Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 126 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.
Over the past two decades, we have witnessed unprecedented
innovations in the development of miniaturized electromechanical
devices and low-power wireless communication making practical the
embedding of networked computational devices into a rapidly
widening range of material entities.
Comprehensive, contemporary, and engaging, Animal Physiology provides evolutionary and ecological context to help students make connections across all levels of physiological scale. One of the major challenges instructors and students face in Animal Physiology is making connections across levels of biological scale. Animal Physiology addresses this challenge by providing ecological and evolutionary context to the study of physiology at all levels of organization: genome, molecular biology, biochemistry, cells, tissues, organs, and organ systems. Hill's inclusion of ecology and evolution helps readers gain a holistic perspective on animal function and sets Animal Physiology apart from texts that focus more narrowly on physiology. Hill's Animal Physiology is trusted by instructors and students because of its authoritative, current, engaging, and lavishly illustrated presentation.
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.
This account of the Gulf War reveals its importance from a military and political point of view, highlighting how modern military technology made possible, with relative ease, a victory that would have been nearly impossible by traditional means. It has become fashionable to trivialize the impressive military achievements of the Coatition victory over Iraq, but Bin, Hill, and Jones demonstrate that the Gulf War represents a defining moment in military and political history. The text includes numerous firsthand eyewitness accounts. Readers will discover why a multinational coalition deployed 800,000 soldiers to the Middle East to challenge to the Iraqi invasion of Kuwait. They will find out the truth behind political maneuvering by nations involved in the conflict, as well as those on the sidelines, and they will learn the details of the various weapons systems employed. The authors analyze the aftermath of the war and draw important lessons from it. This book provides an authoritative and provocative review of what will surely be remembered as one of the key events of the last half century.
This volume offers a close look at four cases of indigenous language revitalization: Maori in Aotearoa/New Zealand, Saami in Scandinavia, Hnahno in Mexico and Quechua and other indigenous languages in Latin America. Starting from the premise than indigenous language revitalization is worth doing, the authors focus on HOW to do indigenous revitalization, and in particular, the role of schools in that endeavor. Essays by experts from each case are in turn discussed in international perspective by four counterpart experts.
This textbook describes the hands-on application of data science techniques to solve problems in manufacturing and the Industrial Internet of Things (IIoT). Monitoring and managing operational performance is a crucial activity for industrial and business organisations. The emergence of low-cost, accessible computing and storage, through Industrial Digital Technologies (IDT) and Industry 4.0, has generated considerable interest in innovative approaches to doing more with data. Data science, predictive analytics, machine learning, artificial intelligence and general approaches to modelling, simulating and visualising industrial systems have often been considered topics only for research labs and academic departments. This textbook debunks the mystique around applied data science and shows readers, using tutorial-style explanations and real-life case studies, how practitioners can develop their own understanding of performance to achieve tangible business improvements. All exercises can be completed with commonly available tools, many of which are free to install and use. Readers will learn how to use tools to investigate, diagnose, propose and implement analytics solutions that will provide explainable results to deliver digital transformation.
This book provides a clear and thorough account of the process leading up to the revision of the International Telecommunication Regulations (ITRs) one of the four treaties administered by the ITU. The author's inside view of the events and his legal analysis of the new ITRs, are different from that what has been aired in most other accounts to date. His systematic approach shows how much of the criticism of the WCIT-12 process and of the ITRs themselves, is unjustified. This book provides the most accurate view to date of what theITRs really mean and of what really happened at WCIT-12, which was undoubtedly a key event in the history of telecommunication policy and which is likely to have significant long-term effects. The book covers in some detail the events leading to the non-signature of the treaty by a significant number of states, outlines possible consequences of that split between states, and offers possible ways forward. The book includes a detailed article-by-article analysis of the new ITRs, explaining their implications and concludes with recommendations for national authorities. It concludes with an analysis of events from the point of view of dispute resolution theory, offering suggestions for how to avoid divisive outcomes in the future. "This is an excellent book, and quite rich and comprehensive. The topic is important and the book will surely be of interest to regulators, diplomats, policy experts, and all those who participated in WCIT. The author is uniquely qualified to write an analysis of the new ITRs and an account of the Conference. This book will be a good reference for the next Plenipotentiary Conference to be held in 2014 which is going to discuss follow-up to WCIT-12." Naser al-Rashedi, United Arab Emirates. "This is an authoritative expert account of a moment of high significance for vital issues with respect to international networks." Professor Dan Schiller, University of Illinois. "This is an excellent and timely work." Professor Ian Walden, Queen Mary, University of London. "Interested persons, businesses and governments can draw their policies from the assessments of a telecommunications insider as presented in this book. The manifold arguments enlightening the interpretation of the provisions of the ITRs might become an invaluable guidance for those who apply the ITRs in the future." Professor Dr. Rolf H. Weber, University of Zurich."
This book reviews the theoretical concepts, leading-edge techniques and practical tools involved in the latest multi-disciplinary approaches addressing the challenges of big data. Illuminating perspectives from both academia and industry are presented by an international selection of experts in big data science. Topics and features: describes the innovative advances in theoretical aspects of big data, predictive analytics and cloud-based architectures; examines the applications and implementations that utilize big data in cloud architectures; surveys the state of the art in architectural approaches to the provision of cloud-based big data analytics functions; identifies potential research directions and technologies to facilitate the realization of emerging business models through big data approaches; provides relevant theoretical frameworks, empirical research findings, and numerous case studies; discusses real-world applications of algorithms and techniques to address the challenges of big datasets.
A dictionary containing over 1900 biographical notices of Sudanese and foreign persons who died before 1948.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Complete coverage of the basis of cancer and molecular biology - from globally recognized experts The Basic Science of Oncology is an accessible and thorough introduction to cancer causation, cancer biology, and the biology underlying cancer treatment. You'll find everything you need to know about the latest critical thinking in oncology, as well ready to apply information about state-of-the-art science and therapeutic applications. Written by leading oncology researchers and clinicians, this is an essential resource for health professionals, students, advanced undergraduates and graduates in biological sciences, and clinicians needing an understanding of cancer cells. Presented in full-color, The Basic Science of Oncology reflects the latest research and developments in the field. Features NEW chapters: Epigenetics and Principles of Genome Regulation and Targeted Cancer Diagnosis and Treatment Thoroughly revised content, with expanded coverage of key topics such as immune system and immunotherapy, tumor growth and metabolism, vaccine development, methods of molecular analysis, tumor environment, and more The most current, evidence-based oncology primer-one that encapsulates the science of cancer causation, cancer biology, and cancer therapy Key insights into molecular and genetic aspects of cancer familiarize you with cancer biology as applied to prognosis and personalized cancer medicine In-depth focus on the discovery, evaluation, and biology of anti-cancer drugs, immunotherapy, and molecularly-targeted agents Up-to-date coverage of the basic science of radiation therapy
This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings. |
You may like...
We Were Perfect Parents Until We Had…
Vanessa Raphaely, Karin Schimke
Paperback
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
Growing from Seed - An Introduction to…
Celeste Lacuna-Richman
Hardcover
R2,766
Discovery Miles 27 660
|