Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 217 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
The study of e-adoption focuses on the implementation and use of the Internet and Internet-based technologies for personal and business activities. This field has become increasingly relevant due to the increased reliance upon the Internet among individuals in both developed and developing countries. E-Adoption and Socio-Economic Impacts: Emerging Infrastructural Effects identifies the multidimensional impact of e-adoption and provides theoretical and practical solutions for policy makers, managers, and researchers in government, industry, and academia. This publication unites research on all aspects of e-adoption with the aim of understanding this phenomenon on both an organizational and individual level.
This book provides a conceptual 'Flexibility in Resource Management' framework supported by research/case applications in various related areas. It links and integrates the flexibility aspect with resource management to offer a fresh perspective, since flexibility in different levels of resource management is emerging as a key concern -- a business enterprise needs to have reactive flexibility (as adaptiveness and responsiveness) to cope with the changing and uncertain business environment. It may also endeavor to intentionally create flexibility by way of leadership change, re-engineering, innovation in products and processes, use of information and communication technology, and so on. The selected papers discussing a variety of issues concerning flexibility in resource management, are organized into following four parts: flexibility and innovation; flexibility in organizational management; operations and technology management; and financial and risk management. In addition to addressing the organizational needs of corporate bodies spread across the globe, the book serves as a useful reference resource for a variety of audiences including management students, researchers, business managers, consultants and professional institutes.
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.
This book covers broad areas in the conservation of microorganisms. It addresses the short, medium and long-term preservation of agriculturally important microorganisms, as well as culture collections and their roles. The respective chapters address topics such as conventional approaches to bacterial, fungal and algal preservation, as well as methods and strategies for preserving recalcitrant microorganisms. Readers will also find the latest insights into the preservation of vesicular-arbuscular (VA) fungi and ecology, diversity and conservation of endophytes, and entamopathogenic fungi. Microbes of animal and dairy origin, their preservation and biosafety issues are also explored. Microorganisms are the silent and unseen majority of life on Earth, and are characterized by a high degree of genetic and metabolic diversity. It is well documented that no branch of science or society is unaffected by microbial interventions. Researchers have documented microorganisms from such extreme and unique environments as deserts and hydrothermal vents, and with specific traits that are currently being exploited in agriculture, industry, medicine and biotechnological applications. Such great potential can only be found in microorganisms. The aim of this book - the first entirely devoted to the conservation of microorganisms, and to regulatory mechanisms for access and benefits sharing as per Biological Diversity (BD) Act 2002 - is to promote awareness of our world's microbial wealth, and to introduce readers to strategies and methodologies for the conservation of microorganisms, which could ultimately save human life on Earth.
The purpose of Creating Knowledge Based Healthcare Organizations is to bring together some high quality concepts closely related to how knowledge management can be utilized in healthcare. It includes the methodologies, systems, and approaches needed to create and manage knowledge in various types of healthcare organizations. Futhermore, it has a global flavour, as we discuss knowledge management approaches in healthcare organizations throughout the world. For the first time, it is possible to have so many of the concepts, tools, and techniques relevant to knowledge management in healthcare in this one volume so that the reader can understand all the components required to utilize knowledge.
The Internet has become a new organization tool for innovation, creativity, and competitiveness of all business, educational, and governmental services. With the emergence of new social media networks, organizations are better able to decrease costs and increase capabilities which continue to change the lifestyles and businesses. Adoption of Virtual Technologies for Business, Educational, and Governmental Advancements provides a wide range of coverage on the adoption of technology and aims to provide a better understanding of the topics, research, and discoveries in this significant field. This book aims to cover the emerging issues in e-adoption for researchers, faculty members, and students in hopes of contributing to future discoveries.
The advancement of computing and communication technologies have profoundly accelerated the development and deployment of complex enterprise systems, creating an importance in its implementation across corporate and industrial organizations worldwide.""The Handbook of Research on Enterprise Systems"" addresses the field of enterprise systems with more breadth and depth than any other resource, covering progressive technologies, leading theories, and advanced applications. Comprising over 25 articles from 47 expert authors from around the globe, this exhaustive collection of highly developed research extends the field of enterprise systems to offer libraries an unrivaled reference.This title features: 27 authoritative contributions by over 45 of the world's leading experts on enterprise systems from 16 countries; comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances in the field; more than 800 references to existing literature and research on enterprise systems; and, a compendium of over 200 key terms with detailed definitions. It is organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals. It also features cross-referencing of key terms, figures, and information pertinent to enterprise systems.
The book is based on practical experience gained during the planning and execution of e-governance projects in India coupled with extensive research based on six national/multi-state-level agriculture related projects. It assesses e-governance projects in terms of desired project outcomes and analyzes performance from the viewpoints of three key groups - planners, implementers and beneficiaries. It highlights six constructs: extent of planning, comprehensiveness of strategy formulation, effectiveness of strategy implementation, changing situation, stakeholder competence levels and flexibility of processes, which are applied to reveal shortfalls in the existing planning and implementation system for e-governance projects in India. It also identifies a set of significant strategic variables influencing performance based on three independent opinion surveys of stakeholders located across the country, and uses these variables as the basis of strategic gap analyses of some major ongoing agriculture related projects. Furthermore it presents lessons learned from cross-case quantitative and qualitative analyses in the form of a generalized strategic framework for improving performance. Offering an overview of major e-governance projects, it uses several illustrative examples to address the underlying issues and to support the study findings and recommendations. It also presents a novel approach of building strategic alliances across related departments to achieve effective e-governance. The book will be of interest to the practitioners in government as well corporates who are engaged in planning and implementation of e-governance projects spanning across various layers of government. In Indian context, the learning issues are likely to trigger appropriate corrective measures for generating better value from the several flagship projects envisaged under the Digital India Programme. Further, it will interest the academic audience working on the strategic framework and constituting constructs. It will also benefit business students and application software architectures who aspire for a consulting career in the area of e-governance.
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.""The Handbook of Research on Information Security and Assurance"" offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by scholars in information science, this reference provides tools to combat the growing risk associated with technology.
This edited book provides a conceptual framework of managing flexibility in the areas of people, process, technology and business supported by researches/case applications in various types of flexibilities in business. The book is organized into following five parts: (i) Managing Flexibility; (ii) People Flexibility; (iii) Process Flexibility; (iv) Flexibility in Technology and Innovation Management; and (v) Business Flexibility. Managing flexibility at the level of people, process, technology and business encompasses the requirements of both choice and speed. The need for managing flexibility is growing to cope with the developments and challenges in the global business environment. This can be seen from reactive as well as proactive perspectives. Flexibility is a major dimension of business excellence and deals with a paradoxical view point such as stability and dynamism, continuity and change, centralization and decentralization, and so on. It needs to be managed at the levels of people, process, technology and various business functions and it is important to create flexibility at the level of people to create and manage flexibility in processes and technologies in order to support flexible business requirements.
Business intelligence has always been considered an essential ingredient for success. However, it is not until recently that the technology has enabled organizations to generate and deploy intelligence for global competition. These technologies can be leveraged to create the intelligent enterprises of the 21st century that will not only provide excellent and customized services to their customers, but will also create business efficiency for building relationships with suppliers and other business partners on a long term basis. Creating such intelligent enterprises requires the understanding and integration of diverse enterprise components into cohesive intelligent systems. Anticipating that future enterprises need to become intelligent, Intelligent Enterprises of the 21st Century brings together the experiences and knowledge from many parts of the world to provide a compendium of high quality theoretical and applied concepts, methodologies, and techniques that help diffuse knowledge and skills required to create and manage intelligent enterprises of the 21st century for gaining sustainable competitive advantage in a global environment. This book is a comprehensive compilation of the state of the art vision and thought processes needed to design and manage globally competitive business organizations.
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine's memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission's exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system's state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.
The adoption of technology has provided opportunities for increased participation in global affairs both at an individual and organizational level. As a discipline, e-adoption focuses on the requirements, policies, and implications of widespread technology use in developed and developing countries. E-Adoption and Technologies for Empowering Developing Countries: Global Advances reviews the impact technology has had on individuals and organizations whose access to media and resources is otherwise limited. With overviews of topics including electronic voting, electronic delivery systems, social Web applications, and online educational environments, this reference work provides a foundation for understanding the interplay between technology and societal growth and development.
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion
This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.
The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New data services emerge every day, bringing complex challenges to those whose job is to protect data security. The Internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience, presenting threats and challenges of their own. This book identifies and addresses these new challenges and more, offering solid advice for practitioners and researchers in industry.
The Environmental and climatic issues varies from continent to continent and is unique to Asia. Understanding the issues does need lot of research and study material which students may not be able to gather due to shortage of time and resources. Hence an effort is made by authors gathering there experience and academic input from renowned universities of world. Climate change is real and coping with it is major concern in coming days. Most of the books written and sold in the past need updating and customizing. The general description of climate change and world will not help the professionals and students. It needs to seen area wise as a professional will work in specific geographic area. Hence an effort is made to collect data from Asia which host most populated countries along with ecological hot spots.
I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent
The need for enterprise flexibility in an era of rapidly advancing technology, increasing competition, and globalization, is apparent. Flexibility can be thought of as an ability of the enterprise to quickly and efficiently respond to market changes and to bring new products and services quickly to the market place. Beyond this definition, a truly flexible enterprise should proactively change the market through its ability to create new and innovative products and services. The proposed book is intended to provide a conceptual framework of Flexible Enterprise supported by researches/case applications in various types of flexibilities exhibited by a flexible enterprise. The selected papers from a variety of issues concerning the planning and operation of a flexible enterprise are organized into following four parts: I Enterprise and Strategic Flexibility II Organizational Flexibility III Business Process and Information Systems Flexibility IV Operations Flexibility "
This book provides a conceptual framework for systemic flexibility and business agility, drawing on a basis of research/case applications in various types of flexibility and agility in business. The selected papers address a variety of issues concerning the theme of systemic flexibility and business agility and are organized into following five parts: (i) Systemic and Strategic Flexibility; (ii) Information and Business Agility; (iii) Flexibility, Innovation and Business Excellence; (iv) Flexibility in Value and Supply Chains; and(v) Financial Flexibility and Mergers & Acquisitions. Flexibility and agility in business are emerging as key dimensions of business excellence that encompass the requirements of both choice and speed. The two concepts, flexibility and agility, have been used in multiple ways and often interchangeably, both in literature and in practice. The growing need for flexibility/agility in business can be seen from reactive as well as proactive perspectives. A business enterprise is expected to possess reactive flexibility/ agility (as adaptability and responsiveness) in order to cope with the changing and uncertain business environment. It may also endeavor to intentionally generate flexibility/agility as a strategic change in a variety of ways, such as leadership change, reengineering, innovation in products and processes, use of information and communication technology, and learning orientation. |
You may like...
|