0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 58 matches in All Departments

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Paperback):... Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Paperback)
Kuan-Ching Li, Brij B. Gupta, Dharma P. Agrawal
R1,536 Discovery Miles 15 360 Ships in 9 - 15 working days

Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.

Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover): Balwinder Raj, Brij B. Gupta, Jeetendra... Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover)
Balwinder Raj, Brij B. Gupta, Jeetendra Singh
R3,031 Discovery Miles 30 310 Ships in 9 - 15 working days

Unique selling point: * Contains electronics device, Circuits, systems as well as applications of Integrated Circuits in healthcare and security never before considered Core audience: * Researchers and post graduates Place in the market: * Includes key new finding of electronic devices for Security Applications, and Integrated Circutis for healthcare and security Applications with advanced

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback)
Aakanksha Tewari, Brij B. Gupta
R631 Discovery Miles 6 310 Ships in 9 - 15 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover): Balwinder Raj, Brij B. Gupta, Shingo... AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover)
Balwinder Raj, Brij B. Gupta, Shingo Yamaguchi, Sandeep Singh Gill
R3,390 Discovery Miles 33 900 Ships in 12 - 17 working days

i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications

Big Data Analytics in Fog-Enabled IoT Networks - Towards a Privacy and Security Perspective (Hardcover): Govind P. Gupta,... Big Data Analytics in Fog-Enabled IoT Networks - Towards a Privacy and Security Perspective (Hardcover)
Govind P. Gupta, Rakesh Tripathi, Brij B. Gupta, Kwok Tai Chui
R3,098 Discovery Miles 30 980 Ships in 12 - 17 working days

Focuses on the latest development in Big IoT Data Analytics Presents different issues of Security and Privacy Analytics for Fog-enabled IoT system Offers the latest Big Data Technologies for security analytics in Fog-enabled IoT Network Discusses the emerging role of Big Data Analytics and Technologies in detection of Cyberattacks in IoT networks Presents the prospects on Big IoT Data Analytics in Fog-enabled IoT system

Secure Data Management for Online Learning Applications (Hardcover): L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo... Secure Data Management for Online Learning Applications (Hardcover)
L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo Pelusi
R3,090 Discovery Miles 30 900 Ships in 12 - 17 working days

Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Paperback): Shuang Geng, Kris M y Law,... Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Paperback)
Shuang Geng, Kris M y Law, Andrew W. H. Ip, Brij B. Gupta
R1,158 Discovery Miles 11 580 Ships in 9 - 15 working days

Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing not only targets IT experts and drills down on the technical issues but also provides readers from various groups with a well-linked concept about how the latest trends of mobile technologies are closely related to daily living and the workplace at managerial and even individual levels.

Safety, Security, and Reliability of Robotic Systems - Algorithms, Applications, and Technologies (Paperback): Brij B. Gupta,... Safety, Security, and Reliability of Robotic Systems - Algorithms, Applications, and Technologies (Paperback)
Brij B. Gupta, Nadia Nedjah
R1,267 Discovery Miles 12 670 Ships in 12 - 17 working days

With the increasing demand of robots for industrial and domestic use, it becomes indispensable to ensure their safety, security, and reliability. Safety, Security and Reliability of Robotic Systems: Algorithms, Applications, and Technologies provides a broad and comprehensive coverage of the evolution of robotic systems, as well as industrial statistics and future forecasts. First, it analyzes the safety-related parameters of these systems. Then, it covers security attacks and related countermeasures, and how to establish reliability in these systems. The later sections of the book then discuss various applications of these systems in modern industrial and domestic settings. By the end of this book, you will be familiarized with the theoretical frameworks, algorithms, applications, technologies, and empirical research findings on the safety, security, and reliability of robotic systems, while the book's modular structure and comprehensive material will keep you interested and involved throughout. This book is an essential resource for students, professionals, and entrepreneurs who wish to understand the safe, secure, and reliable use of robotics in real-world applications. It is edited by two specialists in the field, with chapter contributions from an array of experts on robotics systems and applications.

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Hardcover):... Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Hardcover)
Kuan-Ching Li, Brij B. Gupta, Dharma P. Agrawal
R3,928 Discovery Miles 39 280 Ships in 9 - 15 working days

Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.

Biotextiles as Medical Implants (Hardcover, New): M.W. King, B.S. Gupta, Robert Guidoin Biotextiles as Medical Implants (Hardcover, New)
M.W. King, B.S. Gupta, Robert Guidoin
R6,153 Discovery Miles 61 530 Ships in 12 - 17 working days

Textiles play a vital role in the manufacture of various medical devices, including the replacement of diseased, injured or non-functioning organs within the body. Biotextiles as medical implants provides an invaluable single source of information on the main types of textile materials and products used for medical implants. The first part of the book focuses on polymers, fibers and textile technologies, and these chapters discuss the manufacture, sterilization, properties and types of biotextiles used for medical applications, including nanofibers, resorbable polymers and shaped biotextiles. The chapters in part two provide a comprehensive discussion of a range of different clinical applications of biotextiles, including surgical sutures, arterial prostheses, stent grafts, percutaneous heart valves and drug delivery systems.
This book provides a concise review of the technologies, properties and types of biotextiles used as medical devices. In addition, it addresses the biological dimension of how to design devices for different clinical applications, providing an invaluable reference for biomedical engineers of medical textiles, quality control and risk assessment specialists, as well as managers of regulatory affairs. The subject matter will also be of interest to professionals within the healthcare system including surgeons, nurses, therapists, sourcing and purchasing agents, researchers and students in different disciplines.
Provides an invaluable single source of information on the main types of textile materials and products used for medical implantsAddresses the technologies used and discusses the manufacture, properties and types of biotextilesExamines applications of biotextiles as medical implants, including drug delivery systems and stent grafts and percutaneous heart valves

Smart Card Security - Applications, Attacks, and Countermeasures (Paperback): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Paperback)
Brij B. Gupta, Megha Quamara
R608 Discovery Miles 6 080 Ships in 12 - 17 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Cloud Security - Concepts, Applications and Perspectives: Brij B. Gupta Cloud Security - Concepts, Applications and Perspectives
Brij B. Gupta
R1,951 Discovery Miles 19 510 Ships in 12 - 17 working days

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Cloud Security - Concepts, Applications and Perspectives (Hardcover): Brij B. Gupta Cloud Security - Concepts, Applications and Perspectives (Hardcover)
Brij B. Gupta
R5,349 Discovery Miles 53 490 Ships in 12 - 17 working days

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Hardcover): Shuang Geng, Kris M y Law,... Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Hardcover)
Shuang Geng, Kris M y Law, Andrew W. H. Ip, Brij B. Gupta
R2,632 Discovery Miles 26 320 Ships in 12 - 17 working days

Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing not only targets IT experts and drills down on the technical issues but also provides readers from various groups with a well-linked concept about how the latest trends of mobile technologies are closely related to daily living and the workplace at managerial and even individual levels.

Secure Searchable Encryption and Data Management (Hardcover): Mamta, Brij B. Gupta Secure Searchable Encryption and Data Management (Hardcover)
Mamta, Brij B. Gupta
R1,550 Discovery Miles 15 500 Ships in 12 - 17 working days

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.

Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback): Brij B. Gupta, Quan Z.... Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback)
Brij B. Gupta, Quan Z. Sheng
R1,600 Discovery Miles 16 000 Ships in 12 - 17 working days

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Online Social Networks Security - Principles, Algorithm, Applications, and Perspectives (Hardcover): Brij B. Gupta, Somya... Online Social Networks Security - Principles, Algorithm, Applications, and Perspectives (Hardcover)
Brij B. Gupta, Somya Ranjan Sahoo
R1,578 Discovery Miles 15 780 Ships in 12 - 17 working days

In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another's accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc. OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.

Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover): Brij B.... Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover)
Brij B. Gupta, Amrita Dahiya
R1,559 Discovery Miles 15 590 Ships in 12 - 17 working days

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.

Safety, Security, and Reliability of Robotic Systems - Algorithms, Applications, and Technologies (Hardcover): Brij B. Gupta,... Safety, Security, and Reliability of Robotic Systems - Algorithms, Applications, and Technologies (Hardcover)
Brij B. Gupta, Nadia Nedjah
R2,955 Discovery Miles 29 550 Ships in 12 - 17 working days

With the increasing demand of robots for industrial and domestic use, it becomes indispensable to ensure their safety, security, and reliability. Safety, Security and Reliability of Robotic Systems: Algorithms, Applications, and Technologies provides a broad and comprehensive coverage of the evolution of robotic systems, as well as industrial statistics and future forecasts. First, it analyzes the safety-related parameters of these systems. Then, it covers security attacks and related countermeasures, and how to establish reliability in these systems. The later sections of the book then discuss various applications of these systems in modern industrial and domestic settings. By the end of this book, you will be familiarized with the theoretical frameworks, algorithms, applications, technologies, and empirical research findings on the safety, security, and reliability of robotic systems, while the book's modular structure and comprehensive material will keep you interested and involved throughout. This book is an essential resource for students, professionals, and entrepreneurs who wish to understand the safe, secure, and reliable use of robotics in real-world applications. It is edited by two specialists in the field, with chapter contributions from an array of experts on robotics systems and applications.

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback)
Brij B. Gupta
R1,448 Discovery Miles 14 480 Ships in 12 - 17 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Caffeine and Activation Theory - Effects on Health and Behavior (Paperback): Barry D. Smith, Uma Gupta, B.S. Gupta Caffeine and Activation Theory - Effects on Health and Behavior (Paperback)
Barry D. Smith, Uma Gupta, B.S. Gupta
R1,801 Discovery Miles 18 010 Ships in 12 - 17 working days

The virtually universal popularity of caffeine, together with concerns about its potential pathogenic effects, have made it one of the most extensively studied drugs in history. However, despite the massive scientific literature on this important substance, most reviews have either focused on limited areas of study or been produced in popular form by individuals with surprisingly little relevant scientific background. Caffeine and Activation Theory: Effects on Health and Behavior brings together the leading experts from seven different countries to provide researchers and clinicians with the most comprehensive and balanced review of the scientific literature on the effects of caffeine found anywhere. It devotes unprecedented coverage to the impact of caffeine on cardiovascular functioning and pathology, details the pharmacological properties and neurophysiological effects of the drug, and thoroughly reviews literature concerned with the role of this powerful stimulant in mood, task performance, and psychopathology. This important new book is also the first source to provide an integrative scientific treatment of the effects of caffeine consumption on menstrual endocrinology and pathology, as well as on reproduction. Rounding out the coverage is a thorough review of emerging research on the possible benefits of caffeine and catechins in green and black teas. The highly integrative final chapter provides a clear understanding of what is known about the effects of caffeine, identifies specific areas in which further research is needed, and provides important methodological guidelines that promise to optimize future research endeavors. Filling the need for a current comprehensive resource, this volume provides extensive reviews of the major bodies of literature on caffeine, stimulates and guides future research, and provides clinicians with the information they need to understand, diagnose, and treat the effects of caffeine consumption in their pati

Hydrogen Fuel - Production, Transport, and Storage (Hardcover): Ram B. Gupta Hydrogen Fuel - Production, Transport, and Storage (Hardcover)
Ram B. Gupta
R5,392 Discovery Miles 53 920 Ships in 12 - 17 working days

"From Methane to Hydrogen-Making the Switch to a Cleaner Fuel Source"

The world's overdependence on fossil fuels has created environmental problems, such as air pollution and global warming, as well as political and economic unrest. With water as its only by-product and its availability in all parts of the world, hydrogen promises to be the next great fuel source.

"All of the Key Aspects of Hydrogen Fuel"

Hydrogen Fuel: Production, Transport, and Storage describes various aspects of hydrogen fuel, including production from both renewable and nonrenewable sources, purification, storage, transport, safety, codes, and carbon dioxide sequestration. The book examines the unique properties and uses of the hydrogen molecule, its ability to be produced from numerous energy sources, and its separation and purification. It explains how to transport hydrogen using pipelines and tankers and how to store it using compressed tanks, metal hydrides, carbon adsorbents, and chemical hydrides. The expert contributors also discuss codes and standards, monitoring techniques, and safety designs.

"The Path to a Cleaner World and Energy Independence"

Focusing on a clean, economical alternative to nonrenewable energy, this volume provides the latest information on the hydrogen fuel economy.

Solubility in Supercritical Carbon Dioxide (Hardcover): Ram B. Gupta, Jae-jin Shim Solubility in Supercritical Carbon Dioxide (Hardcover)
Ram B. Gupta, Jae-jin Shim
R7,690 Discovery Miles 76 900 Ships in 12 - 17 working days

Supercritical fluid extraction is an environmentally safe and cost-effective alternative to traditional organic solvents. Carbon dioxide is widely used as the solvent of choice for applications such as caffeine and nicotine extraction due to its mild critical temperature, nontoxicity, nonflammability, and low cost. Introducing the most complete collection of supercritical CO2 solubility data currently available, Solubility in Supercritical Carbon Dioxide features experimental data on more than 780 solutes in consistent units and an easily accessible format.

This book reflects the authors' painstaking efforts to compile solubility data for an extensive variety of compounds including liquids, solids, polymers, foods, drugs, nutraceuticals, pesticides, dyes, and metal complexes. Each of the more than 1200 tables is arranged in alphabetical order by compound, includes a graphical plot of its data, and features the following information: Compound name, molecular formula, and molecular weight Temperature and pressure given in Kelvin and bar, respectively Name and amount of cosolvent, if applicable Molar or mass solubility, when applicable Mole- or mass-fraction solubility Synonyms for the compound, where available Reference source for the data

Density data for CO2 appears in one appendix, while a complete list of solutes by molecular formula appears in the other. Clear, consistent, and carefully organized, Solubility in Supercritical Carbon Dioxide is the most convenient quick-lookup guide for reliable data.

Nanoparticle Technology for Drug Delivery (Hardcover): Ram B. Gupta, Uday B. Kompella Nanoparticle Technology for Drug Delivery (Hardcover)
Ram B. Gupta, Uday B. Kompella
R5,519 Discovery Miles 55 190 Ships in 12 - 17 working days

Nanoparticles, products of nanotechnology, are of increasing interest to the pharmaceutical community. They can increase drug solubility, enhance bioavailability, allow tissue targeting, offer decreased side-effects, and improve therapeutic efficacy. Presenting the most pertinent and practical issues in the manufacturing and biological application of nanoparticles, this source presents state-of-the-art scientific contributions by seasoned authorities in the field.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Paperback, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Paperback, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R5,974 Discovery Miles 59 740 Ships in 10 - 15 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Understanding the Foal - Your Guide to…
Christina S Cable Paperback R446 R368 Discovery Miles 3 680
The Madman in the White House - Sigmund…
Patrick Weil Hardcover R954 R783 Discovery Miles 7 830
Realm Breaker
Victoria Aveyard Paperback R178 Discovery Miles 1 780
Reading with Muriel Dimen / Writing with…
Stephen Hartman Paperback R976 Discovery Miles 9 760
German Dictionary Complete and…
Collins Dictionaries Hardcover  (1)
R1,359 R1,207 Discovery Miles 12 070
The South African Bike Book & Events…
Tim Brink Paperback R50 R39 Discovery Miles 390
Rogue - The Inside Story Of SARS's Elite…
Johann van Loggerenberg, Adrian Lackay Paperback  (2)
R280 R224 Discovery Miles 2 240
Back on Your Bike - All the Stuff You…
Alan Anderson Hardcover R402 R327 Discovery Miles 3 270
Black Tax - Burden Or Ubuntu?
Niq Mhlongo Paperback  (2)
R285 R228 Discovery Miles 2 280
Good Vibes, Good Life - How Self-Love Is…
Vex King Paperback  (4)
R350 R273 Discovery Miles 2 730

 

Partners