Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
A double bill of films set in India. Comedy-drama 'The Best Exotic Marigold Hotel' (2011) follows the experiences of a group of elderly Brits who arrive to take up residence in a newly-opened retirement home in Bangalore, India. Despite its glossy publicity campaign, the Marigold turns out to be rather different from the refurbished luxury hotel advertised in the brochures. However, it soon begins to reveal some unexpected charms of its own. Judi Dench, Bill Nighy, Dev Patel, Tom Wilkinson and Maggie Smith star. 'Slumdog Millionaire' (2008), the rags-to-possible riches tale, was the winner of eight Oscars at the 2009 Academy Awards, including Best Film and Best Director. Jamal Malik (Patel) is an 18-year-old street kid from the slums of Mumbai. So what is he doing appearing on the Indian version of 'Who Wants to Be a Millionaire'? How can a young man from his background of poverty have acquired the knowledge to be only one correct answer away from winning 20 million rupees? With only one more question to be asked, however, the dream turns to nightmare. As the hooter sounds to signal the end of the show, Jamal is arrested and accused of cheating. No one can believe that he could really know all of the answers he has given. As Jamal tells the story of his life to the police, the reasons for his success begin to appear. Will Jamal be freed to hear the final question and, if so, will he know the answer?
The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effectively and efficiently, it calls for a better understanding of the ways in which we are ready to embrace this change. Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians.
The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effectively and efficiently, it calls for a better understanding of the ways in which we are ready to embrace this change. Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians.
This book provides in depth knowledge about critical factors involved in the success of pervasive healthcare. The book first presents critical components and importance of pervasive healthcare. The authors then give insight into the pervasive healthcare information systems and key consideration related to remote patient monitoring and safety. The book provides in-depth discussion about the security issues and protocols for pervasive healthcare. This book explores concepts and techniques behind the successive pervasive healthcare systems by providing in-depth knowledge about patient empowerment, remote patient monitoring, network establishment and protocols for effective pervasive healthcare. The book also provides case studies in the field. It is an ideal resource for researchers, students and healthcare organizations to get insight about the state of the art in pervasive healthcare systems. Provides current research, developments, and applications in pervasive healthcare; Includes technologies such as machine learning, cryptography, fog computing, and big data in the advancement of e-healthcare; Pertinent for researchers, students, practitioners and healthcare decision makers.
|
You may like...
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger
Blu-ray disc
(1)
R76 Discovery Miles 760
|