Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 66 matches in All Departments
* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.
Communicate with your baby--today! With Essential Baby Sign Language, you can feel closer to your baby than you ever thought possible! Featuring seventy-five of the most important signs babies need every day, this book helps you start signing now, without spending hours learning extensive philosophy and sifting through hundreds of valueless terms. These signs not only let you know what your child is trying to say, but also deepen your parent-child bond and stimulate his or her development. Complete with useful advice and clear illustrations, you'll be able to communicate with your baby in no time!
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.
Improvement of the world's livestock industry necessitates input from many directions. Planning by a host of national and international agencies is required in order to provide optimal stimulus in very diverse areas ranging from formulation of laws and incentives that stimulate competition yet prevent undue competition, to the optimal provision of credit. Planning is needed to carry out a complex array of interrelated research. The purpose of this book is specifically tasked with setting forth frameworks and methods for evaluation of investments and associated economic decision-making in the livestock industries of developing countries. Economists will find this book useful because it synthesizes .much material into a cohesive whole--material that is often presented in a cursory manner or overlooked as emphasis has shifted to sophisticated quantitative techniques.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.
"The nations of Subsaharan Africa experienced declining levels of food production per capita throughout the 1970s and early 1980s, particularly in the area of livestock production. Addressing that problem, the authors of this book assess in a systems context the environmental, biological, and social constraints on future African livestock development and consider prospects for improving productivity, They focus especially on changes needed in production and marketing systems, pointing to important policy considerations . The book is divided into four parts containing twenty-one chapters, each authored by one or more respective authorities in his or her field. Each section in its own way addresses the entire set of questions; topics include aspects of animal breeding and nutrition, anthropology, economics, ecology, farming systems, governmental policy, land tenure, marketing, modelling, and veterinary medicine."
The Japanese Cattle industry has been undergoing major changes for the past three decades. During the 1950's and 1960's mechanized power rapidly. The process of beef industry structure change accelerated in the 1970's as medium scale feedlots came into being, regional packing plants were established, and the beef marketing system matured. Economic forces, both within and external to the industry. A major objective of this book is to test the authors' hypothesis that beef production by Japan's cattle industry could become competitive with imported beef.
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.
* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.
Scholars and analysts seeking to illuminate the extraordinary creativity and innovation evident in European medieval cultures and their afterlives have thus far neglected the important role of religious heresy. The papers collected here - reflecting the disciplines of history, literature, theology, philosophy, economics and law - examine the intellectual and social investments characteristic of both deliberate religious dissent such as the Cathars of Languedoc, the Balkan Bogomils, the Hussites of Bohemia and those who knowingly or unknowingly bent or broke the rules, creating their own 'unofficial orthodoxies'. Attempts to understand, police and eradicate all these, through methods such as the Inquisition, required no less ingenuity. The ambivalent dynamic evident in the tensions between coercion and dissent is still recognisable and productive in the world today.
"The nations of Subsaharan Africa experienced declining levels of food production per capita throughout the 1970s and early 1980s, particularly in the area of livestock production. Addressing that problem, the authors of this book assess in a systems context the environmental, biological, and social constraints on future African livestock development and consider prospects for improving productivity, They focus especially on changes needed in production and marketing systems, pointing to important policy considerations . The book is divided into four parts containing twenty-one chapters, each authored by one or more respective authorities in his or her field. Each section in its own way addresses the entire set of questions; topics include aspects of animal breeding and nutrition, anthropology, economics, ecology, farming systems, governmental policy, land tenure, marketing, modelling, and veterinary medicine."
The Japanese Cattle industry has been undergoing major changes for the past three decades. During the 1950's and 1960's mechanized power rapidly. The process of beef industry structure change accelerated in the 1970's as medium scale feedlots came into being, regional packing plants were established, and the beef marketing system matured. Economic forces, both within and external to the industry. A major objective of this book is to test the authors' hypothesis that beef production by Japan's cattle industry could become competitive with imported beef.
Scholars and analysts seeking to illuminate the extraordinary creativity and innovation evident in European medieval cultures and their afterlives have thus far neglected the important role of religious heresy. The papers collected here - reflecting the disciplines of history, literature, theology, philosophy, economics and law - examine the intellectual and social investments characteristic of both deliberate religious dissent such as the Cathars of Languedoc, the Balkan Bogomils, the Hussites of Bohemia and those who knowingly or unknowingly bent or broke the rules, creating their own 'unofficial orthodoxies'. Attempts to understand, police and eradicate all these, through methods such as the Inquisition, required no less ingenuity. The ambivalent dynamic evident in the tensions between coercion and dissent is still recognisable and productive in the world today.
Offering the first comprehensive history of U.S relations with Indonesia during the 1960s, Economists with Guns explores one of the central dynamics of international politics during the Cold War: the emergence and U.S. embrace of authoritarian regimes pledged to programs of military-led development. Drawing on newly declassified archival material, Simpson examines how Americans and Indonesians imagined the country's development in the 1950s and why they abandoned their democratic hopes in the 1960s in favor of Suharto's military regime. Far from viewing development as a path to democracy, this book highlights the evolving commitment of Americans and Indonesians to authoritarianism in the 1960s on.
Obesity is a risk factor for breast cancer in older women. A number of adipose-derived and obesity-related factors have been shown to affect tumour cell growth. These include adipokines, insulin, IGF-1 and oestrogens. The majority of obesity-related postmenopausal breast cancers are oestrogen-dependent. Since the ovaries no longer produce oestrogens after menopause, and that circulating levels are negligible, it is evident that it is the oestrogens produced locally within the breast adipose that are responsible for the increased growth of breast cancer cells. Aromatase is the enzyme that converts androgens into oestrogens and its regulation is dependent on the activity of a number of tissue-specific promoters. Targeting oestrogen biosynthesis in obesity may be useful for the prevention of breast cancer. Aromatase inhibitors are efficacious at treating postmenopausal breast cancer and recent studies suggest that they may also be useful in the prevention setting. However, these compounds inhibit the catalytic activity of aromatase and as a consequence lead to a number of undesirable side-effects, including arthralgia and possible cognitive defects due to inhibition of aromatase in the bone and brain, respectively. Novel therapies, such as those employed to treat obesity-associated disease, including anti-diabetics, may prove successful at inhibiting aromatase specifically within the breast. This SpringerBrief will explore all of these issues in depth and the authors are in a unique position to write about this topic, having extensive experience in the field of aromatase research.
The book explores the intersection of emotions and migration in a number of case studies from across the USA, Europe and Southeast Asia, including the transmigration of female domestic workers, transmigrant marriages, transmigrant workers in the entertainment industry and asylum seekers and refugees who are the victims of domestic violence.
"System level testing is becoming increasingly important. It is driven by the incessant march of complexity ... which is forcing us to renew our thinking on the processes and procedures that we apply to test and diagnosis of systems. In fact, the complexity defines the system itself which, for our purposes, is ?any aggregation of related elements that together form an entity of sufficient complexity for which it is impractical to treat all of the elements at the lowest level of detail . System approaches embody the partitioning of problems into smaller inter-related subsystems that will be solved together. Thus, words like hierarchical, dependence, inference, model, and partitioning are frequent throughout this text. Each of the authors deals with the complexity issue in a similar fashion, but the real value in a collected work such as this is in the subtle differences that may lead to synthesized approaches that allow even more progress. The works included in this volume are an outgrowth of the 2nd International Workshop on System Test and Diagnosis held in Alexandria, Virginia in April 1998. The first such workshop was held in Freiburg, Germany, six years earlier. In the current workshop nearly 50 experts from around the world struggled over issues concerning the subject... In this volume, a select group of workshop participants was invited to provide a chapter that expanded their workshop presentations and incorporated their workshop interactions... While we have attempted to present the work as one volume and requested some revision to the work, the content of the individual chapters was not edited significantly. Consequently, you will see different approaches to solving the same problems and occasional disagreement between authors as to definitions or the importance of factors. ... The works collected in this volume represent the state-of-the-art in system test and diagnosis, and the authors are at the leading edge of that science...". From the Preface
The book explores the intersection of emotions and migration in a number of case studies from across the USA, Europe and Southeast Asia, including the transmigration of female domestic workers, transmigrant marriages, transmigrant workers in the entertainment industry and asylum seekers and refugees who are the victims of domestic violence.
System Test and Diagnosis is the first book on test and diagnosis at the system level, defined as any aggregation of related elements that together form an entity of sufficient complexity for which it is impractical to treat all of the elements at the lowest level of detail. The ideas presented emphasize that it is possible to diagnose complex systems efficiently. Since the notion of system is hierarchical, these ideas are applicable to all levels. The philosophy is presented in the context of a model-based approach, using the information flow model, that focuses on the information provided by the tests rather than the functions embedded in the system. Detailed algorithms are offered for evaluating system testability, performing efficient diagnosis, verifying and validating the models, and constructing an architecture for system maintenance. Several advanced algorithms, not commonly available in existing diagnosis tools, are discussed, including reasoning with inexact or uncertain test data, breaking large problems into manageable smaller problems, diagnosing systems with time sensitive information and time dependent tests and learning from experience. The book is divided into three parts. The first part provides motivation for careful development of the subject and the second part provides the tools necessary for analyzing system testability and computing diagnostic strategies. The third part presents advanced topics in diagnosis. Several case studies are provided, including a single detailed case study. Smaller case studies describe experiences from actual applications of the methods discussed. The detailed case study walks the reader through a complete analysis of a system to illustrate the concepts and describe the analyses that are possible. All case studies are based upon real systems that have been modeled for the purposes of diagnosis. System Test and Diagnosis is the culmination of nearly twelve years of research into diagnosis modeling and its applications. It is designed as a primary reference for engineers and practitioners interested in system test and diagnosis.
This title explores understandings and experiences of 'dirty work' - tasks or occupations that are seen as disgusting and degrading. It complicates the 'clean/dirty' divide in the context of organisations and work and illustrates some of the complex ways in which dirty work identities are managed.
In this comprehensive work, Tyrone R. Simpson, II, explores how six American writers--Anzia Yezierska, Michael Gold, Hubert Selby Jr., Chester Himes, Gloria Naylor, and John Edgar Wideman--have artistically responded to the racialization of U.S. frostbelt cities in the twentieth century. By using the critical tools of spatial theory, critical race theory, urban history, and urban sociology, Simpson accounts for how these writers imagine the subjective response to the race-making power of space.
This book explores how six American writers have artistically responded to the racialization of U.S. frostbelt cities in the twentieth century. Using the critical tools of spatial theory, critical race theory, urban history and sociology, Simpson explains how these writers imagine the subjective response to the race-making power of space.
This book explores understandings and experiences of 'dirty work' - tasks or occupations that are seen as disgusting and degrading. It complicates the 'clean/dirty' divide in the context of organizations and work and illustrates some of the complex ways in which dirty work identities are managed.
In this collection, over 40 researchers across the social sciences offer a series of engaging accounts reflecting on dilemmas and issues that they experienced while researching and communicating research on personal life. Their insights are food for thought for students, researchers, professionals and anyone using, planning or conducting research on families and relationships, encouraging critical reflection on the readers' own processes. Researchers' accounts are organised under and commented on by insightful overviews. David Morgan leads with consideration of framing research. Kay Tisdall prefaces the next set by reflections on ethical considerations in research engagements. Angus Bancroft and Stuart Aitken each comment on researchers' accounts from 'in the field' focusing on the research relationship and the complexities of time and place. The final accounts are prefaced by Lynn Jamieson's discussion of dealing with dilemmas in interpreting and representing families and relationships and by Sarah Morton's and Sandra Nutley's reflections on getting research into policy and practice. |
You may like...
Spring - An Anthology for the Changing…
Melissa Harrison
Paperback
(1)
The Rook 2018 - Citizens of Nowhere
John Doyle, Juan Perez Gonzalez
Paperback
R153
Discovery Miles 1 530
|