Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effectively and efficiently, it calls for a better understanding of the ways in which we are ready to embrace this change. Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians.
The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effectively and efficiently, it calls for a better understanding of the ways in which we are ready to embrace this change. Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians.
With the development of technology, software is becoming critical for the success of many large systems. There are many risks involved in creating high quality software on time and within budget. The success of software product, both functionally and financially is directly related to the quality of the requirements. Software requirement risk addresses the possibility of suffering a loss of any functional or non-functional requirement of the system. It refers to the uncertainties caused by differences between the requirements perceived by developers and user groups' expectation of the system. Requirement risk can lower project performance therefore effective management of it is critical to achieve desired project performance. In our research work a Requirement Risk Prioritization Model (RRPM) has been proposed. Implementation of inspection technique is done to identify the key requirement risk factors responsible in achieving successful outcome and use a Bayesian network approach to prioritize the requirement risks that leads to fail a software project. These Results can be used to compute the overall risk metric associated with a project.
Human development aims at enlarging people's choices. By people it is meant that both males and females are given the opportunities to enhance their capabilities. In the usual systems of national accounting, the economic contribution of men is majorly considered in the form of activities performed for an exchange price in the market. Such activities are measurable in terms of money for the productive services rendered by labour. However, women perform activities in the household that require the same or sometimes even more labour efforts as men require outside the house. But due to lack of the recognition and measurability imparted to such activities, they remain outside the ambit of the economic activities. This book is an attempt to highlight the importance of valuing women's work that is largely unpaid and unrecognised. An effort has been made to examine data related to the participation of women in different activities. This is required to know the nature of activities that include the involvement of women. A major observation form such data reveals trends that are quite a departure from the usually held beliefs.
|
You may like...
Saga Land - The Island Stories at the…
Richard Fidler, Kari Gislason
Paperback
(1)
R330 Discovery Miles 3 300
Germans to America, Aug. 1, 1859-Dec…
Ira A. Glazier, William P. Filby
Hardcover
R4,273
Discovery Miles 42 730
|