Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 14 of 14 matches in All Departments
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
This book focuses on cellular Vehicle-to-Everything (C-V2X), currently the most promising wireless communication technology for Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrian (V2P), Vehicle-to-Network (V2N) and Vehicle-to-Cloud (V2C) communications. Because of its low latency and high reliability, C-V2X has become an essential enabling technology for Intelligent Transportation Systems (ITSs) and autonomous driving. This book begins by introducing readers to the research background and status quo of global development. Then, after analyzing the performance requirements of various V2X applications, the system architecture and technical standards are presented. The two evolving stages of C-V2X, i.e., LTE-V2X and NR-V2X, are introduced in detail. In addition, related technologies such as mobile edge computing, network slicing and high-precision positioning, C-V2X security, C-V2X spectrum requirements and planning, and industrial development and applications are introduced. In closing, the book discusses future applications of and technical challenges for C-V2X. This book is the first monograph dedicated to C-V2X, offering experts, researchers and engineers from the areas of IT/CT, intelligent transportation, intelligent and connected vehicles (ICVs) an in-depth understanding of C-V2X technology and standards, while also outlining related interdisciplinary research. The book can also be used as a reference resource for both undergraduate and graduate studies.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
What will the reversion of Hong Kong mean to the people of Hong Kong - and the rest of us - who invest, trade, and shop there? Over the last fifty years Hong Kong has served as a refuge from those who fled communism in China. It became the greatest entrepot and financial center on the Asian mainland. A stunning percentage of the world's trade passed through its magnificent harbor. The focus of this book is on the impact Chinese control is likely to have on the city's role in the international economic system, and how the business community will be affected. Issues of trade and finance, of political economy, and concerns about Chinese respect for the rule of law predominate. The result is a balanced analysis of a sensitive subject: the prospects for Hong Kong's continued success and freedom.
Inorganic Geochemistry of Coal explains how to determine the concentrations and modes of occurrence of elements in coal, how to diminish adverse effects of toxic elements on the environment and human health, which elements in coal could be industrially utilized, and which elements can be successfully used as indications for deciphering depositional environments and tectonic evolution. As coal use will remain at an all-time high for the next several decades, there is a critical need for understanding the properties of this fuel to ensure efficient use, encourage its economic by-product potential, and to help minimize its negative technological, environmental and health impacts.
Both China and Europe have a long tradition of commercial and maritime law; and this new book examining various topics from their particular perspectives is both timely and important. It links the vital component of maritime law with commercial law, financial law and trade policy. The book has performed a remarkable task in making connections between China and Europe through the lenses of substantive and procedrual laws, covering a wide range of areas, including commercial law, insurance law, salvage, EU maritime law and Brexit, carriage of goods by sea, arbitration, mediation, litigation, the recently formed China International Commercial Court, and different liability regimes, as well as a brief look forward into new initiatives and artificial intelligence in the digital age. In these challenging times, we all have much to learn from each other in seeking to find answers to what are often difficult problems. This book provides a welcome opportunity for anyone interested in commercial and maritime law to engage in that learning exercise and, looking ahead, thereby to help solve such problems as may arise in the future - in a practical and fair manner. It is therefore of great relevance to both the academic field and the legal practice field in China and Europe.
In this issue, guest editors bring their considerable expertise to this important topic. Contains 13 relevant, practice-oriented topics including PSC, small duct PSC, IgG4 and ischemic cholangiopathy: what do you see on needle biopsy?; evolving understanding of noncirrhotic portal hypertension; practical guide, challenges, and pitfalls in liver fibrosis staging; liver pathology after hematopoietic stem cell transplant; medical Liver injury related to cancer treatment; and more. Provides in-depth clinical reviews on liver pathology, offering actionable insights for clinical practice. Presents the latest information on this timely, focused topic under the leadership of experienced editors in the field. Authors synthesize and distill the latest research and practice guidelines to create clinically significant, topic-based reviews.Â
Chao Shu-li (Zhao Shuli) (1906-1970), a novelist and short story writer, is best remembered for his early novels and short stories depicting rural society in early 20th-century China. Coming from a peasant background himself, Chao Shu-li employed forms of expression and story-telling that were rooted in this society, contributing to the emergence of a new "proletarian" literature vaunted by Mao and characteristic of the revolutionary era.
|
You may like...
|