Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
The Neolithic is thought to have arrived in Egypt via diffusion from an origin in southwest Asia, relatively late compared to neighboring locations. The authors suggest an alternative approach to understanding the development of food production in Egypt based on the results of new fieldwork in the Fayum. They provide the results of a detailed study of the Fayum archaeological landscape interpretable at different temporal and spatial scales, using an expanded version of low-level food production to organize observations concerning paleoenvironment, socioeconomy, settlement, and mobility. While domestic plants and animals were indeed introduced from elsewhere, when a number of aspects of the archaeological record are compared, a settlement system is suggested that has no obvious analogues with the Neolithic in southwest Asia. The results obtained from the Fayum are used to assess other contemporary sites in Egypt.
A Presidential Commission, several writers, and numerous network security incidents have called attention to the potential vulnerability of the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/Internet Protocol (TCP/IP) networks are inherently resistant to physical attack because of their decentralized structure, but are vulnerable to CNA. Passive defenses can be very effective in forestalling CNA, but their effectiveness relies on the capabilities and attentiveness of system administrators and users. There are still many measures that can be taken to improve the effectiveness of passive defenses, and one of these is active defense. It can be divided into three categories: preemptive attacks, counterattacks, and active deception. Preemptive attacks show little potential for affecting an adversary's CNA capabilities, since these are likely to remain isolated from the Internet until actually beginning their attack. Counterattacks show more promise, but only if begun early enough to permit all preparatory activities to be completed before the adversary's CNA is completed. Active deception also shows promise, but only as long as intrusions can be detected quickly and accurately, and adversaries redirected into "dummy" networks. Active and passive defense measures can work synergistically, to strengthen one another.
|
You may like...
American Journal of Pharmacy; 17
Philadelphia College of Pharmacy and
Hardcover
R916
Discovery Miles 9 160
Polymers Enhancing Bioavailability in…
Ana Isabel Fernandes, Angela Faustino Jozala
Hardcover
R1,759
Discovery Miles 17 590
The State of the Art in Endodontics
Massimo Amato, Giuseppe Pantaleo, …
Hardcover
R1,515
Discovery Miles 15 150
|