0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (9)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

The Decline of British Industrial Hegemony - Bengal Industries 1914-46 (Hardcover): Indrajit Ray The Decline of British Industrial Hegemony - Bengal Industries 1914-46 (Hardcover)
Indrajit Ray
R4,616 Discovery Miles 46 160 Ships in 12 - 17 working days

Through two World Wars and the Great Depression, this book explores the turbulent history of colonial Indian industry in the period immediately prior to independence. Focusing on five major industries in Bengal - coal mining, iron-smelting, jute manufacturing, paper making and tea plantation - the book looks at the impact of the war efforts on production, employment and capital: some industries experienced rapid growth due to additional investment, others suffered due to the dislocation of markets. Moreover, by drawing lessons from the war economy (especially the dearth of various essential commodities including war materials), the colonial government took up various measures in the inter-war period to promote India's domestic industries for the first time. Additionally, the book also argues that many of the expatriate firms in India became financially weak because of the Depression which paved the way for the 'Indianisation' of corporate houses. These elements were significant factors in the decline of British industrial hegemony in India and aided the de-colonisation process which followed. This book will be of interest to scholars of Indian economic history as well as those with wider interests in decolonisation, industrial history and the first half of the twentieth century.

The Development of Modern Industries in Bengal - ReIndustrialisation, 1858-1914 (Paperback): Indrajit Ray The Development of Modern Industries in Bengal - ReIndustrialisation, 1858-1914 (Paperback)
Indrajit Ray
R1,300 Discovery Miles 13 000 Ships in 12 - 17 working days

Bengal's traditional industries, once celebrated worldwide, largely decayed under the backwash effects of the British Industrial Revolution in the first half of the nineteenth century. Although colonial ambivalence is often cited as an explanation, this study also shows that a series of new industries emerged during this period. The book reappraises the thesis of India's deindustrialisation and discusses the development status of the traditional industries in the early nineteenth century, examines their technology, employment opportunities and marketing and, finally, analyses the underlying reasons for their decay. It offers a study of how traditional industries evolved into modern enterprises in a British colony, and contributes to the broader discussion on the global history of industrialisation. This book will be of interest to scholars of Indian economic history as well as those who seek to understand the widespread effects of industrialisation, especially in a colonial context.

Bengal Industries and the British Industrial Revolution (1757-1857) (Hardcover): Indrajit Ray Bengal Industries and the British Industrial Revolution (1757-1857) (Hardcover)
Indrajit Ray
R4,454 Discovery Miles 44 540 Ships in 12 - 17 working days

This book seeks to enlighten two grey areas of industrial historiography. Although Bengal industries were globally dominant on the eve of the industrial revolution, no detailed literature is available about their later course of development. A series of questions are involved in it. Did those industries decline during the spells of British industrial revolution? If yes, what were their reasons? If not, the general curiosity is: On which merits could those industries survive against the odds of the technological revolution? A thorough discussion on these issues also clears up another area of dispute relating to the occurrence of deindustrialization in Bengal, and the validity of two competing hypotheses on it, viz. i) the mainstream hypothesis of market failures, and ii) the neo-marxian hypothesis of imperialistic state interventions.

Bengal Industries and the British Industrial Revolution (1757-1857) (Paperback): Indrajit Ray Bengal Industries and the British Industrial Revolution (1757-1857) (Paperback)
Indrajit Ray
R1,570 Discovery Miles 15 700 Ships in 12 - 17 working days

This book seeks to enlighten two grey areas of industrial historiography. Although Bengal industries were globally dominant on the eve of the industrial revolution, no detailed literature is available about their later course of development. A series of questions are involved in it. Did those industries decline during the spells of British industrial revolution? If yes, what were their reasons? If not, the general curiosity is: On which merits could those industries survive against the odds of the technological revolution? A thorough discussion on these issues also clears up another area of dispute relating to the occurrence of deindustrialization in Bengal, and the validity of two competing hypotheses on it, viz. i) the mainstream hypothesis of market failures, and ii) the neo-marxian hypothesis of imperialistic state interventions.

Industrial Control Systems Security and Resiliency - Practice and Theory (Paperback, 1st ed. 2019): Craig Rieger, Indrajit Ray,... Industrial Control Systems Security and Resiliency - Practice and Theory (Paperback, 1st ed. 2019)
Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
R4,483 Discovery Miles 44 830 Ships in 10 - 15 working days

This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

Industrial Control Systems Security and Resiliency - Practice and Theory (Hardcover, 1st ed. 2019): Craig Rieger, Indrajit Ray,... Industrial Control Systems Security and Resiliency - Practice and Theory (Hardcover, 1st ed. 2019)
Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
R3,718 Discovery Miles 37 180 Ships in 12 - 17 working days

This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

Data and Applications Security XVII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 2004): Sabrina... Data and Applications Security XVII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 2004)
Sabrina de Capitani di Vimercati, Ray Indrakshi, Indrajit Ray
R4,527 Discovery Miles 45 270 Ships in 10 - 15 working days

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.

Advances in Digital Forensics IV (Paperback, Softcover reprint of hardcover 1st ed. 2008): Indrajit Ray, Sujeet Shenoi Advances in Digital Forensics IV (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Indrajit Ray, Sujeet Shenoi
R2,987 Discovery Miles 29 870 Ships in 10 - 15 working days

Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.

This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.

Data and Applications Security XVII - Status and Prospects (Hardcover, 2004 ed.): Sabrina de Capitani di Vimercati, Ray... Data and Applications Security XVII - Status and Prospects (Hardcover, 2004 ed.)
Sabrina de Capitani di Vimercati, Ray Indrakshi, Indrajit Ray
R4,751 Discovery Miles 47 510 Ships in 10 - 15 working days

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats.

Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include:
-Information Warfare,
-Information Assurance,
-Security and Privacy,
-Authorization and Access Control in Distributed Systems,
-Security Technologies for the Internet,
-Access Control Models and Technologies,
-Digital Forensics.

This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security.

Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.

The Development of Modern Industries in Bengal - ReIndustrialisation, 1858-1914 (Hardcover): Indrajit Ray The Development of Modern Industries in Bengal - ReIndustrialisation, 1858-1914 (Hardcover)
Indrajit Ray
R4,142 Discovery Miles 41 420 Ships in 12 - 17 working days

Bengal's traditional industries, once celebrated worldwide, largely decayed under the backwash effects of the British Industrial Revolution in the first half of the nineteenth century. Although colonial ambivalence is often cited as an explanation, this study also shows that a series of new industries emerged during this period. The book reappraises the thesis of India's deindustrialisation and discusses the development status of the traditional industries in the early nineteenth century, examines their technology, employment opportunities and marketing and, finally, analyses the underlying reasons for their decay. It offers a study of how traditional industries evolved into modern enterprises in a British colony, and contributes to the broader discussion on the global history of industrialisation. This book will be of interest to scholars of Indian economic history as well as those who seek to understand the widespread effects of industrialisation, especially in a colonial context.

Cyber-Security Threats and Response Models in Nuclear Power Plants (Paperback, 1st ed. 2022): Carol Smidts, Indrajit Ray,... Cyber-Security Threats and Response Models in Nuclear Power Plants (Paperback, 1st ed. 2022)
Carol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, …
R1,370 Discovery Miles 13 700 Ships in 10 - 15 working days

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well. A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well. This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.

Advances in Digital Forensics IV (Hardcover, 2008 ed.): Indrajit Ray, Sujeet Shenoi Advances in Digital Forensics IV (Hardcover, 2008 ed.)
Indrajit Ray, Sujeet Shenoi
R3,937 R2,322 Discovery Miles 23 220 Save R1,615 (41%) Ships in 12 - 17 working days

Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.

This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.

From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Paperback, 1st ed.... From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Paperback, 1st ed. 2018)
Pierangela Samarati, Indrajit Ray, Indrakshi Ray
R1,622 Discovery Miles 16 220 Ships in 10 - 15 working days

This Festschrift is in honor of Sushil Jajodia, Professor in the George Mason University, USA, on the occasion of his 70th birthday. This book contains papers written in honor of Sushil Jajodia, of his vision and his achievements. Sushil has sustained a highly active research agenda spanning several important areas in computer security and privacy, and established himself as a leader in the security research community through unique scholarship and service. He has extraordinarily impacted the scientific and academic community, opening and pioneering new directions of research, and significantly influencing the research and development of security solutions worldwide. Also, his excellent record of research funding shows his commitment to sponsored research and the practical impact of his work. The research areas presented in this Festschrift include membrane computing, spiking neural networks, phylogenetic networks, ant colonies optimization, work bench for bio-computing, reaction systems, entropy of computation, rewriting systems, and insertion-deletion systems.

Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014,... Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Javier Lopez, Indrajit Ray, Bruno Crispo
R2,393 Discovery Miles 23 930 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.

Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings... Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings (Paperback, 1st ed. 2016)
Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
R3,235 Discovery Miles 32 350 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hampstead
Diane Keaton, Brendan Gleeson, … DVD R49 Discovery Miles 490
Sudocrem Skin & Baby Care Barrier Cream…
R70 Discovery Miles 700
Tommy Hilfiger - Tommy Cologne Spray…
R1,218 R694 Discovery Miles 6 940
Estee Lauder Beautiful Belle Eau De…
R2,241 R1,652 Discovery Miles 16 520
Badgirl Wanderer Ladies Sunglasses
R173 Discovery Miles 1 730
Fine Living E-Table (Black | White)
 (7)
R319 R199 Discovery Miles 1 990
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Snyman's Criminal Law
Paperback R1,301 R1,153 Discovery Miles 11 530
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners