0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Financial Market Complexity (Hardcover, New): Neil F. Johnson, Paul Jefferies, Pak Ming Hui Financial Market Complexity (Hardcover, New)
Neil F. Johnson, Paul Jefferies, Pak Ming Hui
R3,715 Discovery Miles 37 150 Ships in 12 - 19 working days

This book takes a fresh look at understanding how financial markets behave. Using recent ideas from the highly-topical science of complexity and complex systems, the book provides the basis for a unified theoretical description of how today's markets really work. Since financial markets are an excellent example of a complex system, the book also doubles as a science textbook.

Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and... Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and Countermeasures (Hardcover, 2001 ed.)
Neil F. Johnson, Zoran Duric, Sushil Jajodia
R2,963 Discovery Miles 29 630 Ships in 10 - 15 working days

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and... Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and Countermeasures (Paperback, Softcover reprint of the original 1st ed. 2001)
Neil F. Johnson, Zoran Duric, Sushil Jajodia
R2,834 Discovery Miles 28 340 Ships in 10 - 15 working days

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems.Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking -- Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

Mechanisms in Fibre Carcinogenesis (Paperback, Softcover reprint of the original 1st ed. 1991): Robert C. Brown, John A.... Mechanisms in Fibre Carcinogenesis (Paperback, Softcover reprint of the original 1st ed. 1991)
Robert C. Brown, John A. Hoskins, Neil F. Johnson
R1,657 Discovery Miles 16 570 Ships in 10 - 15 working days

The Editors are sorry that the production of this volume was delayed by the ill health of one of them and we hope that this does not detract from the value of the con tents. For once this delay is not the fault of any of the authors only the editors are to blame. Many of the workers in the field of fibre toxicology became convinced by the middle 1980's that the worst of the furore over asbestos was over although we were left with an intriguing problem - how does asbestos cause disease? It was expected that the future impact of fibres on human health would be very small since asbestos exposure would be controlled and there was little chance that man-made fibres would prove haz ardous. These man-made fibres are much thicker than asbestos and, in most cases, they are less durable in the body. Both of these properties are believed to make them much less likely to cause disease. However many of us had fallen into the habit of calling these materials "asbestos substitutes" and thus they have acquired a little of the notoriety at tached to the natural fibrous minerals. Very few of these man-made fibres are actually used as replacements for asbestos. Asbestos was not suitable for the uses to which the insulation wools are usually put and the ceramic fibres are replacements for fire brick not asbestos which is destroyed at the temperatures at which these materials are used.

Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers... Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers (Paperback, 2007 ed.)
Jan Camenisch, Christian Collberg, Neil F. Johnson, Phil Sallee
R1,565 Discovery Miles 15 650 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Virtue Ethics - A Pluralistic View
Christine Swanton Hardcover R4,171 Discovery Miles 41 710
Facilitating Researchers in Insecure…
Oscar Abedi Dunia, Anju Oseema Maria Toppo, … Hardcover R2,333 Discovery Miles 23 330
Child Health For All - A Manual For…
Tony Westwood, Haroon Saloojee, … Paperback R624 Discovery Miles 6 240
Silver Universe - Views on Active Living
Laura Dryjanska, Roberto Giua Hardcover R3,055 Discovery Miles 30 550
Migration, Social Capital, and Health…
Raymond Asare Tutu, Janice Desire Busingye Hardcover R2,873 Discovery Miles 28 730
Co-Occurring Disorders - A Whole-Person…
Charles Atkins Paperback R828 R772 Discovery Miles 7 720
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R160 R144 Discovery Miles 1 440
Revolver - Sam Colt and the Six-Shooter…
Jim Rasenberger Paperback R509 R479 Discovery Miles 4 790
Kanker Schmanker!
Madelein Rust Paperback R388 Discovery Miles 3 880
The Politics Of Housing In (Post…
Kirsten Ruther, Martina Barker-Ciganikova, … Hardcover R300 R270 Discovery Miles 2 700

 

Partners