Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 12 of 12 matches in All Departments
This book provides a fresh and contemporary take on the study of men and masculinity. It highlights new and exciting approaches to sexuality, desire, men and masculinity in East Asian contexts, focusing on the interconnections between them. In doing so, it re-examines the key concepts that underpin studies of masculinity, such as homophobia, homosociality and heteronormativity. Developing new ways of thinking about masculinity in local contexts, it fills a significant lacuna in contemporary scholarship. This thought-provoking work will appeal to students and scholars of gender studies, cultural studies and the wider social sciences.
This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students' understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.
Rural-urban migration within China has transformed and reshaped rural people's lives during the past few decades, and has been one of the most visible phenomena of the economic reforms enacted since the late 1970s. Whilst Feminist scholars have addressed rural women's experience of struggle and empowerment in urban China, in contrast, research on rural men's experience of migration is a neglected area of study. In response, this book seeks to address the absence of male migrant workers as a gendered category within the current literature on rural-urban migration. Examining Chinese male migrant workers' identity formation, this book explores their experience of rural-urban migration and their status as an emerging sector of a dislocated urban working class. It seeks to understand issues of gender and class through the rural migrant men's narratives within the context of China's modernization, and provides an in-depth analysis of how these men make sense of their new lives in the rapidly modernizing, post-Mao China with its emphasis on progress and development. Further, this book uses the men's own narratives to challenge the elite assumption that rural men's low status is a result of their failure to adopt a modern urban identity and lifestyle. Drawing on interviews with 28 male rural migrants, Xiaodong Lin unpacks the gender politics of Chinese men and masculinities, and in turn contributes to a greater understanding of global masculinities in an international context. This book will be of great interest to students and scholars working in the fields of Chinese culture and society, gender studies, migration studies, sociology and social anthropology. Shortlisted for this year's BSA Philip Abrams Memorial Prize.
Rural-urban migration within China has transformed and reshaped rural people's lives during the past few decades, and has been one of the most visible phenomena of the economic reforms enacted since the late 1970s. Whilst Feminist scholars have addressed rural women's experience of struggle and empowerment in urban China, in contrast, research on rural men's experience of migration is a neglected area of study. In response, this book seeks to address the absence of male migrant workers as a gendered category within the current literature on rural-urban migration. Examining Chinese male migrant workers' identity formation, this book explores their experience of rural-urban migration and their status as an emerging sector of a dislocated urban working class. It seeks to understand issues of gender and class through the rural migrant men's narratives within the context of China's modernization, and provides an in-depth analysis of how these men make sense of their new lives in the rapidly modernizing, post-Mao China with its emphasis on progress and development. Further, this book uses the men's own narratives to challenge the elite assumption that rural men's low status is a result of their failure to adopt a modern urban identity and lifestyle. Drawing on interviews with 28 male rural migrants, Xiaodong Lin unpacks the gender politics of Chinese men and masculinities, and in turn contributes to a greater understanding of global masculinities in an international context. This book will be of great interest to students and scholars working in the fields of Chinese culture and society, gender studies, migration studies, sociology and social anthropology. Shortlisted for this year's BSA Philip Abrams Memorial Prize.
This book provides a fresh and contemporary take on the study of men and masculinity. It highlights new and exciting approaches to sexuality, desire, men and masculinity in East Asian contexts, focusing on the interconnections between them. In doing so, it re-examines the key concepts that underpin studies of masculinity, such as homophobia, homosociality and heteronormativity. Developing new ways of thinking about masculinity in local contexts, it fills a significant lacuna in contemporary scholarship. This thought-provoking work will appeal to students and scholars of gender studies, cultural studies and the wider social sciences.
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.
This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks.
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014
Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications. The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It examines how network topology impacts data collection and explores Big Data storage and resource management. Addresses the virtual machine placement problem Describes widespread network and information security technologies for Big Data Explores network configuration and flow scheduling for Big Data applications Presents a systematic set of techniques that optimize throughput and improve bandwidth for efficient Big Data transfer on the Internet Tackles the trade-off problem between energy efficiency and service resiliency The book covers distributed Big Data storage and retrieval as well as security, trust, and privacy protection for Big Data collection, storage, and search. It discusses the use of cloud infrastructures and highlights its benefits to overcome the identified issues and to provide new approaches for managing huge volumes of heterogeneous data. The text concludes by proposing an innovative user data profile-aware policy-based network management framework that can help you exploit and differentiate user data profiles to achieve better power efficiency and optimized resource management.
Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications. The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It examines how network topology impacts data collection and explores Big Data storage and resource management. Addresses the virtual machine placement problem Describes widespread network and information security technologies for Big Data Explores network configuration and flow scheduling for Big Data applications Presents a systematic set of techniques that optimize throughput and improve bandwidth for efficient Big Data transfer on the Internet Tackles the trade-off problem between energy efficiency and service resiliency The book covers distributed Big Data storage and retrieval as well as security, trust, and privacy protection for Big Data collection, storage, and search. It discusses the use of cloud infrastructures and highlights its benefits to overcome the identified issues and to provide new approaches for managing huge volumes of heterogeneous data. The text concludes by proposing an innovative user data profile-aware policy-based network management framework that can help you exploit and differentiate user data profiles to achieve better power efficiency and optimized resource management.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
|
You may like...
Scripture and Interpretation - Qumran…
Ariel Feldman, Liora Goldman
Hardcover
R3,102
Discovery Miles 31 020
Ten Mathematical Essays on Approximation…
J. Ferrera, J. Lopez-Gomez, …
Hardcover
R4,728
Discovery Miles 47 280
German Dictionary and Grammar - Two…
Collins Dictionaries
Paperback
(1)
In the Tradition of Thurston - Geometry…
Ken'ichi Ohshika, Athanase Papadopoulos
Hardcover
R3,667
Discovery Miles 36 670
|