Автор: Puri Dinesh Название: Biochemistry for Dental Students ISBN: 813124444X ISBN-13(EAN): 9788131244449 Издательство: Elsevier India Цена: 3116.00 р. 4451.00-30% Наличие на складе: Есть (1 шт.)
Автор: Puri, Kavita Название: Partition voices ISBN: 1408898985 ISBN-13(EAN): 9781408898987 Издательство: Bloomsbury Рейтинг: Цена: 1484.00 р. Наличие на складе: Поставка под заказ.
In Graphic Migrations, Kavita Daiya provides a literary and cultural archive of refugee stories and experiences to respond to the question “What is created?” after decolonization and the 1947 Partition of India. She explores how stories of Partition migrations shape and influence the political and cultural imagination of secularism and contribute to gendered citizenship for South Asians in India and its diasporas.
Daiya analyzes modern literature, Bollywood films, Margaret Bourke-White’s photography, advertising, and print culture to show how they memorialize or erase refugee experiences. She also uses oral testimonies of Partition refugees from Hong Kong, South Asia, and North America to draw out the tensions of the nation-state, ethnic discrimination, and religious difference. Employing both Critical Refugee Studies and Feminist Postcolonial Studies frameworks, Daiya traces the cultural, affective, and political legacies of Partition migrations.
The precarity generated by modern migration and expressed through public culture prompts a rethinking of how dominant media represents gendered migrants and refugees. Graphic Migrations demands that we redraw the boundaries of how we tell the story of modern world history and the intricately interwoven, intimate production of statelessness and citizenship across the world’s communities.
Автор: Saini Kavita, Khari Manju Название: Handbook of Green Computing and Blockchain Technologies ISBN: 0367620111 ISBN-13(EAN): 9780367620110 Издательство: Taylor&Francis Рейтинг: Цена: 25265.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This handbook provides a computational perspective on Green Computing and Blockchain Technologies. It presents how to not only identify challenges using a practical approach but how to also develop strategies for addressing industry challenges.
Описание: Recent research in science establishes a direct relation between human gut and skin. Several species of live microbes inhabit the human skin and intestines which far outnumbers the mammalian cells in the human body. Research interest of Nextgen scientists is focused on beneficially harnessing this microbial population to address skin disorders like acne, rosacea, eczema, premature aging, and skin cancer which are established to be a result of skin-microbiome dysbiosis. This volume highlights evidence-based endeavours of the scientific community in this sector. Currently there is no concrete literature which gives a detailed vision on the relationship between gut microbiota and skin related disorders. This volume is an attempt to put together available data in the area and demonstrate usefulness of probiotics as a new therapeutic option for management of these skin diseases which currently show poor prognosis, high cost of treatment and compromised quality of life of the patient.
Описание: This book is intended for periodontal residents and practicing periodontists who wish to incorporate the principles of moderate sedation into daily practice. Comprehensive airway management and rescue skills are then documented in detail so that the patient may be properly managed in the event that the sedation progresses beyond the intended level.
Автор: Bhanot, Dr. Kavita Название: Decolonising translation ISBN: 1911284789 ISBN-13(EAN): 9781911284789 Издательство: Неизвестно Рейтинг: Цена: 1901.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: What are the ways in which we can disentangle literary translation from its roots in imperial violence? 21 writers and translators from across the world share their ideas and practices for disrupting and decolonising translation.
Автор: Khanna Kavita, Estrela Vania Vieira, Rodrigues Joel Josй Puga Coelho Название: Cyber Security and Digital Forensics: Proceedings of Iccsdf 2021 ISBN: 9811639604 ISBN-13(EAN): 9789811639609 Издательство: Springer Рейтинг: Цена: 27950.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3-4, 2021.
Описание: Written by subject experts, this book includes MCQs with authentic answers and explanations. Enriched with important synopses, tables and flowcharts, it provides correct explanations and proper references are given of every question.
Автор: Kavita Kane Название: Sarasvatis Gift ISBN: 0143452568 ISBN-13(EAN): 9780143452560 Издательство: Gazelle Book Services Рейтинг: Цена: 2992.00 р. Наличие на складе: Поставка под заказ.
Описание: Sarasvati, the feminine force worshipped as the goddess of learning, is a household name, yet we barely know much about the goddess. She is known as a lost river and seen as a singular goddess, never as part of a couple, such as Shiva-Parvati or Lakshmi-Narayan. In Sarasvatis Gift, Kavita Kane brings to light Sarasvatis story-the goddess of art, music and knowledge-told in the voices of nameless celestials, powerful gods and lesser mortals. The book explores her relationship with her Creator, Brahma, and their unusual marriage-a union of fiercely independent minds and the most non-conforming, unconventional of the Triumvirate couples. As these peripheral figures and silent catalysts take centre stage, we get a glimpse of an extraordinary woman and her remarkable story, obscured and buried under myths and legends.
The book addresses privacy and security issues providing solutions through authentication and authorization mechanisms, blockchain, fog computing, machine learning algorithms, so that machine learning-enabled IoT devices can deliver information concealed in data for fast, computerized responses and enhanced decision-making.
The main objective of this book is to motivate healthcare providers to use telemedicine facilities for monitoring patients in urban and rural areas and gather clinical data for further research. To this end, it provides an overview of the Internet of Healthcare Things (IoHT) and discusses one of the major threats posed by it, which is the data security and data privacy of health records. Another major threat is the combination of numerous devices and protocols, precision time, data overloading, etc. In the IoHT, multiple devices are connected and communicate through certain protocols. Therefore, the application of emerging technologies to mitigate these threats and provide secure data communication over the network is discussed. This book also discusses the integration of machine learning with the IoHT for analyzing huge amounts of data for predicting diseases more accurately. Case studies are also given to verify the concepts presented in the book.
Audience
Researchers and industry engineers in computer science, artificial intelligence, healthcare sector, IT professionals, network administrators, cybersecurity experts.
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently.
Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law.
Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today’s organizations.
On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders’ abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime.
Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru