![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 23 of 23 matches in All Departments
The last instalment of the teen vampire saga based on the bestselling books by Stephenie Meyer. After Bella (Kristen Stewart) is turned into a vampire by her lover, Edward (Robert Pattinson), she appears to be enjoying her new immortal life and the abilities bestowed upon her. But after Irina (Maggie Grace) mistakes Bella and Edward's child, Renesmee (Mackenzie Foy), for an 'immortal child' and tells the Volturi this, they vow to destroy the potentially threatening girl and the whole Cullen family for allowing her to be transformed. In order to protect themselves and Renesmee, the Cullen clan must enlist the help of other vampire clans from around the world, in the hope of convincing the Volturi of the false claims of Irina.
This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the project but also serve as an overview of the state of the art in current research on data privacy and privacy enhancing technologies.
The penultimate instalment of the teen vampire saga. The newfound marital bliss of Bella Swan (Kristen Stewart) and her vampire lover, Edward Cullen (Robert Pattinson), comes under threat when Bella discovers that she is pregnant. Posing a threat both to the Quileute wolves and to the Volturi vampires, the conception and near-fatal birth of their daughter sparks a series of dramatic events that threatens to tear their world apart.
This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the project but also serve as an overview of the state of the art in current research on data privacy and privacy enhancing technologies.
This book constitutes the proceedings of the 10th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2013, held in Barcelona, Spain, in November 2013. The 24 papers presented in this volume were carefully reviewed and selected from 40 submissions. They deal with the theory and tools for modeling decisions, as well as applications that encompass decision making processes and information fusion techniques.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.
This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009. The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2009 papers cover topics such as privacy in service oriented architectures, privacy-preserving mechanisms, crossmatching and indistinguishability techniques, privacy policies, and disclosure of information. The SETOP 2009 papers address all current issues within the sope of security policies, identification and privacy, as well as security mechanisms.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022. For DPM 2022, 10 full papers out of 21 submissions have been accepted for inclusion in this book. They were organized in topical sections as follows: differential privacy and data analysis; regulation, artificial intelligence, and formal verification; and leakage quantification and applications. The CBT 2022 workshop accepted 7 full papers and 3 short papers from 18 submissions. The papers were organized in the following topical sections: Bitcoin, lightning network and scalability; and anonymity, fault tolerance and governance; and short papers.
This book constitutes the refereed proceedings and revised selected papers from the 16th International Workshop on Data Privacy Management, DPM 2021, and the 5th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2021, which were held online on October 8, 2021, in conjunction with ESORICS 2021. The workshops were initially planned to take place in Darmstadt, Germany, and changed to an online event due to the COVID-19 pandemic.The DPM 2021 workshop received 25 submissions and accepted 7 full and 3 short papers for publication. These papers were organized in topical sections as follows: Risks and privacy preservation; policies and regulation; privacy and learning. For CBT 2021 6 full papers and 6 short papers were accepted out of 31 submissions. They were organized in topical sections as follows: Mining, consensus and market manipulation; smart contracts and anonymity.
This book constitutes the revised selected post conference proceedings of the 15th International Workshop on Data Privacy Management, DPM 2020, and the 4th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2020, held in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020, held in Guildford, UK in September 2020.For the CBT Workshop 8 full and 4 short papers were accepted out of 24 submissions. The selected papers are organized in the following topical headings: Transactions, Mining, Second Layer and Inter-bank Payments. The DPM Workshop received 38 submissions from which 12 full and 5 short papers were selected for presentation. The papers focus on Second Layer, Signature Schemes, Formal Methods, Privacy, SNARKs and Anonymity.
This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019, held in Luxembourg in September 2019. For the CBT Workshop 10 full and 8 short papers were accepted out of 39 submissions. The selected papers are organized in the following topical headings: lightning networks and level 2; smart contracts and applications; and payment systems, privacy and mining. The DPM Workshop received 26 submissions from which 8 full and 2 short papers were selected for presentation. The papers focus on privacy preserving data analysis; field/lab studies; and privacy by design and data anonymization. Chapter 2, "Integral Privacy Compliant Statistics Computation," and Chapter 8, "Graph Perturbation as Noise Graph Addition: a New Perspective for Graph Anonymization," of this book are available open access under a CC BY 4.0 license at link.springer.com.
This book constitutes the proceedings of the 13th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2016, held in Sant Julia de Loria, Andorra, in September 2016. The 22 revised full papers presented together with three invited talks were carefully reviewed and selected from 36 submissions. Providing a forum for researchers to discuss models for decision and information fusion (aggregation operators) and their applications to AI, the papers address topics such as decision making, information fusion, social networks, data mining, and related subjects. Applications to data science and privacy technologies, as well as to real world problems are also discussed.
This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017. The DPM Workshop received 51 submissions from which 16 full papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering. From the CBT Workshop six full papers and four short papers out of 27 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing.
This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015. In the DPM 2015 workshop edition, 39 submissions were received. In the end, 8 full papers, accompanied by 6 short papers, 2 position papers and 1 keynote were presented in this volume. The QASA workshop series responds to the increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems and services, from requirements elicitation to run-time operation and maintenance. QASA 2015 received 11 submissions, of which 4 papers are presented in this volume as well.
The last instalment of the teen vampire saga based on the bestselling books by Stephenie Meyer. After Bella (Kristen Stewart) is turned into a vampire by her lover, Edward (Robert Pattinson), she appears to be enjoying her new immortal life and the abilities bestowed upon her. But after Irina (Maggie Grace) mistakes Bella and Edward's child, Renesmee (Mackenzie Foy), for an 'immortal child' and tells the Volturi this, they vow to destroy the potentially threatening girl and the whole Cullen family for allowing her to be transformed. In order to protect themselves and Renesmee, the Cullen clan must enlist the help of other vampire clans from around the world, in the hope of convincing the Volturi of the false claims of Irina.
Sci-fi action feature directed and co-written by Guillermo del Toro. Gigantic monsters known as Kaiju rise up from the Pacific Ocean and invade Earth. As they rage war, killing millions in the process, the human race defend their planet with the use of special robots called Jaegers which are controlled neurally by their pilots. However, even these magnificent machines have trouble defeating the Kaiju. With their armed forces dwindling, mankind puts its faith in ex-pilot Raleigh Becket (Charlie Hunnam) and trainee Mako Mori (Rinko Kikuchi). Together they must control an early Jaeger model in one last attempt to save Earth.
Triple bill of the comedy franchise starring Ben Stiller. In 'Night at the Museum' (2006), Larry Daley (Stiller) is a kind-hearted dreamer who always knew that he was destined for greatness. In need of money he takes a job as a lowly graveyard-shift security guard at the Museum of Natural History in order to provide a more stable life for his ten-year-old son. On his first night on the job, however, he finds that the guardianship of the museum is far from stable. At nightfall an Egyptian spell brings the artefacts and wax figures to life. With Attila the Hun (Patrick Gallagher) charging through the hallways, miniature Romans and cowboys embroiled in a deadly feud, and a two-ton Tyrannosaurus Rex nagging to play fetch, Larry turns to a wax replica of President Theodore Roosevelt (Robin Williams) for a little advice on keeping things intact. In 'Night at the Museum 2: Escape from the Smithsmonian' (2009), Larry receives news that the Museum of Natural History is to be closed for renovations, and the exhibits moved into federal storage at the Smithsonian Institution in Washington, where the collection includes artefacts associated with many of the great figures of American history including Amelia Earhart (Amy Adams), General Custer (Bill Hader) and Al Capone (Jon Bernthal). Larry must infiltrate the museum's tight security to rescue Jedediah (Owen Wilson) and Octavius (Steve Coogan), who have been shipped there by mistake. In 'Night at the Museum 3: Secret of the Tomb' (2014), as the magic of the Tablet of Ahkmenrah begins to fade, Larry travels around the world in order to reunite members of his museum crew including Roosevelt, Jedediah and Octavius and, of course, Ahkmenrah (Rami Malek) to try to save the magic before it's too late.
Sci-fi action feature directed and co-written by Guillermo del Toro. Gigantic monsters known as Kaiju rise up from the Pacific Ocean and invade Earth. As they rage war, killing millions in the process, the human race defend their planet with the use of special robots called Jaegers which are controlled neurally by their pilots. However, even these magnificent machines have trouble defeating the Kaiju. With their armed forces dwindling, mankind puts its faith in ex-pilot Raleigh Becket (Charlie Hunnam) and trainee Mako Mori (Rinko Kikuchi). Together they must control an early Jaeger model in one last attempt to save Earth.
Sci-fi action feature directed and co-written by Guillermo del Toro. Gigantic monsters known as Kaiju rise up from the Pacific Ocean and invade Earth. As they rage war, killing millions in the process, the human race defend their planet with the use of special robots called Jaegers which are controlled neurally by their pilots. However, even these magnificent machines have trouble defeating the Kaiju. With their armed forces dwindling, mankind puts its faith in ex-pilot Raleigh Becket (Charlie Hunnam) and trainee Mako Mori (Rinko Kikuchi). Together they must control an early Jaeger model in one last attempt to save Earth.
Triple bill of the comedy franchise starring Ben Stiller. In 'Night at the Museum' (2006), Larry Daley (Stiller) is a kind-hearted dreamer who always knew that he was destined for greatness. In need of money he takes a job as a lowly graveyard-shift security guard at the Museum of Natural History in order to provide a more stable life for his ten-year-old son. On his first night on the job, however, he finds that the guardianship of the museum is far from stable. At nightfall an Egyptian spell brings the artefacts and wax figures to life. With Attila the Hun (Patrick Gallagher) charging through the hallways, miniature Romans and cowboys embroiled in a deadly feud, and a two-ton Tyrannosaurus Rex nagging to play fetch, Larry turns to a wax replica of President Theodore Roosevelt (Robin Williams) for a little advice on keeping things intact. In 'Night at the Museum 2: Escape from the Smithsmonian' (2009), Larry receives news that the Museum of Natural History is to be closed for renovations, and the exhibits moved into federal storage at the Smithsonian Institution in Washington, where the collection includes artefacts associated with many of the great figures of American history including Amelia Earhart (Amy Adams), General Custer (Bill Hader) and Al Capone (Jon Bernthal). Larry must infiltrate the museum's tight security to rescue Jedediah (Owen Wilson) and Octavius (Steve Coogan), who have been shipped there by mistake. In 'Night at the Museum 3: Secret of the Tomb' (2014), as the magic of the Tablet of Ahkmenrah begins to fade, Larry travels around the world in order to reunite members of his museum crew including Roosevelt, Jedediah and Octavius and, of course, Ahkmenrah (Rami Malek) to try to save the magic before it's too late.
|
You may like...
Neural Advances in Processing Nonlinear…
Anna Esposito, Marcos Faundez-Zanuy, …
Hardcover
R4,276
Discovery Miles 42 760
Nonlinearity: Ordinary and Fractional…
george A. Anastassiou
Hardcover
Introduction to Autonomous Manipulation…
Giacomo Marani, Junku Yuh
Hardcover
R3,273
Discovery Miles 32 730
Advanced Discrete-Time Control - Designs…
Khalid Abidi, Jian-Xin Xu
Hardcover
Information and Communication Technology…
Tomonobu Senjyu, Parikshit N. Mahalle, …
Hardcover
R5,308
Discovery Miles 53 080
Inspired by Nature - Essays Presented to…
Susan Stepney, Andrew Adamatzky
Hardcover
New Approaches in Intelligent Control…
Kazumi Nakamatsu, Roumen Kountchev
Hardcover
Fixed-Time Cooperative Control of…
Zongyu Zuo, Qinglong Han, …
Hardcover
R3,106
Discovery Miles 31 060
|