0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Internet of Things. A Confluence of Many Disciplines - Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa,... Internet of Things. A Confluence of Many Disciplines - Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 - November 1, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Augusto Casaca, Srinivas Katkoori, Sandip Ray, Leon Strous
R1,573 Discovery Miles 15 730 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the Second IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2019, held in Tampa, USA, in October/ November 2019. The 11 full papers presented were carefully reviewed and selected from 22 submissions. Also included in this volume are 8 invited papers. The papers are organized in the following topical sections: IoT applications; context reasoning and situational awareness; IoT security; smart and low power IoT; smart network architectures; and smart system design and IoT education.

Internet of Things. A Confluence of Many Disciplines - Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa,... Internet of Things. A Confluence of Many Disciplines - Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 - November 1, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Augusto Casaca, Srinivas Katkoori, Sandip Ray, Leon Strous
R1,605 Discovery Miles 16 050 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the Second IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2019, held in Tampa, USA, in October/ November 2019. The 11 full papers presented were carefully reviewed and selected from 22 submissions. Also included in this volume are 8 invited papers. The papers are organized in the following topical sections: IoT applications; context reasoning and situational awareness; IoT security; smart and low power IoT; smart network architectures; and smart system design and IoT education.

Fundamentals of IP and SoC Security - Design, Verification, and Debug (Paperback, Softcover reprint of the original 1st ed.... Fundamentals of IP and SoC Security - Design, Verification, and Debug (Paperback, Softcover reprint of the original 1st ed. 2017)
Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay
R2,712 Discovery Miles 27 120 Ships in 10 - 15 working days

This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the "trenches" of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security.

Security Policy in System-on-Chip Designs - Specification, Implementation and Verification (Hardcover, 1st ed. 2019): Sandip... Security Policy in System-on-Chip Designs - Specification, Implementation and Verification (Hardcover, 1st ed. 2019)
Sandip Ray, Abhishek Basak, Swarup Bhunia
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs - current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for "hardware patching", i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; Introduces a rigorous, disciplined approach to "hardware patching", i.e., secure technique for updating hardware functionality of computing devices in-field; Includes discussion of current and emerging approaches for security policy verification.

Fundamentals of IP and SoC Security - Design, Verification, and Debug (Hardcover, 1st ed. 2017): Swarup Bhunia, Sandip Ray,... Fundamentals of IP and SoC Security - Design, Verification, and Debug (Hardcover, 1st ed. 2017)
Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay
R4,917 Discovery Miles 49 170 Ships in 10 - 15 working days

This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the "trenches" of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security.

Scalable Techniques for Formal Verification (Paperback, 2010 ed.): Sandip Ray Scalable Techniques for Formal Verification (Paperback, 2010 ed.)
Sandip Ray
R3,212 Discovery Miles 32 120 Ships in 10 - 15 working days

This book is about formal veri?cation, that is, the use of mathematical reasoning to ensure correct execution of computing systems. With the increasing use of c- puting systems in safety-critical and security-critical applications, it is becoming increasingly important for our well-being to ensure that those systems execute c- rectly. Over the last decade, formal veri?cation has made signi?cant headway in the analysis of industrial systems, particularly in the realm of veri?cation of hardware. A key advantage of formal veri?cation is that it provides a mathematical guarantee of their correctness (up to the accuracy of formal models and correctness of r- soning tools). In the process, the analysis can expose subtle design errors. Formal veri?cation is particularly effective in ?nding corner-case bugs that are dif?cult to detect through traditional simulation and testing. Nevertheless, and in spite of its promise, the application of formal veri?cation has so far been limited in an ind- trial design validation tool ?ow. The dif?culties in its large-scale adoption include the following (1) deductive veri?cation using theorem provers often involves - cessive and prohibitive manual effort and (2) automated decision procedures (e. g. , model checking) can quickly hit the bounds of available time and memory. This book presents recent advances in formal veri?cation techniques and d- cusses the applicability of the techniques in ensuring the reliability of large-scale systems. We deal with the veri?cation of a range of computing systems, from - quential programsto concurrentprotocolsand pipelined machines.

Satyajit Ray on Cinema (Paperback, New): Satyajit Ray Satyajit Ray on Cinema (Paperback, New)
Satyajit Ray; Edited by Sandip Ray; Foreword by Shyam Benegal
R828 Discovery Miles 8 280 Ships in 10 - 15 working days

Satyajit Ray, one of the greatest auteurs of twentieth century cinema, was a Bengali motion-picture director, writer, and illustrator who set a new standard for Indian cinema with his Apu Trilogy: Pather Panchali (Song of the Little Road) (1955), Aparajito (The Unvanquished) (1956), and Apur Sansar (The World of Apu) (1959). His work was admired for its humanism, versatility, attention to detail, and skilled use of music. He was also widely praised for his critical and intellectual writings, which mirror his filmmaking in their precision and wide-ranging grasp of history, culture, and aesthetics. Spanning forty years of Ray's career, these essays, for the first time collected in one volume, present the filmmaker's reflections on the art and craft of the cinematic medium and include his thoughts on sentimentalism, mass culture, silent films, the influence of the French New Wave, and the experience of being a successful director. Ray speaks on the difficulty of adapting literary works to screen, the nature of the modern film festival, and the phenomenal contributions of Jean-Luc Godard and the Indian actor, director, producer, and singer Uttam Kumar. The collection also features an excerpt from Ray's diaries and reproduces his sketches of famous film personalities, such as Sergei Eisenstein, Charlie Chaplin, and Akira Kurosawa, in addition to film posters, photographs by and of the artist, film stills, and a filmography. Altogether, the volume relays the full extent of Ray's engagement with film and offers extensive access to the thought of one of the twentieth-century's leading Indian intellectuals.

Scalable Techniques for Formal Verification (Hardcover, 2010 Ed.): Sandip Ray Scalable Techniques for Formal Verification (Hardcover, 2010 Ed.)
Sandip Ray
R3,115 Discovery Miles 31 150 Ships in 10 - 15 working days

This book is about formal veri?cation, that is, the use of mathematical reasoning to ensure correct execution of computing systems. With the increasing use of c- puting systems in safety-critical and security-critical applications, it is becoming increasingly important for our well-being to ensure that those systems execute c- rectly. Over the last decade, formal veri?cation has made signi?cant headway in the analysis of industrial systems, particularly in the realm of veri?cation of hardware. A key advantage of formal veri?cation is that it provides a mathematical guarantee of their correctness (up to the accuracy of formal models and correctness of r- soning tools). In the process, the analysis can expose subtle design errors. Formal veri?cation is particularly effective in ?nding corner-case bugs that are dif?cult to detect through traditional simulation and testing. Nevertheless, and in spite of its promise, the application of formal veri?cation has so far been limited in an ind- trial design validation tool ?ow. The dif?culties in its large-scale adoption include the following (1) deductive veri?cation using theorem provers often involves - cessive and prohibitive manual effort and (2) automated decision procedures (e. g. , model checking) can quickly hit the bounds of available time and memory. This book presents recent advances in formal veri?cation techniques and d- cusses the applicability of the techniques in ensuring the reliability of large-scale systems. We deal with the veri?cation of a range of computing systems, from - quential programsto concurrentprotocolsand pipelined machines.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Trustfall
Pink CD R254 R238 Discovery Miles 2 380
Sony PlayStation 4 Slim Console Bundle…
R8,799 Discovery Miles 87 990
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger Blu-ray disc  (1)
R79 Discovery Miles 790
Rotatrim A4 Paper Ream (80gsm) (500…
R97 Discovery Miles 970
CoolKids Pounce (Girls)
R176 Discovery Miles 1 760
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990
Large 1680D Boys & Girls Backpack…
R507 Discovery Miles 5 070
Gloria
Sam Smith CD R407 Discovery Miles 4 070
Silicone Cellphone Card Holder [White]
R10 Discovery Miles 100
The Rise and Fall of a White Collar…
Nick Nevern, Simon Phillips, … Blu-ray disc  (1)
R63 Discovery Miles 630

 

Partners