0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (7)
  • R5,000 - R10,000 (2)
  • R10,000+ (2)
  • -
Status
Brand

Showing 1 - 11 of 11 matches in All Departments

Handbook of Information and Communication Security (Paperback, 2010 ed.): Peter Stavroulakis, Mark Stamp Handbook of Information and Communication Security (Paperback, 2010 ed.)
Peter Stavroulakis, Mark Stamp
R11,800 Discovery Miles 118 000 Ships in 10 - 15 working days

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called "Y2K" issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.

Third Generation Mobile Telecommunication Systems - UMTS and IMT-2000 (Paperback, Softcover reprint of the original 1st ed.... Third Generation Mobile Telecommunication Systems - UMTS and IMT-2000 (Paperback, Softcover reprint of the original 1st ed. 2001)
Peter Stavroulakis
R4,630 Discovery Miles 46 300 Ships in 10 - 15 working days

One hundred years ago, the notion of transmitting information without the use of wires must have seemed like magic. In 1896, the first patent for wireless communication was granted to Marchese Guglielmo Marconi. Since then the field of wireless communications which includes cellular systems has taken various forms of development. It basically evolved through three Eras. The Pioneer Era over the period of 1860-1921, the Precellular Era over 1921-1980 and the Cellular Era after 1980 and beyond. The first generation cellular era started with the Analog Systems and evolved in the digital domain utilizing Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA), thus comprising the Second Generation Mobile Systems. The first generation RF cellular communications systems deployed in the early to mid 1980's had air interfaces comprised of analog technology. Among them were AMPS (Advanced Mobile Phone System), NMT (Nordic Mobile Telephone), and TACS (Total Access Communications System). These were designed for use in a specific geographic area and not intended to be deployed in other areas. There was not much commonality beyond using the same air interface technology and same modulation. The air interface technology was Frequency Division Multiple Access (FDMA) and the modulation was analog FM, but with different deviations and channel spacings. The frequency bands, air interface protocols, number of channels, and data rates were different. In general, these systems provided local and national coverage.

Neuro-Fuzzy and Fuzzy-Neural Applications in Telecommunications (Paperback, Softcover reprint of the original 1st ed. 2004):... Neuro-Fuzzy and Fuzzy-Neural Applications in Telecommunications (Paperback, Softcover reprint of the original 1st ed. 2004)
Peter Stavroulakis
R4,506 Discovery Miles 45 060 Ships in 10 - 15 working days

For the first time, this highly interdisciplinary book covers the applications of neuro-fuzzy and fuzzy-neural scientific tools in a very wide area within the communications field. It deals with the important and modern areas of telecommunications amenable to such a treatment.

TErrestrial Trunked RAdio - TETRA - A Global Security Tool (Paperback, 2007): Peter Stavroulakis TErrestrial Trunked RAdio - TETRA - A Global Security Tool (Paperback, 2007)
Peter Stavroulakis
R4,493 Discovery Miles 44 930 Ships in 10 - 15 working days

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security.

The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.

Biological Effects of Electromagnetic Fields - Mechanisms, Modeling, Biological Effects, Therapeutic Effects, International... Biological Effects of Electromagnetic Fields - Mechanisms, Modeling, Biological Effects, Therapeutic Effects, International Standards, Exposure Criteria (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Peter Stavroulakis
R5,917 Discovery Miles 59 170 Ships in 10 - 15 working days

Reporting new results, this book covers the subject of biological effects of EMF in its entirety. Experimental verification of the theoretical results is given when at all possible, and the book is expected to open new areas of research, providing material for university course creation.

TErrestrial Trunked RAdio - TETRA - A Global Security Tool (Hardcover, 2007 ed.): Peter Stavroulakis TErrestrial Trunked RAdio - TETRA - A Global Security Tool (Hardcover, 2007 ed.)
Peter Stavroulakis
R4,526 Discovery Miles 45 260 Ships in 10 - 15 working days

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security.

The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.

Neuro-Fuzzy and Fuzzy-Neural Applications in Telecommunications (Hardcover, 2004 ed.): Peter Stavroulakis Neuro-Fuzzy and Fuzzy-Neural Applications in Telecommunications (Hardcover, 2004 ed.)
Peter Stavroulakis
R4,709 Discovery Miles 47 090 Ships in 10 - 15 working days

Neurofuzzy and fuzzyneural techniques as tools of studying and analyzing complex problems are relatively new even though neural networks and fuzzy logic systems have been applied as computational intelligence structural e- ments for the last 40 years. Computational intelligence as an independent sci- tific field has grown over the years because of the development of these str- tural elements. Neural networks have been revived since 1982 after the seminal work of J. J. Hopfield and fuzzy sets have found a variety of applications since the pub- cation of the work of Lotfi Zadeh back in 1965. Artificial neural networks (ANN) have a large number of highly interconnected processing elements that usually operate in parallel and are configured in regular architectures. The c- lective behavior of an ANN, like a human brain, demonstrates the ability to learn, recall, and generalize from training patterns or data. The performance of neural networks depends on the computational function of the neurons in the network, the structure and topology of the network, and the learning rule or the update rule of the connecting weights. This concept of trainable neural n- works further strengthens the idea of utilizing the learning ability of neural networks to learn the fuzzy control rules, the membership functions and other parameters of a fuzzy logic control or decision systems, as we will explain later on, and this becomes the advantage of using a neural based fuzzy logic system in our analysis. On the other hand, fuzzy systems are structured numerical est

Biological Effects of Electromagnetic Fields - Mechanisms, Modeling, Biological Effects, Therapeutic Effects, International... Biological Effects of Electromagnetic Fields - Mechanisms, Modeling, Biological Effects, Therapeutic Effects, International Standards, Exposure Criteria (Hardcover, 2003 ed.)
Peter Stavroulakis
R6,277 Discovery Miles 62 770 Ships in 10 - 15 working days

This book covers the subject of Biological Effects of EMF in its entirety. First it covers both high and low frequency effects, explains thoroughly the mechanisms of interaction between EMF and biological systems and provides the necessary mathematical modeling for EMF absorption. Experimental verification of the theoretical results is given when at all possible and it is expected to open new areas of research as well as provide the material for university course creation. Topics as Ion Cyclotron Resonance in biological systems, thermal and dissipation effects of mobile system radiation, effects of transmission lines and railway radiation, effects on the reproductive capacity of specific insects, on the immune systems on embryos and fetuses, blood parameters and behavior of rats, as well as health risk assessment and the therapeutic effects of EMF are thoroughly covered.

Third Generation Mobile Telecommunication Systems - UMTS and IMT-2000 (Hardcover, 2001 ed.): Peter Stavroulakis Third Generation Mobile Telecommunication Systems - UMTS and IMT-2000 (Hardcover, 2001 ed.)
Peter Stavroulakis
R4,913 Discovery Miles 49 130 Ships in 10 - 15 working days

This book presents in self-contained chapters all aspects of third generation mobile communications. The focus is on the international standards "Universal Mobile Telephony Service (UMTS)" and "International Mobile Telephony (IMT 2000)". Special emphasis is placed on the definition and implementation of new services and multimedia applications.

Handbook of Information and Communication Security (Hardcover, 2010 Ed.): Peter Stavroulakis, Mark Stamp Handbook of Information and Communication Security (Hardcover, 2010 Ed.)
Peter Stavroulakis, Mark Stamp
R14,067 Discovery Miles 140 670 Ships in 12 - 17 working days

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called "Y2K" issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.

Chaos Applications in Telecommunications (Hardcover, New): Peter Stavroulakis Chaos Applications in Telecommunications (Hardcover, New)
Peter Stavroulakis
R4,009 Discovery Miles 40 090 Ships in 12 - 17 working days

The concept of transmitting information from one chaotic system to another derives from the observation of the synchronization of two chaotic systems. Having developed two chaotic systems that can be synchronized, scientists can modulate on one phase signal the information to be transmitted, and subtract (demodulate) the information from the corresponding phase signal of the coupled chaotic system. Chaos Applications in Telecommunications demonstrates this technique in various applications of communication systems. This book details methods of transmitting information at much higher levels of security than what is available by current techniques. Following a detailed introduction, the book demonstrates how chaotic signals are generated and transmitted. It then details the design of chaotic transmitters and receivers, and describes chaos-based modulation and demodulation techniques. The text describes how a chaos-based spreading sequence outperforms classical pseudorandom sequences in selective and nonselective channels. It also develops channel equalization techniques designed for chaotic communications systems by applying knowledge of systems dynamics, linear time-invariant representations of chaotic systems, and symbolic dynamics representations of chaotic systems. The final chapter explains a specific application for optical communications. This volume provides the essential information for those who want an integrated view of how an established concept such as chaos can open new roads in the communications and security fields.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Morbius
Jared Leto, Matt Smith, … DVD R179 Discovery Miles 1 790
Spectra S1 Double Rechargeable Breast…
 (46)
R3,999 R3,199 Discovery Miles 31 990
Cacharel Anais Anais L'original Eau De…
 (1)
R2,317 R992 Discovery Miles 9 920
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990
JCB Soft Toe Slip On Safety Boot (Desert…
R1,059 Discovery Miles 10 590
The South African Guide To Gluten-Free…
Zorah Booley Samaai Paperback R380 R270 Discovery Miles 2 700
Tommy EDC Spray for Men (30ml…
R479 Discovery Miles 4 790
Tommee Tippee - Closer to Nature Soother…
R150 R137 Discovery Miles 1 370
Nuovo All-In-One Car Seat (Black)
R3,599 R3,020 Discovery Miles 30 200
Bostik Glue Stick - Loose (25g)
R31 Discovery Miles 310

 

Partners