Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 350 matches in All Departments
Whit Stillman helms this offbeat romantic-musical-comedy following a group of social misfits as they negotiate the minefield of college life. Greta Gerwig stars as Violet, the emotionally fragile yet overbearing leader of a pretentious group of girls who imagine themselves superior to everyone else when in fact they are for the most part ignored by their fellow students. Everyday concerns such as dating disappointments, essay grades and social mores give way to the more perilous pitfalls of female friendship after the girls take it upon themselves to befriend new student Lily (Analeigh Tipton).
Michel Gondry directs this mega-budget superhero action film starring Seth Rogen and Cameron Diaz, based on the 1960s television series starring Bruce Lee. Britt Reid (Rogen), son and heir to the biggest newspaper fortune in Los Angeles, is a spoiled playboy who has hitherto led a charmed but directionless existence. But after the death of his father (Tom Wilkinson), Britt joins forces with company employee and martial arts expert Kato (Jay Chou) to fight crime across the city as masked superhero The Green Hornet. Armed with their super-powered automobile The Black Beauty, the pair set out to take down the dastardly Chudnofsky (Christoph Waltz), a kingpin of the criminal underworld who plans to unite the various gangs of the city in an attempt to eliminate The Green Hornet.
Romantic comedy about a one-night stand gone wrong. After painful break ups, two young New Yorkers meet up for the night after seeing one another on a dating site. Urged on by her friend Faiza (Jessica Szohr), Megan (Analeigh Tipton) decides to take a chance and spend the night at Alec (Miles Teller)'s, who wants equally little commitment from their night together. But as Megan tries to flee in the morning after the pair realise they can't stand each other, there's a much more worrying revelation in store; they've slept through a snowstorm and are now trapped in Alec's small Brooklyn apartment. Once they get past the initial hostilities, the couple realise the only way they're going to make it through another day together is if they try and get to know each other. But will that make their situation any easier?
Frank Frazetta's legendary creation Death Dealer returns to life in collaboration with Frazetta Girls! Critically acclaimed animation writer Mitch Iverson (DOTA: Dragon’s Blood, Voltron: Legendary Defender) is joined by artist Axel Medellin and writers Rob Bou-Saab (Family Guy) and Mark McCann (Never Never) to bring you The War of the Horsemen!
In the not so distant future, firefighter Griffin DeSanto has found himself a man out of time – stumbling into a harsh world of poverty, automation, and subjugation. Technology rules, and a tech empire built on suffering keeps the population in check through surveillance and mechanized policing. Though lost, Griffin is never alone, he was brought here for a reason, and The Vengeful One is his guide. Conceived by Disturbed with Tim Seeley and Llexi Leon, Dark Messiah features writing by Seeley, the New York Times Bestselling creator of Hack/Slash, art by Angel Hernandez (Star Trek, Blade Runner), colors by Fran Gamboa, and cover by Ryan Christensen.
Born into a world of wealth and pleasure, Annette Vallon enjoys the privileges of aristocracy, but a burning curiosity and headstrong independence set her apart from other women of her class. Spoiled by the novels of Rousseau, she refuses to be married unless it is for passion. Her stubborn devotion to her romantic principles bears the sweetest fruit when William Wordsworth, a young English poet, enters her life. She will be his mistress, his muse, his obsession. But theirs is a love that will test Annette in unexpected ways, bringing great joy and gravest peril in a dark time of chaos, upheaval, and death. Set amid the terror and excitement of the French Revolution, Annette Vallon is an enthralling and evocative tale that captures the courageous spirit of a remarkable woman who, for too long, has been relegated to the shadows of history.
The (ISC)(2) (R) Systems Security Certified Practitioner (SSCP (R)) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK (R) has quickly become the book that many of today's security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)(2) CBK. Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text: Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)(2) certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.
The World Health Organization's recently published Global Report on Drowning found that drowning is the third leading cause of unintentional injury death worldwide-making the information presented in this new book an important part of the global effort to reduce this health risk. Written by leading researchers and academics from around the world, The Science of Beach Lifeguarding focuses on the scientific evidence that underpins what is taught to and practised by beach lifeguards. It is the first book to pull together all the different areas involved in beach lifeguarding and evaluate their evidence base. An accessible and informative reference underpinned by the best current research, the book's key themes cover the context of beach lifeguarding, the physical environment in which lifeguards work, medical aspects, practical lifeguarding techniques, physiological standards for lifeguards, safety education, and future developments in beach lifeguarding. The book presents groundbreaking work quantifying the scientific rationale behind a universally accepted fitness standard. It supplies an in-depth examination of the risks and hazards associated with the beach environment, including rip currents and cold water immersion. The book includes a state-of-the-art review of drowning and a comprehensive chapter on first aid. Detailing the recently announced 2015 European Resuscitation Council Guidelines, this book is a must-have for beach lifeguards, beach lifeguard managers, search and rescue personnel, paramedics, sports scientists, health and safety practitioners, and occupational health practitioners.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), this volume features new information on advanced persistent threats, HIPAA requirements, social networks, virtualization, and SOA. Its comprehensive coverage touches on all the key areas IT security professionals need to know, including: Access Control: Technologies and administration including the requirements of current laws Telecommunications and Network Security: Addressing the Internet, intranet, and extranet Information Security and Risk Management: Organizational culture, preparing for a security audit, and the risks of social media Application Security: Ever-present malware threats and building security into the development process Security Architecture and Design: Principles of design including zones of trust Cryptography: Elliptic curve cryptosystems, format-preserving encryption Operations Security: Event analysis Business Continuity and Disaster Recovery Planning: Business continuity in the cloud Legal, Regulations, Compliance, and Investigation: Persistent threats and incident response in the virtual realm Physical Security: Essential aspects of physical security The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.
This book, first published in 1974, presents a critical examination of Berkeley's immaterialism. It is based on a detailed study of his writings (in particular of his notebooks), and while it places his ideas against their eighteenth-century background it also takes into account the various interpretations of Berkeley found in the literature.
This book, first published in 1974, presents a critical examination of Berkeley's immaterialism. It is based on a detailed study of his writings (in particular of his notebooks), and while it places his ideas against their eighteenth-century background it also takes into account the various interpretations of Berkeley found in the literature.
This thoroughly revised and updated third edition of Modern Japan provides a concise and fascinating introduction to the social, cultural and political history of modern Japan. Ranging from the Tokugawa period to the present day, Tipton links everyday lives with major historical developments, charting the country s evolution into a modernized, economic and political world power. Drawing on the latest research, the book features new material on the global financial crisis, the Fukushima nuclear disaster and continuing political instability. While retaining analysis of women's issues, minorities and popular culture, this third edition's expanded coverage of Japan's role in the Second World War, life in the empire, and the history of science, medicine and technology contributes to a sense of the complexity and diversity of modern Japan. Including an updated chronology, glossary and guide to further reading as well as new maps and illustrations to help students to engage directly with the subject matter, this highly accessible and comprehensive textbook is an essential resource for students, scholars and teachers of Japanese history, politics culture and society."
The Routledge Handbook of Translation and Pragmatics provides an overview of key concepts and theory in pragmatics, charts developments in the disciplinary relationship between translation studies and pragmatics, and showcases applications of pragmatics-inspired research in a wide range of translation, spoken and signed language interpreting activities. Bringing together 22 authoritative chapters by leading scholars, this reference work is divided into three sections: Influences and Intersections, Methodological Issues, and Applications. Contributions focus on features of linguistic pragmatics and their analysis in authentic and experimental data relating to a wide range of translation and interpreting activities, including: news, scientific, literary and audiovisual translation, translation in online social media, healthcare interpreting and audio description for the theatre. It also encompasses contributions on issues beyond the level of the text that include the study of interpersonal relationships in practitioner networks and the development of pragmatic competence in interpreter training. Each chapter includes many practical illustrative examples and a list of recommended reading. Fundamental reading for students and academics in translation and interpreting studies, this is also an essential resource for those working in the related fields of linguistics, communication and intercultural studies.
Frank Tipton's book is a comparative study of the management structures of Asian firms. As Asian economies continue to expand, the management of Asian firms becomes ever more important, whether they are suppliers, customers, partners, or rivals. As the author argues, Asian firms are very different from their Western counterparts, and these differences reflect the variations in national history and institutions within which they operate. Asian Firms compares Chinese, Japanese, Korean and Southeast Asian management structures and sets them in their historical and institutional context. Based on a wide range of interviews and material drawn from a variety of disciplines, the argument is framed by the sayings of the legendary strategist Sun Tzu and the renowned businessman Tao Zhu-gong. A series of case studies illustrate the strengths and weaknesses of the approaches of managers in each of the national traditions. Asian Firms asks in each case what Western managers can learn from Asian firms, and what Asian firms can learn from each other. With a multidisciplinary approach and emphasis on practical lessons and tools, the book will be of great use and interest for managers. It will also appeal to students and researchers of international business, postgraduate management students in courses with a comparative or Asian emphasis as well as academics and researchers of Asian studies.
First published in 1985, Habits of the Heart continues to be one of the most discussed interpretations of modern American society, a quest for a democratic community that draws on our diverse civic and religious traditions. In a new introduction Robert N. Bellah relates the arguments of the book both to the current realities of American society and to the growing debate about the country's future. With this new edition one of the most influential books of recent times takes on a new immediacy.
For over three decades, this almanac has provided spells, rituals, and ideas that inspire practitioners of all levels to deepen their magical practice. You'll enjoy two dozen articles, grouped by element, that improve your connection to natural energies and enrich your life throughout the year. Well-known contributors offer their insights on many topics, including: Egg Magic Uncrossing Spells Ozark Protection Magic Yoga for Sleep Magical Infusions Herbal Allies for Astrological Transits Working with Local Spirits. You'll also find a section on coloring magic, three spells to accompany the coloring pages, a calendar section with numerous holidays and correspondences, and more.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), this volume features new information on advanced persistent threats, HIPAA requirements, social networks, virtualization, and SOA. Its comprehensive coverage touches on all the key areas IT security professionals need to know, including: Access Control: Technologies and administration including the requirements of current laws Telecommunications and Network Security: Addressing the Internet, intranet, and extranet Information Security and Risk Management: Organizational culture, preparing for a security audit, and the risks of social media Application Security: Ever-present malware threats and building security into the development process Security Architecture and Design: Principles of design including zones of trust Cryptography: Elliptic curve cryptosystems, format-preserving encryption Operations Security: Event analysis Business Continuity and Disaster Recovery Planning: Business continuity in the cloud Legal, Regulations, Compliance, and Investigation: Persistent threats and incident response in the virtual realm Physical Security: Essential aspects of physical security The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning. The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job.
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know. Captures the crucial elements of the CBK Exploring the ten domains of the CBK, the book explores access control, telecommunications and network security, information security and risk management, application security, and cryptography. In addition, the expert contributors address security architecture and design, operations security, business continuity planning and disaster recovery planning. The book also covers legal regulations, compliance, investigation, and physical security. In this anthology of treatises dealing with the management and technical facets of information security, the contributors examine varied topics such as anywhere computing, virtualization, podslurping, quantum computing, mashups, blue snarfing, mobile device theft, social computing, voting machine insecurity, and format string vulnerabilities. Also available on CD-ROM Safeguarding information continues to be a crucial concern of all IT professionals. As new risks threaten the security of our systems, it is imperative that those charged with protecting that information continually update their armor of knowledge to guard against tomorrow's hackers and software vulnerabilities. This comprehensive Handbook, also available in fully searchable CD-ROM format keeps IT professionals abreast of new developments on the security horizon and reinforces timeless concepts, providing them with the best information, guidance, and counsel they can obtain.
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it. Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again.
|
You may like...
Managing Renal Injury in the Elderly…
Michael Haase, Anja Haase-Fielitz
Hardcover
R1,532
Discovery Miles 15 320
Gustav Klimt: The Birch Wood (Foiled…
Flame Tree Studio
Notebook / blank book
R243
Discovery Miles 2 430
|