue introduces readers to the most radical Mac software redesign in Apple history, macOS Big Sur. Beginning Mac users and Windows refugees will gain an understanding of the Mac philosophy; Mac veterans will find a concise guide to what's new in Big Sur, including its stunning visual and sonic redesign, the new Control Center for quick settings changes, and the built-in security auditing features. With a 300 annotated illustrations, sparkling humor, and crystal-clear prose, Mac Unlocked is the new gold-standard guide to the Mac.
Information is a recognized fundamental notion across the sciences
and humanities, which is crucial to understanding physical
computation, communication, and human cognition. The Philosophy of
Information brings together the most important perspectives on
information. It includes major technical approaches, while also
setting out the historical backgrounds of information as well as
its contemporary role in many academic fields. Also, special
unifying topics are high-lighted that play across many fields,
while we also aim at identifying relevant themes for philosophical
reflection. There is no established area yet of Philosophy of
Information, and this Handbook can help shape one, making sure it
is well grounded in scientific expertise. As a side benefit, a book
like this can facilitate contacts and collaboration among diverse
academic milieus sharing a common interest in information.
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
Philosophical paradigms, theoretical frameworks, and methodologies make up the answering and problem solving systems that define current research approaches. While there are multiple research method books, the subject lacks an update and integrated source of reference for graduate courses. Research Methodologies, Innovations and Philosophies in Software Systems Engineering and Information Systems aims to advance scientific knowledge on research approaches used in systems engineering, software engineering, and information systems and to update and integrate disperse and valuable knowledge on research approaches. This aims to be a collection of knowledge for PhD students, research-oriented faculty, and instructors of graduate courses.
This volume collects the edited and reviewed contributions presented in the 8th iTi Conference on Turbulence, held in Bertinoro, Italy, in September 2018. In keeping with the spirit of the conference, the book was produced afterwards, so that the authors had the opportunity to incorporate comments and discussions raised during the event. The respective contributions, which address both fundamental and applied aspects of turbulence, have been structured according to the following main topics: I TheoryII Wall-bounded flowsIII Simulations and modellingIV ExperimentsV Miscellaneous topicsVI Wind energy
Across numerous industries in modern society, there is a constant need to gather precise and relevant data efficiently and quickly. As such, it is imperative to research new methods and approaches to increase productivity in these areas. Ontologies and Big Data Considerations for Effective Intelligence is a key source on the latest advancements in multidisciplinary research methods and applications and examines effective techniques for managing and utilizing information resources. Featuring extensive coverage across a range of relevant perspectives and topics, such as visual analytics, spatial databases, retrieval systems, and ontology models, this book is ideally designed for researchers, graduate students, academics, and industry professionals seeking ways to optimize knowledge management processes.
This monograph presents a technique, developed by the author, to design asymptotically exponentially stabilizing finite-dimensional boundary proportional-type feedback controllers for nonlinear parabolic-type equations. The potential control applications of this technique are wide ranging in many research areas, such as Newtonian fluid flows modeled by the Navier-Stokes equations; electrically conducted fluid flows; phase separation modeled by the Cahn-Hilliard equations; and deterministic or stochastic semi-linear heat equations arising in biology, chemistry, and population dynamics modeling. The text provides answers to the following problems, which are of great practical importance: Designing the feedback law using a minimal set of eigenfunctions of the linear operator obtained from the linearized equation around the target state Designing observers for the considered control systems Constructing time-discrete controllers requiring only partial knowledge of the state After reviewing standard notations and results in functional analysis, linear algebra, probability theory and PDEs, the author describes his novel stabilization algorithm. He then demonstrates how this abstract model can be applied to stabilization problems involving magnetohydrodynamic equations, stochastic PDEs, nonsteady-states, and more. Boundary Stabilization of Parabolic Equations will be of particular interest to researchers in control theory and engineers whose work involves systems control. Familiarity with linear algebra, operator theory, functional analysis, partial differential equations, and stochastic partial differential equations is required.
This book is specially designed to refresh and elevate the level of understanding of the foundational background in probability and distributional theory required to be successful in a graduate-level statistics program. Advanced undergraduate students and introductory graduate students from a variety of quantitative backgrounds will benefit from the transitional bridge that this volume offers, from a more generalized study of undergraduate mathematics and statistics to the career-focused, applied education at the graduate level. In particular, it focuses on growing fields that will be of potential interest to future M.S. and Ph.D. students, as well as advanced undergraduates heading directly into the workplace: data analytics, statistics and biostatistics, and related areas.
The regulation and flow of information continues to have a critical impact upon how people live their lives and the way society functions. In recent times, disinformation and privacy violation have become the 'information pollution' of the 21st century. This book explores ways and means of protecting the 'information environment' by drawing upon four theories of contemporary environmentalism: welfare economics, the commons, ecology, and public choice theory. Welfare economics highlights the need to focus on costs (as well as benefits) when evaluating regulatory structures. The commons encourages queries about the validity of propertisation. Ecology speaks to the importance of diversity and resilience. And public choice theory hazards against the regulatory effect of concentrated interests. The lessons from each inspire the proposed information environmental governance framework. By neatly capturing the metaphorical relationship between the physical environment and the information environment, Robert Cunningham explores progressive regulatory pathways for the digital age. This book will be a thought-provoking read for scholars and students with an interest in intellectual property or the regulation of information.
This book focuses on theoretical aspects of dynamical systems in the broadest sense. It highlights novel and relevant results on mathematical and numerical problems that can be found in the fields of applied mathematics, physics, mechanics, engineering and the life sciences. The book consists of contributed research chapters addressing a diverse range of problems. The issues discussed include (among others): numerical-analytical algorithms for nonlinear optimal control problems on a large time interval; gravity waves in a reservoir with an uneven bottom; value distribution and growth of solutions for certain Painleve equations; optimal control of hybrid systems with sliding modes; a mathematical model of the two types of atrioventricular nodal reentrant tachycardia; non-conservative instability of cantilevered nanotubes using the Cell Discretization Method; dynamic analysis of a compliant tensegrity structure for use in a gripper application; and Jeffcott rotor bifurcation behavior using various models of hydrodynamic bearings.
Quantum Computation and Quantum Information (QIP) deals with the
identification and use of quantum resources for information
processing. This includes three main branches of investigation:
quantum algorithm design, quantum simulation and
In these ground-breaking essays, Heinz von Foerster discusses some of the fundamental principles that govern how we know the world and how we process the information from which we derive that knowledge. The author was one of the founders of the science of cybernetics.
This book proposes neural networks algorithms and advanced machine learning techniques for processing nonlinear dynamic signals such as audio, speech, financial signals, feedback loops, waveform generation, filtering, equalization, signals from arrays of sensors, and perturbations in the automatic control of industrial production processes. It also discusses the drastic changes in financial, economic, and work processes that are currently being experienced by the computational and engineering sciences community. Addresses key aspects, such as the integration of neural algorithms and procedures for the recognition, the analysis and detection of dynamic complex structures and the implementation of systems for discovering patterns in data, the book highlights the commonalities between computational intelligence (CI) and information and communications technologies (ICT) to promote transversal skills and sophisticated processing techniques. This book is a valuable resource for a. The academic research community b. The ICT market c. PhD students and early stage researchers d. Companies, research institutes e. Representatives from industry and standardization bodies
The latest advances in technology development have been particularly useful to actor-network theory as a structure for much of its research. With a socio-technical approach to the understanding of information systems and applications, the actor-network theory aims to bring support for social influence on technological innovations. Social and Professional Applications of Actor-Network Theory for Technology Development presents a platform for the approaches and implementations on the actor-network theory and its relationship with technology development. This book provides researchers and practitioners with a better understanding of the usefulness of the social and technical connection.
The papers contained in this volume were originally presented at the 2015 International Conference on Complex Systems in Business, Administration, Science and Engineering. Included are the latest works of practitioners from a variety of disciplines who have developed new approaches for resolving complex issues that cannot be formulated using conventional, mathematical or software models.Complex Systems occur in an infinite variety of problems, not only in the realm of physical sciences and engineering, but also in such diverse fields as economics, the environment, humanities, and social and political sciences.The papers in the book cover such topics as: Complex ecological systems; Complexity science and urban developments; Complex energy systems; Complex issues in biological and medical sciences; Extreme events: natural and human made disasters; Climate change; Complexity of the internet-based global market; Complex business processes; Supply chain complexity; Transportation complexity; Logistics complexity; Closed and open systems; Attractions and chaotic systems; Complex adaptive software; Complexity of big data; Management of complexity; Global economy as a complex system; Complexity in social systems; Complex political systems; Administrations as complex systems; Complexity in engineering; Complexity and environment; Complexity and evolution; Complexity in linguistics, literature and arts. |
You may like...
Object-Oriented Analysis and Design for…
Raul Sidnei Wazlawick
Paperback
R1,120
Discovery Miles 11 200
Entity-Relationship Approach - ER '92…
Gunther Pernul, A. Min Tjoa
Paperback
R1,584
Discovery Miles 15 840
A Programmer's Guide to ADO.NET in C#
Mahesh Chand, Mike Gold
Paperback
|