Weidong Kou - Böcker
Visar alla böcker från författaren Weidong Kou. Handla med fri frakt och snabb leverans.
7 produkter
7 produkter
1 578 kr
Skickas inom 10-15 vardagar
Digital image business applications are expanding rapidly, driven by advances in the technology and breakthroughs in the price and performance of hardware and firmware. This ever increasing need for the storage and transmission of images has in turn driven the technology of image compression: image data rate reduction to save storage space and reduce transmission rate requirements. Digital image compression offers a solution to a variety of imaging applications that require a vast amount of data to represent the images, such as document imaging management systems, facsimile transmission, image archiving, remote sensing, medical imaging, entertainment, HDTV, broadcasting, education and video teleconferencing. This work introduces the reader to compression algorithms, including the CCITT facsimile standards T.4 and T.6, JBIG, CCITT H.261 and MPEG standards. The book provides explanations of the principles and concepts of the algorithms, helping the readers' understanding and allowing them to use the standards in business, product development and R&D. It should be a useful reference for the graduate student, researcher and engineer.
1 625 kr
Skickas inom 10-15 vardagar
The rapid development of the Internet, coupled with increasing security requirements in information networks, databases, systems, and other information resources has led to the development of this book. The book acts as a response to increasing security needs in the marketplace by providing a comprehensive explanation of the fundamental issues of networking security. It presents concepts and principles of security standards, and provides a description of some emerging security technologies. The book deals with the issues of common security problems and how they can be addressed, and discusses the most appropriate algorithms, standards, and technologies which can be applied to solving common security problems. The text introduces readers to security at a conceptual level, with a strong emphasis on standards. It addresses the concepts and principles of security standards rather than the detailed implementation specifications. It can serve as a reference for professionals working in all aspects of networking security and standards, and may be used as a text for advanced courses on the topic.
1 578 kr
Skickas inom 10-15 vardagar
Digital image business applications are expanding rapidly, driven by recent advances in the technology and breakthroughs in the price and performance of hardware and firmware. This ever increasing need for the storage and transmission of images has in turn driven the technology of image compression: image data rate reduction to save storage space and reduce transmission rate requirements. Digital image compression offers a solution to a variety of imaging applications that require a vast amount of data to represent the images, such as document imaging management systems, facsimile transmission, image archiving, remote sensing, medical imaging, entertainment, HDTV, broadcasting, education and video teleconferencing. Digital Image Compression: Algorithms and Standards introduces the reader to compression algorithms, including the CCITT facsimile standards T.4 and T.6, JBIG, CCITT H.261 and MPEG standards. The book provides comprehensive explanations of the principles and concepts of the algorithms, helping the readers' understanding and allowing them to use the standards in business, product development and R&D. Audience: A valuable reference for the graduate student, researcher and engineer. May also be used as a text for a course on the subject.
1 578 kr
Skickas inom 10-15 vardagar
Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded against unauthorized access. We have seen the rapid development of the Internet and also increasing security requirements in information networks, databases, systems, and other information resources. This comprehensive book responds to increasing security needs in the marketplace, and covers networking security and standards. There are three types of readers who are interested in security: non-technical readers, general technical readers who do not implement security, and technical readers who actually implement security. This book serves all three by providing a comprehensive explanation of fundamental issues of networking security, concept and principle of security standards, and a description of some emerging security technologies. The approach is to answer the following questions: 1. What are common security problems and how can we address them? 2. What are the algorithms, standards, and technologies that can solve common security problems? 3.
Topics in Electronic Commerce
Second International Symposium, ISEC 2001 Hong Kong, China, April 26-28, 2001 Proceedings
Häftad, Engelska, 2001
552 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the Second International Symposium on Electronic Commerce, ISEC 2001, held in Hong Kong, China in April 2001. The eight revised full papers presented together with four short papers and two survey papers were carefully reviewed and selected for inclusion in the book. The book offers topical sections on secure payment, trust and security, tools for e-commerce applications, e-commerce frameworks and systems, performance and QoS, and e-commerce surveys.
987 kr
Skickas inom 10-15 vardagar
Electronic payment is the economic backbone of all e-commerce transactions. This book covers the major subjects related to e-payment such as, for example, public key infrastructure, smart cards, payment agents, digital cash, SET protocols, and micro-payment. Its first part covers the infrastructure for secure e-payment over the Internet, whereas in the second part a variety of e-payment methods and systems are described.This edited volume offers a well-written and sound technical overview of the state of the art in e-payment for e-business developers, graduate students, and consultants. It is also ideally suited for classes and training courses in e-commerce or e-payment.
959 kr
Skickas inom 10-15 vardagar
Electronic payment is the economic backbone of all e-commerce transactions. This book covers the major subjects related to e-payment such as, for example, public key infrastructure, smart cards, payment agents, digital cash, SET protocols, and micro-payment. Its first part covers the infrastructure for secure e-payment over the Internet, whereas in the second part a variety of e-payment methods and systems are described.This edited volume offers a well-written and sound technical overview of the state of the art in e-payment for e-business developers, graduate students, and consultants. It is also ideally suited for classes and training courses in e-commerce or e-payment.