![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Based on years of research and 121 real-life first dates, relationship expert Wendy Newman dishes up practical wisdom for navigating the online dating trenches with grace, efficiency, and a strong dose of humour. Wendy Newman has made every imaginable dating mistake so you don't have to. Part guidebook, part personal tell-all, 121 First Dates chronicles Wendy's funny, real-life misadventures and the practical wisdom she gained from them. Her dating tales will find you laughing, commiserating, and nodding your head as you learn how to stay in the dating game until you find the right man, just like Wendy did. This book busts myths, answers age-old questions, and examines pitfalls that make you want to give up on dating altogether. Just when you're about to submit to a lifetime at home with a pint of Haagen-Dazs and sitcom reruns, 121 First Dates will inspire you to keep stepping out. Wendy discusses how to date successfully and efficiently, avoid the most common dating pitfalls, have an amazing first date with anyone, end uncomfortable situations with grace, and much, much more. She offers up realistic Dos and Don'ts as well as tips for making the most of any situation you find yourself in-whether you want to run or you think he's the one. Brimming with humour, hope, and authenticity, 121 First Dates will give every woman the tools, confidence, and determination to be and stay real when dating. How else will you find the best match for you?
Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.
This book explores 10 unique facets of Internet health and safety, including physical safety, information security, and the responsible use of technology, offering takeaways from interviews with experts in the field and suggestions for proactively improving users' Internet safety. The Internet has become for many people—especially students and young adults—an essential and intrinsic part of their lives. It makes information available to be shared worldwide, at any time; enables learning about any topic; and allows for instantaneous communication. And it provides endless entertainment as well. But the benefits of online access are accompanied by serious potential risks. This book covers the key elements of Internet health and safety, including physical safety, information security, and the responsible use of technology. It begins with an introductory essay that gives readers the necessary conceptual framework, and then explains specific topics such as cyberbullying, file sharing, online predators, Internet fraud, and obscene and offensive content. The book also answers readers' questions in a "Q & A" section with a subject expert and includes a directory of resources that provides additional information and serves as a gateway to further study.
Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance. Multinational corporations are on the front lines of terrorism and cyberattacks—two of the world's biggest threats to global security. How can corporate leaders mitigate their organizations' risks and develop an infrastructure that detects and deters a security menace before it happens? This timely reference lays out essential political context and historical background to help executives identify contemporary threats and understand the interconnections between threat dynamics in an increasingly dangerous international environment. This compelling work is organized into seven chapters. The beginning chapters profile the specific risks for multinational companies and detail which global—and regional—factors might propagate violence targeted at American-based businesses. Next, two historical case studies on terrorist assaults at Tigantourine and Mombasa illustrate how counterterrorism can successfully thwart potential attacks against business targets. The final part describes industrial espionage and criminal activity and then outlines a corporate counterterror blueprint to combat the prospect of terrorism, providing specific recommendations for preventative measures.
With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.
The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.
Demand for integral and sustainable solutions is on the rise. As new ways of defining reality emerge, this generates the progression of more humanistic and sustainable construction of operating systems. Designing for Human-Machine Symbiosis using the URANOS Model: Emerging Research and Opportunities is a pivotal reference source for the latest research on human-centered system modeling and methods to provide a generic system model to describe complex non-linear systems. Featuring extensive coverage across a range of relevant topics, such as pervasive computing systems, smart environments, and smart industrial machines, this book is ideally designed for researchers, engineers, and professionals seeking current research on the integration of human beings and their natural, informational, and socio-cultural environments into system design.
The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
The development of new and effective analytical and numerical models is essential to understanding the performance of a variety of structures. As computational methods continue to advance, so too do their applications in structural performance modeling and analysis. Modeling and Simulation Techniques in Structural Engineering presents emerging research on computational techniques and applications within the field of structural engineering. This timely publication features practical applications as well as new research insights and is ideally designed for use by engineers, IT professionals, researchers, and graduate-level students.
The highly dynamic world of information technology service management stresses the benefits of the quick and correct implementation of IT services. A disciplined approach relies on a separate set of assumptions and principles as an agile approach, both of which have complicated implementation processes as well as copious benefits. Combining these two approaches to enhance the effectiveness of each, while difficult, can yield exceptional dividends. Balancing Agile and Disciplined Engineering and Management Approaches for IT Services and Software Products is an essential publication that focuses on clarifying theoretical foundations of balanced design methods with conceptual frameworks and empirical cases. Highlighting a broad range of topics including business trends, IT service, and software development, this book is ideally designed for software engineers, software developers, programmers, information technology professionals, researchers, academicians, and students.
Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.
The WWW era made billions of people dramatically dependent on the progress of data technologies, out of which Internet search and Big Data are arguably the most notable. Structured Search paradigm connects them via a fundamental concept of key-objects evolving out of keywords as the units of search. The key-object data model and KeySQL revamp the data independence principle making it applicable for Big Data and complement NoSQL with full-blown structured querying functionality. The ultimate goal is extracting Big Information from the Big Data. As a Big Data Consultant, Mikhail Gilula combines academic background with 20 years of industry experience in the database and data warehousing technologies working as a Sr. Data Architect for Teradata, Alcatel-Lucent, and PayPal, among others. He has authored three books, including The Set Model for Database and Information Systems and holds four US Patents in Structured Search and Data Integration.
Mathematics has been used as a tool in logistical reasoning for centuries. Examining how specific mathematic structures can aid in data and knowledge management helps determine how to efficiently and effectively process more information in these fields. N-ary Relations for Logical Analysis of Data and Knowledge is a critical scholarly reference source that provides a detailed study of the mathematical techniques currently involved in the progression of information technology fields. Featuring relevant topics that include algebraic sets, deductive analysis, defeasible reasoning, and probabilistic modeling, this publication is ideal for academicians, students, and researchers who are interested in staying apprised of the latest research in the information technology field. |
You may like...
Pattern Recognition and String Matching
Dechang Chen, Xiuzhen Cheng
Hardcover
R2,837
Discovery Miles 28 370
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, …
Hardcover
R6,197
Discovery Miles 61 970
Mathematical Methods for Knowledge…
Giovanni Felici, Carlo Vercellis
Hardcover
R4,630
Discovery Miles 46 300
Advances in Computer Vision - Volume 2
C Brown, Christopher Brown
Hardcover
R4,494
Discovery Miles 44 940
Knowledge Discovery in Big Data from…
Petr Skoda, Fathalrahman Adam
Paperback
R2,461
Discovery Miles 24 610
Research Anthology on Big Data…
Information R Management Association
Hardcover
R15,738
Discovery Miles 157 380
Neural Representations of Natural…
Lyndon White, Roberto Togneri, …
Hardcover
R2,427
Discovery Miles 24 270
|