0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 14 of 14 matches in All Departments

Kurzgefasste Grammatik der Vulgär-arabischen Sprache - Mit Besonderer Rücksicht auf den Egyptischen D (Hardcover): A. Hassan Kurzgefasste Grammatik der Vulgär-arabischen Sprache - Mit Besonderer Rücksicht auf den Egyptischen D (Hardcover)
A. Hassan
R865 Discovery Miles 8 650 Ships in 18 - 22 working days
Sustainable Development and Planning (Hardcover): C.A. Brebbia, S.S Zubir, A.S. Hassan Sustainable Development and Planning (Hardcover)
C.A. Brebbia, S.S Zubir, A.S. Hassan
R10,443 Discovery Miles 104 430 Ships in 18 - 22 working days

The 8th International Conference on Sustainable Development and Planning is part of a series of biennial conferences on the topic of sustainable regional development which began in Greece in 2003. The papers included in these proceedings report on the latest advances from scientists specialising in the range of subjects included within sustainable development and planning.Planners, environmentalists, architects, engineers, policy makers and economists have to work together in order to ensure that planning and development can meet our present needs without comprising the ability of future generations.The use of modern technologies in planning gives us new potential to monitor and prevent environmental degradation. Problems related to development and planning, which affect both rural and urban areas, are present in all regions of the world and accelerated urbanisation has resulted in both the deterioration of the environment and quality of life. Urban development can also intensify problems faced by rural areas such as forests, mountain regions and coastal areas, which urgently require solutions in order to avoid irreversible damage. The papers in the book cover the following topics: City Planning; Urban Strategies; Sustainability and the Built Environment; Regional Planning; Environmental Planning and Management; Costal Regions; Sustainable Solutions in Emerging Countries; Policies and Planning; Socio Economic Issues; Community Planning; Culture and Heritage; Energy Resources; Transportation; Mobility and Urban Space; Air Quality; Water Management; Waste Water.

Perspectives in Spread Spectrum (Hardcover, 1998 ed.): Amer A. Hassan, John E. Hershey, Gary J. Saulnier Perspectives in Spread Spectrum (Hardcover, 1998 ed.)
Amer A. Hassan, John E. Hershey, Gary J. Saulnier
R2,743 Discovery Miles 27 430 Ships in 18 - 22 working days

Perspectives in Spread Spectrum brings together studies and recent work on six exciting topics from the spread spectrum arts. The book gives a wide, collective view of trends, ideas, and techniques in the spread spectrum discipline, due to the authors' extensive work on spread spectrum techniques and applications from different vantage points. The inexorable march of electronics towards ever faster, ever smaller, and ever more powerful electronic and optical circuitry has wrought, and will continue to enable, profound changes in the spread spectrum arts, by allowing increasingly complex signalling waveforms and statistical tests to be implemented as the theory beyond spread spectrum continues to evolve. Perspectives in Spread Spectrum is divided into six chapters. The first chapter deals with sequence spreading design. There is not a single metric for design of spreading sequences; rather, the design is ideally tailored to the specific scenario of usage. This chapter delves into recent and very promising synthesis work. The second chapter deals with OFDM techniques. As channels become wider and trans-channel fading (or jamming) becomes frequency selective across the band, OFDM techniques may provide a powerful alternative design perspective. The third chapter is a generalization of the venerable Walsh functions. A new modulation scheme, Geometric Harmonic Modulation, GHM for short, is reviewed and characterized as a form of OFDM. From GHM, a further generalization of the Walsh functions is derived for non-binary signalling. The fourth chapter is concerned with some new and exciting results regarding the follower jammer paradigm. A counter-countermeasure technique is reviewed, notable for its counterintuitive characteristic which can be understood from a simple yet elegant game framework. The fifth chapter recounts some results pertaining to random coding for an optical spread spectrum link. The technique is based on laser speckle statistics and uses a coherent array of spatial light modulators at the transmitter but allows the receiver to be realized as a spatially distributed radiometric and therefore incoherent structure. The sixth and final chapter looks at an important and interesting application of spread spectrum to accurately locate a wideband, 'bent pipe', satellite transponder. It is, in a strong sense, an inverted GPS technique. Perspectives in Spread Spectrum serves as an excellent reference and source of ideas for further research, and may be used as a text for advanced courses on the topic.

Droughts, Food and Culture - Ecological Change and Food Security in Africa's Later Prehistory (Hardcover, 2002 ed.): Fekri... Droughts, Food and Culture - Ecological Change and Food Security in Africa's Later Prehistory (Hardcover, 2002 ed.)
Fekri A. Hassan
R2,850 Discovery Miles 28 500 Ships in 18 - 22 working days

Recent droughts in Africa and elsewhere in the world, from China to Peru, have serious implications for food security and grave consequences for local and international politics. The issues do not just concern the plight of African peoples, but also our global ecological future.
Global climatic changes become manifest initially in regions that are marginal or unstable. Africa's Sahel zone is one of the most sensitive climatic regions in the world and the events that have gripped that region beginning in the 1970's were the first indicator of a significant shift in global climatic conditions.
This work aims to bring archaeology with the domain on contemporary human affairs and to forge a new methodology for coping with environmental problems from an archaeological perspective. Using the later prehistory of Africa as a comparison, the utility of this methodological strategy in interpreting culture change and assessing long-term response to current, global climatic fluctuations is examined and understood.

The Making and Un-Making of Neuronal Circuits in Drosophila (Hardcover, 2011 ed.): Bassem A. Hassan The Making and Un-Making of Neuronal Circuits in Drosophila (Hardcover, 2011 ed.)
Bassem A. Hassan
R2,707 Discovery Miles 27 070 Ships in 18 - 22 working days

The small fruit fly, Drosophila melanogaster, has for over a century now had a large impact on biological and biomedical research; however, our knowledge of the fly brain has lagged significantly behind our understanding of other aspects of its development, physiology, and function. In The Making and Un-Making of Neuronal Circuits in Drosophila, innovative expert neuroscientists in the field present the ideas and concepts behind the methods, tools, and tricks that are currently being utilized to decode the secrets of this valuable insect's brain. Focused on the concept of a neuronal circuit, defined as a series of synaptically connected neurons subservient to a particular behavioral modality, this volume contains chapters dealing with anatomical analysis with a focus on cellular and sub-cellular morphologies. These detailed approaches fall under the headings of "Physiology" and "Behavior", conveniently divided the book into two sections. Written in the easy-to-follow Neuromethods series format, this work provides the kind of detailed description and implementation advice that is crucial for getting optimal results. Inventive and accessible, The Making and Un-Making of Neuronal Circuits in Drosophila provides the information and tools necessary to carry out current experiments and, more importantly, further advance the progress of the Drosophila neurobiology field and neurobiology in general.

Ransomware Revealed - A Beginner's Guide to Protecting and Recovering from Ransomware Attacks (Paperback, 1st ed.): Nihad... Ransomware Revealed - A Beginner's Guide to Protecting and Recovering from Ransomware Attacks (Paperback, 1st ed.)
Nihad A. Hassan
R990 R843 Discovery Miles 8 430 Save R147 (15%) Ships in 18 - 22 working days

Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today-the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. What You Will Learn Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks Who This Book Is For Those who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book's content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.

Digital Privacy and Security Using Windows - A Practical Guide (Paperback, 1st ed.): Nihad A. Hassan, Rami Hijazi Digital Privacy and Security Using Windows - A Practical Guide (Paperback, 1st ed.)
Nihad A. Hassan, Rami Hijazi
R2,476 R2,203 Discovery Miles 22 030 Save R273 (11%) Ships in 18 - 22 working days

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You'll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students

The Making and Un-Making of Neuronal Circuits in Drosophila (Paperback, Softcover reprint of the original 1st ed. 2012): Bassem... The Making and Un-Making of Neuronal Circuits in Drosophila (Paperback, Softcover reprint of the original 1st ed. 2012)
Bassem A. Hassan
R3,592 Discovery Miles 35 920 Ships in 18 - 22 working days

The small fruit fly, Drosophila melanogaster, has for over a century now had a large impact on biological and biomedical research; however, our knowledge of the fly brain has lagged significantly behind our understanding of other aspects of its development, physiology, and function. In The Making and Un-Making of Neuronal Circuits in Drosophila, innovative expert neuroscientists in the field present the ideas and concepts behind the methods, tools, and tricks that are currently being utilized to decode the secrets of this valuable insect's brain. Focused on the concept of a neuronal circuit, defined as a series of synaptically connected neurons subservient to a particular behavioral modality, this volume contains chapters dealing with anatomical analysis with a focus on cellular and sub-cellular morphologies. These detailed approaches fall under the headings of "Physiology" and "Behavior", conveniently divided the book into two sections. Written in the easy-to-follow Neuromethods series format, this work provides the kind of detailed description and implementation advice that is crucial for getting optimal results. Inventive and accessible, The Making and Un-Making of Neuronal Circuits in Drosophila provides the information and tools necessary to carry out current experiments and, more importantly, further advance the progress of the Drosophila neurobiology field and neurobiology in general.

Droughts, Food and Culture - Ecological Change and Food Security in Africa's Later Prehistory (Paperback, Softcover... Droughts, Food and Culture - Ecological Change and Food Security in Africa's Later Prehistory (Paperback, Softcover reprint of the original 1st ed. 2002)
Fekri A. Hassan
R2,673 Discovery Miles 26 730 Ships in 18 - 22 working days

Recent droughts in Africa and elsewhere in the world, from China to Peru, have serious implications for food security and grave consequences for local and international politics. The issues do not just concern the plight of African peoples, but also our global ecological future.
Global climatic changes become manifest initially in regions that are marginal or unstable. Africa's Sahel zone is one of the most sensitive climatic regions in the world and the events that have gripped that region beginning in the 1970's were the first indicator of a significant shift in global climatic conditions.
This work aims to bring archaeology with the domain on contemporary human affairs and to forge a new methodology for coping with environmental problems from an archaeological perspective. Using the later prehistory of Africa as a comparison, the utility of this methodological strategy in interpreting culture change and assessing long-term response to current, global climatic fluctuations is examined and understood.

Open Source Intelligence Methods and Tools - A Practical Guide to Online Intelligence (Paperback, 1st ed.): Nihad A. Hassan,... Open Source Intelligence Methods and Tools - A Practical Guide to Online Intelligence (Paperback, 1st ed.)
Nihad A. Hassan, Rami Hijazi
R1,238 R1,041 Discovery Miles 10 410 Save R197 (16%) Ships in 18 - 22 working days

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises

Digital Forensics Basics - A Practical Guide Using Windows OS (Paperback, 1st ed.): Nihad A. Hassan Digital Forensics Basics - A Practical Guide Using Windows OS (Paperback, 1st ed.)
Nihad A. Hassan
R1,231 R1,034 Discovery Miles 10 340 Save R197 (16%) Ships in 18 - 22 working days

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You'll Learn Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques Who This Book Is For Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals

Kurzgefasste Grammatik der Vulgär-arabischen Sprache - Mit Besonderer Rücksicht auf den Egyptischen D (Paperback): A. Hassan Kurzgefasste Grammatik der Vulgär-arabischen Sprache - Mit Besonderer Rücksicht auf den Egyptischen D (Paperback)
A. Hassan
R612 Discovery Miles 6 120 Ships in 18 - 22 working days
Arabic self-taught (Syrian) with English phonetic pronunciation (Paperback): A. Hassan, N. Odeh Arabic self-taught (Syrian) with English phonetic pronunciation (Paperback)
A. Hassan, N. Odeh
R454 Discovery Miles 4 540 Ships in 18 - 22 working days
The Iraqi Invasion of Kuwait - Religion, Identity and Otherness in the Analysis of War and Conflict (Paperback): Hamdi A. Hassan The Iraqi Invasion of Kuwait - Religion, Identity and Otherness in the Analysis of War and Conflict (Paperback)
Hamdi A. Hassan
R963 Discovery Miles 9 630 Ships in 18 - 22 working days

Focusing on the 1990 Iraqi invasion of Kuwait, Hamdi Hassan offers a balanced examination of the motivation of the Iraqi polity and the conditions which accelerated and facilitated the decision to invade. Critical of the traditional approach of most Middle East studies, The Iraqi Invasion of Kuwait offers a counterpoint to Western interpretations of this key event in the contemporary history of the Middle East. Hassan examines how Saddam Hussein assessed and responded to American and Israeli intentions after the invasion, the reaction of other Arab states, and the unprecedented grassroots support for the Iraqi leadership. In this context, the author examines the social structure of Iraqi society - families, clans and regional alliances - and the importance of Ba'athism. Hassan also examines the political structure of the country, relating the identity of Arabism - the religion and language which is associated closely with the Pan Arabist ideals - to Iraqi foreign policy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Nonlinearity and Disorder: Theory and…
Fatkhulla Abdullaev, Ole Bang, … Hardcover R4,103 Discovery Miles 41 030
Research Anthology on Modern Violence…
Information R Management Association Hardcover R9,772 Discovery Miles 97 720
The Childrens Music Studio - A…
Wendell Hanna Hardcover R3,595 Discovery Miles 35 950
Smudged Pages - Letting Go of the Lies…
Aimee Fuhrman Hardcover R473 Discovery Miles 4 730
Ion Tracks in Apatite and Quartz - And…
Daniel Schauries Hardcover R2,653 Discovery Miles 26 530
Dielectric Properties of Ionic Liquids
Marian Paluch Hardcover R2,685 Discovery Miles 26 850
Cooking Lekka - Comforting Recipes For…
Thameenah Daniels Paperback R312 Discovery Miles 3 120
10 Indelibles - Formidable Distinctive…
Philip A Brown Paperback R332 Discovery Miles 3 320
Handbook of Metaheuristics
Michel Gendreau, Jean-Yves Potvin Hardcover R4,998 Discovery Miles 49 980
Nureyev; an autobiography with pictures
Rudolf Nureyev Hardcover R842 Discovery Miles 8 420

 

Partners