![]() |
Information Theory and Network Coding
ISBN: 9781441946300 / Angielski / Miękka / 580 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last few years have witnessed the rapid development of network coding into a research ?eld of its own in information science. With its root in infor- tion theory, network coding has not only brought about a paradigm shift in network communications at large, but also had signi?cant in?uence on such speci?c research ?elds as coding theory, networking, switching, wireless c- munications, distributeddatastorage, cryptography, andoptimizationtheory. While...
This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last f...
|
cena:
261,63 |
![]() |
Topics in Geometry, Coding Theory and Cryptography
ISBN: 9789048173457 / Angielski / Miękka / 201 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory. This book presents survey articles on some of these new developments. The topics focus on material which has not yet been presented in other books or survey articles. The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry ... |
cena:
201,24 |
![]() |
Transdisciplinary Advancements in Cognitive Mechanisms and Human Information Processing
ISBN: 9781609605537 / Angielski / Twarda / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cognitive informatics is a multidisciplinary field that acts as the bridge between natural science and information science. Specifically, it investigates the potential applications of information processing and natural intelligence to science and engineering disciplines. Transdisciplinary Advancements in Cognitive Mechanisms and Human Information Processing examines innovative research in the emerging, multidisciplinary field of cognitive informatics. Researchers, practitioners and students can benefit from discussions of the connections between natural science and informatics that are...
Cognitive informatics is a multidisciplinary field that acts as the bridge between natural science and information science. Specifically, it investiga...
|
cena:
922,53 |
![]() |
Vlsi-Soc: Advanced Topics on Systems on a Chip: A Selection of Extended Versions of the Best Papers of the Fourteenth International Conference on Very
ISBN: 9781441947086 / Angielski / Miękka / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 15th conference was held at the Georgia Institute of Technology, Atlanta, USA (October 15-17, 2007). Previous conferences have taken place in Edinburgh, Trondheim, Vancouver, Munich, Grenoble, Tokyo, Gramado, Lisbon, Montpellier, Darmstadt, Perth and Nice. The purpose of this conference, sponsored by IFIP TC 10 Working Group 10.5 and by the...
This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 Internati...
|
cena:
402,53 |
![]() |
Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings
ISBN: 9783642101908 / Angielski / Miękka / 319 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in J...
|
cena:
402,53 |
![]() |
Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings
ISBN: 9783642209000 / Angielski / Miękka / 295 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. This title covers a range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2...
|
cena:
201,24 |
![]() |
Beginning T-SQL 2012
ISBN: 9781430237044 / Angielski / Miękka / 456 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Beginning T-SQL 2012 is the first step toward learning the T-SQL language that underlies Microsoft's SQL Server database engine. T-SQL is essential in writing SQL statements to get data into and out of a database. T-SQL is the foundation for business logic embedded in the database in the form of stored procedures and functions. Beginning T-SQL 2012 starts you on the path to mastering T-SQL, with an emphasis on best practices and sound coding techniques.
Beginning T-SQL 2012 begins with an introduction to databases, normalization, and to SQL Server Management... Beginning T-SQL 2012 is the first step toward learning the T-SQL language that underlies Microsoft's SQL Server database engine. T-SQL is ess...
|
cena:
201,24 |
![]() |
Noiseless Steganography: The Key to Covert Communications
ISBN: 9781439846216 / Angielski / Twarda / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:
Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These... Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:
|
cena:
612,21 |
![]() |
Algebraic and Stochastic Coding Theory
ISBN: 9781439881811 / Angielski / Twarda / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes,... Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand... |
cena:
783,64 |
![]() |
Economics of Information Security and Privacy III
ISBN: 9781461419808 / Angielski / Twarda / 283 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations...
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining...
|
cena:
603,81 |
![]() |
Perspectives and Implications for the Development of Information Infrastructures
ISBN: 9781466616226 / Angielski / Twarda / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at...
In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban space...
|
cena:
896,90 |
![]() |
Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings
ISBN: 9783642239502 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japa...
|
cena:
201,24 |
![]() |
Theoretical and Mathematical Foundations of Computer Science: Second International Conference, ICTMF 2011, Singapore, May 5-6, 2011, Selected Papers
ISBN: 9783642249983 / Angielski / Miękka / 632 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011, held in Singapore in May 2011. The conference was held together with the Second International Conference on High Performance Networking, Computing, and Communication systems, ICHCC 2011, which proceedings are published in CCIS 163. The 84 revised selected papers presented were carefully reviewed and selected for inclusion in the book. The topics covered range from computational science, engineering and technology to digital...
This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Sci...
|
cena:
402,53 |
![]() |
Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings
ISBN: 9783642255120 / Angielski / Miękka / 313 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, Chin...
|
cena:
201,24 |
![]() |
Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revi
ISBN: 9783642279362 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. This title covers such topics as network security; monitoring and reputation; privacy; policy enforcement; and, more.
Constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto Univer...
|
cena:
201,24 |
![]() |
Plunkett's Infotech Industry Almanac 2017: Infotech Industry Market Research, Statistics, Trends & Leading Companies
ISBN: 9781628314281 / Angielski / Miękka / 652 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A complete market research guide to the InfoTech industry-for strategic planning, competitive intelligence, employment searches or financial research. Contains computer, software and network trends analysis; statistical tables; and glossary. Includes our profiles of the 500 top global InfoTech firms, public and private, U.S. and international.
A complete market research guide to the InfoTech industry-for strategic planning, competitive intelligence, employment searches or financial research....
|
cena:
1420,35 |
![]() |
Analytics for Managers: With Excel
ISBN: 9780415622691 / Angielski / Twarda / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Analytics is one of a number of terms which are used to describe a data-driven more scientific approach to management. Ability in analytics is an essential management skill: knowledge of data and analytics helps the manager to analyze decision situations, prevent problem situations from arising, identify new opportunities, and often enables many millions of dollars to be added to the bottom line for the organization. The objective of this book is to introduce analytics from the perspective of the general manager of a corporation. Rather than examine the details or attempt an... Analytics is one of a number of terms which are used to describe a data-driven more scientific approach to management. Ability in analytics is an e... |
cena:
930,57 |
![]() |
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
ISBN: 9783642289132 / Angielski / Miękka / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in ...
|
cena:
201,24 |
![]() |
Running IT Like a Business: Accenture's Step-By-Step Guide
ISBN: 9781849283564 / Angielski / Miękka / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten years, significantly decreased its IT spending, despite an increase in workforce of nearly 300%, and its number of satisfied customers is growing and growing. Discover how it has achieved all this, and how you can realize similar benefits in your organization. Running IT like a Business, Second edition shows you how your IT function can provide much more than products and services and add real value to your business....
Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has ...
|
cena:
202,27 |
![]() |
Applications of Algebra to Communications, Control, and Signal Processing
ISBN: 9781461438625 / Angielski / Miękka / 44 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO communications is just Hamilton's quaternions in disguise and has spawned the use of PhD-level algebra to produce generalizations. Likewise, in the absence of credible alternatives, the industry has in many cases been forced to adopt elliptic curve cryptography. In...
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in t...
|
cena:
169,28 |