|
Showing 1 - 25 of
217 matches in All Departments
|
In the Mix (Reprint ed.)
Mandy Gonzalez; As told to Sushil Preet K Cheema
|
R227
R199
Discovery Miles 1 990
Save R28 (12%)
|
Ships in 10 - 15 working days
|
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
|
In the Mix (Hardcover)
Mandy Gonzalez; As told to Sushil Preet K Cheema
|
R458
R388
Discovery Miles 3 880
Save R70 (15%)
|
Ships in 10 - 15 working days
|
|
Power Cable Technology
Sushil Kumar Ganguli, Vivek Kohli
|
R1,397
Discovery Miles 13 970
|
Ships in 12 - 17 working days
|
Power Cable Technology provides a precise understanding of the
design, manufacture, installation, and testing of a range of
electric power cables—from low-voltage, 1,000/1,100V cables to
extra-high-voltage, 400kV cables—with reference to future trends
in the industry. The authors’ mantra is: know your cable. Thus,
the book begins with a comprehensive overview of power cable design
and manufacturing through the ages, and then: Describes the
characteristics of the materials currently used in the production
of various power cables Explains how to calculate the die orifice
for drawing wires, how tolerance in manufacturing affects material
weight and consumption, and how and why lubricants are used
Addresses the formation, stranding, and insulation of the
electrical conductors, as well as the sheathing, armouring, and
protective covering of the power cables Delivers an in-depth
discussion of quality systems, quality control, and performance
testing Covers the many nuances of cable installation, including
laying, jointing, and terminating Throughout, the authors emphasise
consonance between design theory and practical application to
ensure production of a quality power cable at a reasonable cost.
They also underscore the importance of careful handling, making
Power Cable Technology a must read for power cable engineers and
technicians alike.
The study of e-adoption focuses on the implementation and use of
the Internet and Internet-based technologies for personal and
business activities. This field has become increasingly relevant
due to the increased reliance upon the Internet among individuals
in both developed and developing countries. E-Adoption and
Socio-Economic Impacts: Emerging Infrastructural Effects identifies
the multidimensional impact of e-adoption and provides theoretical
and practical solutions for policy makers, managers, and
researchers in government, industry, and academia. This publication
unites research on all aspects of e-adoption with the aim of
understanding this phenomenon on both an organizational and
individual level.
This edited book aims to focus on microbial diversity in arid lands
and deserts versus specific microbial assemblages associated with
plants. The book explains ecological drivers that shape this
diversity, how plant-associated microbiomes are selected, and their
biotechnological potential are discussed. Diversity and functional
redundancy of these associated PGPM make them very active in
supporting plant improvement, health and resistance to drought,
salt and other stresses, and these dimensions will be explored in
this book. Implementing proper biotechnological applications of the
arid and desert-adapted PGPM constitutes a sizeable challenge, and
the book attempts to take up that challenge and help researchers in
this field to gain a detailed understanding of PGPM from arid
ecosystems. This book serves as a handbook for research workers,
teachers, postgraduate students and extension personnel, other
development workers, and policy planners engaged in arid zone
development.
This book provides a conceptual 'Flexibility in Resource
Management' framework supported by research/case applications in
various related areas. It links and integrates the flexibility
aspect with resource management to offer a fresh perspective, since
flexibility in different levels of resource management is emerging
as a key concern -- a business enterprise needs to have reactive
flexibility (as adaptiveness and responsiveness) to cope with the
changing and uncertain business environment. It may also endeavor
to intentionally create flexibility by way of leadership change,
re-engineering, innovation in products and processes, use of
information and communication technology, and so on. The selected
papers discussing a variety of issues concerning flexibility in
resource management, are organized into following four parts:
flexibility and innovation; flexibility in organizational
management; operations and technology management; and financial and
risk management. In addition to addressing the organizational needs
of corporate bodies spread across the globe, the book serves as a
useful reference resource for a variety of audiences including
management students, researchers, business managers, consultants
and professional institutes.
This edited volume features a wide spectrum of the latest computer
science research relating to cyber deception. Specifically, it
features work from the areas of artificial intelligence, game
theory, programming languages, graph theory, and more. The work
presented in this book highlights the complex and multi-facted
aspects of cyber deception, identifies the new scientific problems
that will emerge in the domain as a result of the complexity, and
presents novel approaches to these problems. This book can be used
as a text for a graduate-level survey/seminar course on
cutting-edge computer science research relating to cyber-security,
or as a supplemental text for a regular graduate-level course on
cyber-security.
This book covers broad areas in the conservation of microorganisms.
It addresses the short, medium and long-term preservation of
agriculturally important microorganisms, as well as culture
collections and their roles. The respective chapters address topics
such as conventional approaches to bacterial, fungal and algal
preservation, as well as methods and strategies for preserving
recalcitrant microorganisms. Readers will also find the latest
insights into the preservation of vesicular-arbuscular (VA) fungi
and ecology, diversity and conservation of endophytes, and
entamopathogenic fungi. Microbes of animal and dairy origin, their
preservation and biosafety issues are also explored. Microorganisms
are the silent and unseen majority of life on Earth, and are
characterized by a high degree of genetic and metabolic diversity.
It is well documented that no branch of science or society is
unaffected by microbial interventions. Researchers have documented
microorganisms from such extreme and unique environments as deserts
and hydrothermal vents, and with specific traits that are currently
being exploited in agriculture, industry, medicine and
biotechnological applications. Such great potential can only be
found in microorganisms. The aim of this book - the first entirely
devoted to the conservation of microorganisms, and to regulatory
mechanisms for access and benefits sharing as per Biological
Diversity (BD) Act 2002 - is to promote awareness of our world's
microbial wealth, and to introduce readers to strategies and
methodologies for the conservation of microorganisms, which could
ultimately save human life on Earth.
The purpose of Creating Knowledge Based Healthcare Organizations is
to bring together some high quality concepts closely related to how
knowledge management can be utilized in healthcare. It includes the
methodologies, systems, and approaches needed to create and manage
knowledge in various types of healthcare organizations. Futhermore,
it has a global flavour, as we discuss knowledge management
approaches in healthcare organizations throughout the world. For
the first time, it is possible to have so many of the concepts,
tools, and techniques relevant to knowledge management in
healthcare in this one volume so that the reader can understand all
the components required to utilize knowledge.
The Internet has become a new organization tool for innovation,
creativity, and competitiveness of all business, educational, and
governmental services. With the emergence of new social media
networks, organizations are better able to decrease costs and
increase capabilities which continue to change the lifestyles and
businesses. Adoption of Virtual Technologies for Business,
Educational, and Governmental Advancements provides a wide range of
coverage on the adoption of technology and aims to provide a better
understanding of the topics, research, and discoveries in this
significant field. This book aims to cover the emerging issues in
e-adoption for researchers, faculty members, and students in hopes
of contributing to future discoveries.
The advancement of computing and communication technologies have
profoundly accelerated the development and deployment of complex
enterprise systems, creating an importance in its implementation
across corporate and industrial organizations worldwide.""The
Handbook of Research on Enterprise Systems"" addresses the field of
enterprise systems with more breadth and depth than any other
resource, covering progressive technologies, leading theories, and
advanced applications. Comprising over 25 articles from 47 expert
authors from around the globe, this exhaustive collection of highly
developed research extends the field of enterprise systems to offer
libraries an unrivaled reference.This title features: 27
authoritative contributions by over 45 of the world's leading
experts on enterprise systems from 16 countries; comprehensive
coverage of each specific topic, highlighting recent trends and
describing the latest advances in the field; more than 800
references to existing literature and research on enterprise
systems; and, a compendium of over 200 key terms with detailed
definitions. It is organized by topic and indexed, making it a
convenient method of reference for all IT/IS scholars and
professionals. It also features cross-referencing of key terms,
figures, and information pertinent to enterprise systems.
The book is based on practical experience gained during the
planning and execution of e-governance projects in India coupled
with extensive research based on six national/multi-state-level
agriculture related projects. It assesses e-governance projects in
terms of desired project outcomes and analyzes performance from the
viewpoints of three key groups - planners, implementers and
beneficiaries. It highlights six constructs: extent of planning,
comprehensiveness of strategy formulation, effectiveness of
strategy implementation, changing situation, stakeholder competence
levels and flexibility of processes, which are applied to reveal
shortfalls in the existing planning and implementation system for
e-governance projects in India. It also identifies a set of
significant strategic variables influencing performance based on
three independent opinion surveys of stakeholders located across
the country, and uses these variables as the basis of strategic gap
analyses of some major ongoing agriculture related projects.
Furthermore it presents lessons learned from cross-case
quantitative and qualitative analyses in the form of a generalized
strategic framework for improving performance. Offering an overview
of major e-governance projects, it uses several illustrative
examples to address the underlying issues and to support the study
findings and recommendations. It also presents a novel approach of
building strategic alliances across related departments to achieve
effective e-governance. The book will be of interest to the
practitioners in government as well corporates who are engaged in
planning and implementation of e-governance projects spanning
across various layers of government. In Indian context, the
learning issues are likely to trigger appropriate corrective
measures for generating better value from the several flagship
projects envisaged under the Digital India Programme. Further, it
will interest the academic audience working on the strategic
framework and constituting constructs. It will also benefit
business students and application software architectures who aspire
for a consulting career in the area of e-governance.
This edited book provides a conceptual framework of managing
flexibility in the areas of people, process, technology and
business supported by researches/case applications in various types
of flexibilities in business. The book is organized into following
five parts: (i) Managing Flexibility; (ii) People Flexibility;
(iii) Process Flexibility; (iv) Flexibility in Technology and
Innovation Management; and (v) Business Flexibility. Managing
flexibility at the level of people, process, technology and
business encompasses the requirements of both choice and speed. The
need for managing flexibility is growing to cope with the
developments and challenges in the global business environment.
This can be seen from reactive as well as proactive perspectives.
Flexibility is a major dimension of business excellence and deals
with a paradoxical view point such as stability and dynamism,
continuity and change, centralization and decentralization, and so
on. It needs to be managed at the levels of people, process,
technology and various business functions and it is important to
create flexibility at the level of people to create and manage
flexibility in processes and technologies in order to support
flexible business requirements.
While emerging information and internet ubiquitous technologies
provide tremendous positive opportunities, there are still numerous
vulnerabilities associated with technology. Attacks on computer
systems are increasing in sophistication and potential devastation
more than ever before. As such, organizations need to stay abreast
of the latest protective measures and services to prevent cyber
attacks.""The Handbook of Research on Information Security and
Assurance"" offers comprehensive definitions and explanations on
topics such as firewalls, information warfare, encryption
standards, and social and ethical concerns in enterprise security.
Edited by scholars in information science, this reference provides
tools to combat the growing risk associated with technology.
Business intelligence has always been considered an essential
ingredient for success. However, it is not until recently that the
technology has enabled organizations to generate and deploy
intelligence for global competition. These technologies can be
leveraged to create the intelligent enterprises of the 21st century
that will not only provide excellent and customized services to
their customers, but will also create business efficiency for
building relationships with suppliers and other business partners
on a long term basis. Creating such intelligent enterprises
requires the understanding and integration of diverse enterprise
components into cohesive intelligent systems. Anticipating that
future enterprises need to become intelligent, Intelligent
Enterprises of the 21st Century brings together the experiences and
knowledge from many parts of the world to provide a compendium of
high quality theoretical and applied concepts, methodologies, and
techniques that help diffuse knowledge and skills required to
create and manage intelligent enterprises of the 21st century for
gaining sustainable competitive advantage in a global environment.
This book is a comprehensive compilation of the state of the art
vision and thought processes needed to design and manage globally
competitive business organizations.
This book presents a range of cloud computing security challenges
and promising solution paths. The first two chapters focus on
practical considerations of cloud computing. In Chapter 1,
Chandramouli, Iorga, and Chokani describe the evolution of cloud
computing and the current state of practice, followed by the
challenges of cryptographic key management in the cloud. In Chapter
2, Chen and Sion present a dollar cost model of cloud computing and
explore the economic viability of cloud computing with and without
security mechanisms involving cryptographic mechanisms. The next
two chapters address security issues of the cloud infrastructure.
In Chapter 3, Szefer and Lee describe a hardware-enhanced security
architecture that protects the confidentiality and integrity of a
virtual machine's memory from an untrusted or malicious hypervisor.
In Chapter 4, Tsugawa et al. discuss the security issues introduced
when Software-Defined Networking (SDN) is deployed within and
across clouds. Chapters 5-9 focus on the protection of data stored
in the cloud. In Chapter 5, Wang et al. present two storage
isolation schemes that enable cloud users with high security
requirements to verify that their disk storage is isolated from
some or all other users, without any cooperation from cloud service
providers. In Chapter 6, De Capitani di Vimercati, Foresti, and
Samarati describe emerging approaches for protecting data stored
externally and for enforcing fine-grained and selective accesses on
them, and illustrate how the combination of these approaches can
introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia
explore data access challenges in collaborative enterprise
computing environments where multiple parties formulate their own
authorization rules, and discuss the problems of rule consistency,
enforcement, and dynamic updates. In Chapter 8, Smith et al.
address key challenges to the practical realization of a system
that supports query execution over remote encrypted data without
exposing decryption keys or plaintext at the server. In Chapter 9,
Sun et al. provide an overview of secure search techniques over
encrypted data, and then elaborate on a scheme that can achieve
privacy-preserving multi-keyword text search. The next three
chapters focus on the secure deployment of computations to the
cloud. In Chapter 10, Oktay el al. present a risk-based approach
for workload partitioning in hybrid clouds that selectively
outsources data and computation based on their level of
sensitivity. The chapter also describes a vulnerability assessment
framework for cloud computing environments. In Chapter 11, Albanese
et al. present a solution for deploying a mission in the cloud
while minimizing the mission's exposure to known vulnerabilities,
and a cost-effective approach to harden the computational resources
selected to support the mission. In Chapter 12, Kontaxis et al.
describe a system that generates computational decoys to introduce
uncertainty and deceive adversaries as to which data and
computation is legitimate. The last section of the book addresses
issues related to security monitoring and system resilience. In
Chapter 13, Zhou presents a secure, provenance-based capability
that captures dependencies between system states, tracks state
changes over time, and that answers attribution questions about the
existence, or change, of a system's state at a given time. In
Chapter 14, Wu et al. present a monitoring capability for multicore
architectures that runs monitoring threads concurrently with user
or kernel code to constantly check for security violations.
Finally, in Chapter 15, Hasan Cam describes how to manage the risk
and resilience of cyber-physical systems by employing
controllability and observability techniques for linear and
non-linear systems.
The adoption of technology has provided opportunities for increased
participation in global affairs both at an individual and
organizational level. As a discipline, e-adoption focuses on the
requirements, policies, and implications of widespread technology
use in developed and developing countries. E-Adoption and
Technologies for Empowering Developing Countries: Global Advances
reviews the impact technology has had on individuals and
organizations whose access to media and resources is otherwise
limited. With overviews of topics including electronic voting,
electronic delivery systems, social Web applications, and online
educational environments, this reference work provides a foundation
for understanding the interplay between technology and societal
growth and development.
|
Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
|
R5,785
R4,535
Discovery Miles 45 350
Save R1,250 (22%)
|
Ships in 12 - 17 working days
|
These proceedings contain the papers selected for presentation at
the 23rd Inter- tional Information Security Conference (SEC 2008),
co-located with IFIP World Computer Congress (WCC 2008), September
8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143
papers were submitted to the conference. All - pers were evaluated
on the basis of their signi?cance, novelty, and technical quality,
and reviewed by at least three members of the program committee.
Reviewing was blind meaning that the authors were not told which
committee members reviewed which papers. The program committee
meeting was held electronically, holding - tensive discussion over
a period of three weeks. Of the papers submitted, 42 full papers
and 11 short papers were selected for presentation at the
conference. A conference like this just does not happen; it depends
on the volunteer efforts of a host of individuals. There is a long
list of people who volunteered their time and energy to put
together the conference and who deserve acknowledgment. We thank
all members of the program committee and the external reviewers for
their hard work in the paper evaluation. Due to the large number of
submissions, p- gram committee members were required to complete
their reviews in a short time frame. We are especially thankful to
them for the commitment they showed with their active participation
in the electronic discussion
This book explores fundamental scientific problems essential for
autonomous cyber defense. Specific areas include: Game and control
theory-based moving target defenses (MTDs) and adaptive cyber
defenses (ACDs) for fully autonomous cyber operations; The extent
to which autonomous cyber systems can be designed and operated in a
framework that is significantly different from the human-based
systems we now operate; On-line learning algorithms, including deep
recurrent networks and reinforcement learning, for the kinds of
situation awareness and decisions that autonomous cyber systems
will require; Human understanding and control of highly distributed
autonomous cyber defenses; Quantitative performance metrics for the
above so that autonomous cyber defensive agents can reason about
the situation and appropriate responses as well as allowing humans
to assess and improve the autonomous system. This book establishes
scientific foundations for adaptive autonomous cyber systems and
ultimately brings about a more secure and reliable Internet. The
recent advances in adaptive cyber defense (ACD) have developed a
range of new ACD techniques and methodologies for reasoning in an
adaptive environment. Autonomy in physical and cyber systems
promises to revolutionize cyber operations. The ability of
autonomous systems to execute at scales, scopes, and tempos
exceeding those of humans and human-controlled systems will
introduce entirely new types of cyber defense strategies and
tactics, especially in highly contested physical and cyber
environments. The development and automation of cyber strategies
that are responsive to autonomous adversaries pose basic new
technical challenges for cyber-security. This book targets
cyber-security professionals and researchers (industry,
governments, and military). Advanced-level students in computer
science and information systems will also find this book useful as
a secondary textbook.
The field of database security has expanded greatly, with the
rapid development of global inter-networked infrastructure.
Databases are no longer stand-alone systems accessible only to
internal users of organizations. Today, businesses must allow
selective access from different security domains. New data services
emerge every day, bringing complex challenges to those whose job is
to protect data security. The Internet and the web offer means for
collecting and sharing data with unprecedented flexibility and
convenience, presenting threats and challenges of their own. This
book identifies and addresses these new challenges and more,
offering solid advice for practitioners and researchers in
industry.
The Environmental and climatic issues varies from continent to
continent and is unique to Asia. Understanding the issues does need
lot of research and study material which students may not be able
to gather due to shortage of time and resources. Hence an effort is
made by authors gathering there experience and academic input from
renowned universities of world. Climate change is real and coping
with it is major concern in coming days. Most of the books written
and sold in the past need updating and customizing. The general
description of climate change and world will not help the
professionals and students. It needs to seen area wise as a
professional will work in specific geographic area. Hence an effort
is made to collect data from Asia which host most populated
countries along with ecological hot spots.
|
Software Services for e-Business and e-Society - 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009, Proceedings (Hardcover, 2009 ed.)
Claude Godart, Norbert Gronau, Sushil Sharma, Gerome Canals
|
R2,867
Discovery Miles 28 670
|
Ships in 10 - 15 working days
|
I3E 2009 was held in Nancy, France, during September 23-25, hosted
by Nancy University and INRIA Grand-Est at LORIA. The conference
provided scientists andpractitionersofacademia,
industryandgovernmentwithaforumwherethey presented their latest
?ndings concerning application of e-business, e-services and
e-society, and the underlying technology to support these
applications. The 9th IFIP Conference on e-Business, e-Services and
e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in
cooperation with TC11, and TC8 represents the continuation of
previous events held in Zurich (Switzerland) in 2001, Lisbon
(Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France)
in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan
(China) in 2007 and Tokyo (Japan) in 2008. The call for papers
attracted papers from 31 countries from the ?ve con- nents. As a
result, the I3E 2009 programo?ered 12 sessions of full-paper pres-
tations. The 31 selected papers cover a wide and important variety
of issues in e-Business, e-servicesande-society, including
security, trust, andprivacy, ethical and societal issues, business
organization, provision of services as software and software as
services, and others. Extended versions of selected papers
submitted to I3E 2009 will be published in the International
Journal of e-Adoption and in AIS Transactions on Enterprise
Systems. In addition, a 500-euros prize was awarded to the authors
of the best paper selected by the Program Comm- tee. We thank all
authors who submitted their papers, the Program Committee members
and external reviewers for their excellent
|
You may like...
Southern Man
Greg Iles
Paperback
R420
R336
Discovery Miles 3 360
Triangle
Danielle Steel
Paperback
R385
R275
Discovery Miles 2 750
Joy
Danielle Steel
Paperback
R385
R279
Discovery Miles 2 790
|