• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Information Theory

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Information Theory

ilość książek w kategorii: 3005

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Securing Digital Video: Techniques for DRM and Content Protection Eric Diehl 9783642434884 Springer-Verlag Berlin and Heidelberg GmbH &
Securing Digital Video: Techniques for DRM and Content Protection

ISBN: 9783642434884 / Angielski / Miękka / 266 str.

ISBN: 9783642434884/Angielski/Miękka/266 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Diehl

Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted.

This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book,...

Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and ...

cena: 362,27

 Open Problems in Mathematics and Computational Science Koç, Çetin Kaya 9783319106823 Springer
Open Problems in Mathematics and Computational Science

ISBN: 9783319106823 / Angielski / Twarda / 439 str.

ISBN: 9783319106823/Angielski/Twarda/439 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cetin Kaya Koc

This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions.

The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students...

This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading re...

cena: 201,24

 Channel Estimation for Physical Layer Network Coding Systems Feifei Gao Chengwen Xing 9783319116679 Springer
Channel Estimation for Physical Layer Network Coding Systems

ISBN: 9783319116679 / Angielski / Miękka / 80 str.

ISBN: 9783319116679/Angielski/Miękka/80 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feifei Gao; Chengwen Xing
This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by the special structure of bi-directional two-hop transmissions that are different from the traditional point-to-point systems and unidirectional relay systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions. Chapters explore the...
This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectu...
cena: 201,24

 Entropy and Information Theory Robert M Gray   9781489981325 Springer
Entropy and Information Theory

ISBN: 9781489981325 / Angielski / Miękka / 409 str.

ISBN: 9781489981325/Angielski/Miękka/409 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert M Gray

This book is an updated version of the information theory classic, first published in 1990. About one-third of the book is devoted to Shannon source and channel coding theorems; the remainder addresses sources, channels, and codes and on information and distortion measures and their properties.

New in this edition:

  • Expanded treatment of stationary or sliding-block codes and their relations to traditional block codes
  • Expanded discussion of results from ergodic theory relevant to information theory
  • Expanded treatment of B-processes -- processes formed by...

This book is an updated version of the information theory classic, first published in 1990. About one-third of the book is devoted to Shannon sourc...

cena: 684,33

 Network Security Scott C -H Huang David MacCallum Ding-Zhu Du (University of Minnesota) 9781489990013 Springer
Network Security

ISBN: 9781489990013 / Angielski / Miękka / 280 str.

ISBN: 9781489990013/Angielski/Miękka/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Scott C -H Huang;David MacCallum;Ding-Zhu Du (University of Minnesota)
Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, con?d- tiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management,...
Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into e...
cena: 442,79

 Algebraic Cryptanalysis Gregory Bard   9781489984500 Springer
Algebraic Cryptanalysis

ISBN: 9781489984500 / Angielski / Miękka / 356 str.

ISBN: 9781489984500/Angielski/Miękka/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregory Bard

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois.

Topics include:

Analytic Combinatorics, and its application to cryptanalysis

The...

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided...

cena: 1006,38

 Construction and Analysis of Cryptographic Functions Lilya Budaghyan 9783319129907 Springer
Construction and Analysis of Cryptographic Functions

ISBN: 9783319129907 / Angielski / Twarda / 168 str.

ISBN: 9783319129907/Angielski/Twarda/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lilya Budaghyan
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes...
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (A...
cena: 402,53

 Moving Target Defense II: Application of Game Theory and Adversarial Modeling Jajodia, Sushil 9781489993168 Springer
Moving Target Defense II: Application of Game Theory and Adversarial Modeling

ISBN: 9781489993168 / Angielski / Miękka / 204 str.

ISBN: 9781489993168/Angielski/Miękka/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Anup K. Ghosh; V. S. Subrahmanian

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

Moving Target Defense II: Application of Game Theory and Adversarial Modeling...

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ...

cena: 402,53

 Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise Sebastian Pape 9783658071158 Springer Fachmedien Wiesbaden
Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise

ISBN: 9783658071158 / Angielski / Miękka / 362 str.

ISBN: 9783658071158/Angielski/Miękka/362 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sebastian Pape
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to...
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be abl...
cena: 201,24

 Thinkquest 2010: Proceedings of the First International Conference on Contours of Computing Technology Pise, S. J. 9788132217077 Springer
Thinkquest 2010: Proceedings of the First International Conference on Contours of Computing Technology

ISBN: 9788132217077 / Angielski / Miękka / 323 str.

ISBN: 9788132217077/Angielski/Miękka/323 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S J Pise
This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing, Fusion and Information Technology areas, Digital radio Communication, Wimax, Electrical engg, VLSI approach to processor design, embedded systems design are dealt in detail through models and illustrative techniques.
This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing, Fusion and Information Technolo...
cena: 583,68

 Cooperative Communications and Networking: Technologies and System Design Hong, Y. -W Peter 9781489998576 Springer
Cooperative Communications and Networking: Technologies and System Design

ISBN: 9781489998576 / Angielski / Miękka / 402 str.

ISBN: 9781489998576/Angielski/Miękka/402 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Y -W Peter Hong;Wan-Jen Huang;C -C Jay Kuo

Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources. As the field has progressed, cooperative communications have become a design concept rather than a specific transmission technology. This concept has revolutionized the design of wireless networks, allowing increased coverage, throughput, and transmission reliability even as conventional...

Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmittin...

cena: 603,81

 Einführung in Die Kryptologie: Lehrbuch Für Unterricht Und Selbststudium Freiermuth, Karin 9783834818553 Springer Vieweg
Einführung in Die Kryptologie: Lehrbuch Für Unterricht Und Selbststudium

ISBN: 9783834818553 / Niemiecki / Miękka / 399 str.

ISBN: 9783834818553/Niemiecki/Miękka/399 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karin Freiermuth; Juraj Hromkovi; Lucia Keller
Mit groem didaktischen Geschick gelingt es den Autoren, Begeisterung fur die Welt der geheimen
Botschaften zu wecken. So gelingt der Einstieg in die Kryptologie ganz leicht. Viele Beispiele und Aufgaben regen dazu an, sich selbstandig mit diesem faszinierenden Gebiet zu beschaftigen und helfen dabei, den erlernten Stoff weiter zu vertiefen.


Mit groem didaktischen Geschick gelingt es den Autoren, Begeisterung fur die Welt der geheimen
Botschaften zu wecken. So gelingt der Einstieg in d...
cena: 188,08

 Handbook of Massive Data Sets James Abello Panos Pardalos Mauricio G. C. Resende 9781461348825 Springer
Handbook of Massive Data Sets

ISBN: 9781461348825 / Angielski / Miękka / 1223 str.

ISBN: 9781461348825/Angielski/Miękka/1223 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Abello; Panos Pardalos; Mauricio G. C. Resende
The proliferation of massive data sets brings with it a series of special computational challenges. This "data avalanche" arises in a wide range of scientific and commercial applications. With advances in computer and information technologies, many of these challenges are beginning to be addressed by diverse inter-disciplinary groups, that indude computer scientists, mathematicians, statisticians and engineers, working in dose cooperation with application domain experts. High profile applications indude astrophysics, bio-technology, demographics, finance, geographi cal information systems,...
The proliferation of massive data sets brings with it a series of special computational challenges. This "data avalanche" arises in a wide range of sc...
cena: 3019,23

 Operational Semantics and Verification of Security Protocols Cas Cremers, Sjouke Mauw 9783642430534 Springer-Verlag Berlin and Heidelberg GmbH &
Operational Semantics and Verification of Security Protocols

ISBN: 9783642430534 / Angielski / Miękka / 174 str.

ISBN: 9783642430534/Angielski/Miękka/174 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cas Cremers;Sjouke Mauw

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model...

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use st...

cena: 201,09

 Probability, Random Processes, and Ergodic Properties Robert M Gray   9781489983312 Springer
Probability, Random Processes, and Ergodic Properties

ISBN: 9781489983312 / Angielski / Miękka / 322 str.

ISBN: 9781489983312/Angielski/Miękka/322 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert M Gray

Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists.

Highlights:

Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest.

Structures mathematics for an engineering audience, with emphasis on engineering applications.

New in the Second Edition:

Much of the material has been...

Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in sign...

cena: 644,07

 Wireless Communications Prathima Agrawal Matthew D Andrews Philip J Fleming 9781489989239 Springer
Wireless Communications

ISBN: 9781489989239 / Angielski / Miękka / 370 str.

ISBN: 9781489989239/Angielski/Miękka/370 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Prathima Agrawal;Matthew D Andrews;Philip J Fleming
This IMA Volume in Mathematics and its Applications Wireless Communications contains papers based on invited lectures at the very successful IMA Sum mer Program on Wireless Communications, held on June 22 - July 1, 2005. We would like to thank Prathima Agrawal (Auburn University), Daniel Matthew Andrews (Lucent Technologies), Philip J. Fleming (Mo torola, Inc.), George Yin (Wayne State University), and Lisa Zhang (Lucent Technologies) for their superb role as workshop organizers and editors of the proceedings. We take this opportunity to thank the National Science Foundation for its support...
This IMA Volume in Mathematics and its Applications Wireless Communications contains papers based on invited lectures at the very successful IMA Sum m...
cena: 402,53

 New Directions in Wireless Communications Research Vahid Tarokh   9781489984913 Springer
New Directions in Wireless Communications Research

ISBN: 9781489984913 / Angielski / Miękka / 469 str.

ISBN: 9781489984913/Angielski/Miękka/469 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vahid Tarokh

New Directions in Wireless Communications Research addresses critical issues in the design and performance analysis of current and future wireless system design. Intended for use by system designers and academic researchers, the contributions are by acknowledged international leaders in their field.

Topics covered include: (1) Characterization of wireless channels; (2) The principles and challenges of OFDM; (3) Low-correlation sequences for communications; (4) Resource allocation in wireless systems; (5) Signal processing for wireless systems, including iterative systems...

New Directions in Wireless Communications Research addresses critical issues in the design and performance analysis of current and future ...

cena: 603,81

 Advanced Video Coding Systems Wen Gao Siwei Ma 9783319142425 Springer
Advanced Video Coding Systems

ISBN: 9783319142425 / Angielski / Twarda / 239 str.

ISBN: 9783319142425/Angielski/Twarda/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wen Gao; Siwei Ma

This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant improvement in coding efficiency for future video networks and applications by incorporating smarter coding tools such as scene video coding.

Topics and features: introduces the basic concepts in video coding, and presents a short history of video coding technology and standards; reviews the coding framework, main coding tools, and syntax...

This comprehensive and accessible text/reference presents an overview of the state of the art in video coding technology. Specifically, the book in...

cena: 402,53

 Algebraic Coding Theory (Revised Edition)  9789814635899 Not Avail
Algebraic Coding Theory (Revised Edition)

ISBN: 9789814635899 / Angielski / Twarda / 500 str.

ISBN: 9789814635899/Angielski/Twarda/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This is the revised edition of Berlekamp's famous book, 'Algebraic Coding Theory', originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field. One of these is an algorithm for decoding Reed-Solomon and Bose-Chaudhuri-Hocquenghem codes that subsequently became known as the Berlekamp-Massey Algorithm. Another is the Berlekamp algorithm for factoring polynomials over finite fields, whose later extensions and embellishments became widely used in symbolic manipulation systems. Other novel algorithms improved the basic...
This is the revised edition of Berlekamp's famous book, 'Algebraic Coding Theory', originally published in 1968, wherein he introduced several algorit...
cena: 774,06

 Introduction to Cryptography with Maple Jose Luis Gomez-Pardo 9783642446214 Springer
Introduction to Cryptography with Maple

ISBN: 9783642446214 / Angielski / Miękka / 706 str.

ISBN: 9783642446214/Angielski/Miękka/706 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jose Luis Gomez-Pardo

This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples...

This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the ...

cena: 201,24

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia