Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 61 matches in All Departments
The first comprehensive history of Bright Leaf tobacco culture of any state to appear in fifty years, Long Green: The Rise and Fall of Tobacco in South Carolina explores the advances and retreats of tobacco's influence in South Carolina from its beginnings in the colonial period to its heydey at the turn of the century, the impact of the Depression, the New Deal, World War II, and on to present-day controversies about health risks due to smoking. The book describes Pee Dee farmers' struggles against large manufacturers and attempts at industry reforms and covers the Tri-State Cooperative of the 1920s and the Hoover administration Federal Farm Bureau's program for tobacco that forged a lasting and successful partnership between tobacco growers and the U.S. government. The technological revolutions of the post-World War II era and subsequent tobacco economy hardships due to increasingly negative public perception of tobacco use are also highlighted. The book details the roles and motives of key individuals in the development of tobacco culture, including firsthand experiences as related by older farmers and warehousemen, and offers informed speculations on the future of tobacco culture. Long Green allows readers to better understand the full significance of this cash crop in the history and economy of South Carolina and the American South.
In this comprehensive work, Tyrone R. Simpson, II, explores how six American writers--Anzia Yezierska, Michael Gold, Hubert Selby Jr., Chester Himes, Gloria Naylor, and John Edgar Wideman--have artistically responded to the racialization of U.S. frostbelt cities in the twentieth century. By using the critical tools of spatial theory, critical race theory, urban history, and urban sociology, Simpson accounts for how these writers imagine the subjective response to the race-making power of space.
Drawing on a range of approaches in cultural, gender and literary studies, this book presents Chretien de Troyes's Erec et Enide as a daring and playful exploration of scandal, terror and anxiety in court cultures. Through an interdisciplinary reading, it locates Erec et Enide, the first surviving Arthurian romance in French, in various contexts, from broad cultural and historical questionings such as medieval vernacular 'modernity's' engagement with the weight of its classical inheritance, to the culturally fecund and politically turbulent histories of the families of Eleanor of Aquitaine and Henry II Plantagenet. Where previous accounts of the tale have not uncommonly presented Chretien's poem as a decorous 'resolution' of tensions between dynastic marriage and fin'amors, between personal desire and social duty, this reading sees these forces as in permanent and irresolvable tension, the poem's key scenes haunted - whether mischievously or traumatically - by questions and skeletons from various closets.
The book explores the intersection of emotions and migration in a number of case studies from across the USA, Europe and Southeast Asia, including the transmigration of female domestic workers, transmigrant marriages, transmigrant workers in the entertainment industry and asylum seekers and refugees who are the victims of domestic violence.
In this collection, over 40 researchers across the social sciences offer a series of engaging accounts reflecting on dilemmas and issues that they experienced while researching and communicating research on personal life. Their insights are food for thought for students, researchers, professionals and anyone using, planning or conducting research on families and relationships, encouraging critical reflection on the readers' own processes. Researchers' accounts are organised under and commented on by insightful overviews. David Morgan leads with consideration of framing research. Kay Tisdall prefaces the next set by reflections on ethical considerations in research engagements. Angus Bancroft and Stuart Aitken each comment on researchers' accounts from 'in the field' focusing on the research relationship and the complexities of time and place. The final accounts are prefaced by Lynn Jamieson's discussion of dealing with dilemmas in interpreting and representing families and relationships and by Sarah Morton's and Sandra Nutley's reflections on getting research into policy and practice.
System Test and Diagnosis is the first book on test and diagnosis at the system level, defined as any aggregation of related elements that together form an entity of sufficient complexity for which it is impractical to treat all of the elements at the lowest level of detail. The ideas presented emphasize that it is possible to diagnose complex systems efficiently. Since the notion of system is hierarchical, these ideas are applicable to all levels. The philosophy is presented in the context of a model-based approach, using the information flow model, that focuses on the information provided by the tests rather than the functions embedded in the system. Detailed algorithms are offered for evaluating system testability, performing efficient diagnosis, verifying and validating the models, and constructing an architecture for system maintenance. Several advanced algorithms, not commonly available in existing diagnosis tools, are discussed, including reasoning with inexact or uncertain test data, breaking large problems into manageable smaller problems, diagnosing systems with time sensitive information and time dependent tests and learning from experience. The book is divided into three parts. The first part provides motivation for careful development of the subject and the second part provides the tools necessary for analyzing system testability and computing diagnostic strategies. The third part presents advanced topics in diagnosis. Several case studies are provided, including a single detailed case study. Smaller case studies describe experiences from actual applications of the methods discussed. The detailed case study walks the reader through a complete analysis of a system to illustrate the concepts and describe the analyses that are possible. All case studies are based upon real systems that have been modeled for the purposes of diagnosis. System Test and Diagnosis is the culmination of nearly twelve years of research into diagnosis modeling and its applications. It is designed as a primary reference for engineers and practitioners interested in system test and diagnosis.
"System level testing is becoming increasingly important. It is driven by the incessant march of complexity ... which is forcing us to renew our thinking on the processes and procedures that we apply to test and diagnosis of systems. In fact, the complexity defines the system itself which, for our purposes, is Aany aggregation of related elements that together form an entity of sufficient complexity for which it is impractical to treat all of the elements at the lowest level of detail . System approaches embody the partitioning of problems into smaller inter-related subsystems that will be solved together. Thus, words like hierarchical, dependence, inference, model, and partitioning are frequent throughout this text. Each of the authors deals with the complexity issue in a similar fashion, but the real value in a collected work such as this is in the subtle differences that may lead to synthesized approaches that allow even more progress. The works included in this volume are an outgrowth of the 2nd International Workshop on System Test and Diagnosis held in Alexandria, Virginia in April 1998. The first such workshop was held in Freiburg, Germany, six years earlier. In the current workshop nearly 50 experts from around the world struggled over issues concerning the subject... In this volume, a select group of workshop participants was invited to provide a chapter that expanded their workshop presentations and incorporated their workshop interactions... While we have attempted to present the work as one volume and requested some revision to the work, the content of the individual chapters was not edited significantly. Consequently, you will see different approaches to solving the sameproblems and occasional disagreement between authors as to definitions or the importance of factors. ... The works collected in this volume represent the state-of-the-art in system test and diagnosis, and the authors are at the leading edge of that science...." From the Preface
Communicate with your baby--today! With Essential Baby Sign Language, you can feel closer to your baby than you ever thought possible! Featuring seventy-five of the most important signs babies need every day, this book helps you start signing now, without spending hours learning extensive philosophy and sifting through hundreds of valueless terms. These signs not only let you know what your child is trying to say, but also deepen your parent-child bond and stimulate his or her development. Complete with useful advice and clear illustrations, you'll be able to communicate with your baby in no time!
This title explores understandings and experiences of 'dirty work' - tasks or occupations that are seen as disgusting and degrading. It complicates the 'clean/dirty' divide in the context of organisations and work and illustrates some of the complex ways in which dirty work identities are managed.
"Issues of visibility and invisibility are becoming increasingly apparent in gender research in organizations. This book will not only further develop current theoretical ideas around being seen and unseen within organizations, but will also provide us with the opportunity to problematize the concepts of visibility and invisibility"--
Exploring how men in service and caring occupations (cabin crew, primary school teachers, nurses and librarians) both 'do' and 'undo' gender as they manage the potential mismatch between gender and occupational identity, this book engages with the key theoretical concepts of identity, visibility and emotions to examine men's experiences.
Improvement of the world's livestock industry necessitates input from many directions. Planning by a host of national and international agencies is required in order to provide optimal stimulus in very diverse areas ranging from formulation of laws and incentives that stimulate competition yet prevent undue competition, to the optimal provision of credit. Planning is needed to carry out a complex array of interrelated research. The purpose of this book is specifically tasked with setting forth frameworks and methods for evaluation of investments and associated economic decision-making in the livestock industries of developing countries. Economists will find this book useful because it synthesizes .much material into a cohesive whole--material that is often presented in a cursory manner or overlooked as emphasis has shifted to sophisticated quantitative techniques.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.
"The nations of Subsaharan Africa experienced declining levels of food production per capita throughout the 1970s and early 1980s, particularly in the area of livestock production. Addressing that problem, the authors of this book assess in a systems context the environmental, biological, and social constraints on future African livestock development and consider prospects for improving productivity, They focus especially on changes needed in production and marketing systems, pointing to important policy considerations . The book is divided into four parts containing twenty-one chapters, each authored by one or more respective authorities in his or her field. Each section in its own way addresses the entire set of questions; topics include aspects of animal breeding and nutrition, anthropology, economics, ecology, farming systems, governmental policy, land tenure, marketing, modelling, and veterinary medicine."
The Japanese Cattle industry has been undergoing major changes for the past three decades. During the 1950's and 1960's mechanized power rapidly. The process of beef industry structure change accelerated in the 1970's as medium scale feedlots came into being, regional packing plants were established, and the beef marketing system matured. Economic forces, both within and external to the industry. A major objective of this book is to test the authors' hypothesis that beef production by Japan's cattle industry could become competitive with imported beef.
Offering the first comprehensive history of U.S relations with Indonesia during the 1960s, Economists with Guns explores one of the central dynamics of international politics during the Cold War: the emergence and U.S. embrace of authoritarian regimes pledged to programs of military-led development. Drawing on newly declassified archival material, Simpson examines how Americans and Indonesians imagined the country's development in the 1950s and why they abandoned their democratic hopes in the 1960s in favor of Suharto's military regime. Far from viewing development as a path to democracy, this book highlights the evolving commitment of Americans and Indonesians to authoritarianism in the 1960s on.
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.
Scholars and analysts seeking to illuminate the extraordinary creativity and innovation evident in European medieval cultures and their afterlives have thus far neglected the important role of religious heresy. The papers collected here - reflecting the disciplines of history, literature, theology, philosophy, economics and law - examine the intellectual and social investments characteristic of both deliberate religious dissent such as the Cathars of Languedoc, the Balkan Bogomils, the Hussites of Bohemia and those who knowingly or unknowingly bent or broke the rules, creating their own 'unofficial orthodoxies'. Attempts to understand, police and eradicate all these, through methods such as the Inquisition, required no less ingenuity. The ambivalent dynamic evident in the tensions between coercion and dissent is still recognisable and productive in the world today.
"The nations of Subsaharan Africa experienced declining levels of food production per capita throughout the 1970s and early 1980s, particularly in the area of livestock production. Addressing that problem, the authors of this book assess in a systems context the environmental, biological, and social constraints on future African livestock development and consider prospects for improving productivity, They focus especially on changes needed in production and marketing systems, pointing to important policy considerations . The book is divided into four parts containing twenty-one chapters, each authored by one or more respective authorities in his or her field. Each section in its own way addresses the entire set of questions; topics include aspects of animal breeding and nutrition, anthropology, economics, ecology, farming systems, governmental policy, land tenure, marketing, modelling, and veterinary medicine."
The Japanese Cattle industry has been undergoing major changes for the past three decades. During the 1950's and 1960's mechanized power rapidly. The process of beef industry structure change accelerated in the 1970's as medium scale feedlots came into being, regional packing plants were established, and the beef marketing system matured. Economic forces, both within and external to the industry. A major objective of this book is to test the authors' hypothesis that beef production by Japan's cattle industry could become competitive with imported beef. |
You may like...
Poetic Inquiry For The Human And Social…
Heidi van Rooyen, Kathleen Pithouse-Morgan
Paperback
Perils of the Ocean and Wilderness - or…
John Gilmary 1824-1892 Shea
Hardcover
R843
Discovery Miles 8 430
Palaces Of Stone - Uncovering Ancient…
Mike Main, Thomas Huffman
Paperback
The Good, the Bad and the Innocent - The…
Albert Etzerza, Rose Tashoots
Hardcover
R549
Discovery Miles 5 490
|