Emerging Trends in Decision Sciences and Business Operations, Shrivastava, Avinash K
Автор: Lele Avinash, Frawley David, Ranade Subhash Название: Ayurveda and Marma Therapy: Energy Points in Yogic Healing ISBN: 0940985594 ISBN-13(EAN): 9780940985599 Издательство: Неизвестно Рейтинг: Цена: 3028.00 р. Наличие на складе: Заказано в издательстве.
Описание: Marmas are special Ayurvedic energy points on the body similar to acupuncture points. Through manipulating them we can direct our Prana or vital energy for health, well-being and personal transformation. This book will teach you how to locate the marma points and how to use them.
Автор: Shrivastava Saurabh, Srivastav Neelanjali Название: Solutions Architect`s Handbook ISBN: 1838645640 ISBN-13(EAN): 9781838645649 Издательство: Неизвестно Рейтинг: Цена: 10666.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book will show you how to create robust, scalable, highly available and fault-tolerant solutions by learning different aspects of Solution architecture and next-generation architecture design in the Cloud environment.
This book is motivated by the simple hope that the cloud of the global financial crisis may yet have a silver lining—that political leaders, economists, and management scholars might seize this opportunity to reflect critically on the assumptions, practices, and infrastructures that have precipitated the crisis and to imagine and create new forms of organization that sustainably enhance the well-being of global stakeholders.
The contributors suggest that aesthetic management, high reliability and crisis management, and sustainability science have much to contribute to the resolution of the collapse that we've witnessed, and to providing enduring lessons for how to structure the institutions of the future. Learning From the Global Financial Crisis devotes a section to each of these areas, offering full-length chapters which explore key issues in depth, as well as shorter commentaries that focus on practical considerations. The chapters progress from micro-level issues that pertain to individuals and teams who act creatively; to the meso-level issues that pertain to the structures, practices, and processes; to the macro-level issues that pertain to the interdependent, ecological systems.
Together, the contributions emphasize the importance of developing holistic responses to the financial crisis. The result is a volume that casts new light on traditional economic and managerial theories and policies and provides fresh ideas to a new generation of scholars and practitioners.
Автор: Lorna Stefanick, Meenal Shrivastava Название: Alberta Oil and the Decline of Democracy in Canada ISBN: 1771990295 ISBN-13(EAN): 9781771990295 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 5261.00 р. Наличие на складе: Поставка под заказ.
Описание:
In probing the impact of Alberta’s powerful oil lobby on thehealth of democracy in the province, contributors to the volume engagewith an ongoing discussion of the erosion of political liberalism inthe West. In addition to examining energy policy and issues ofgovernment accountability in Alberta, they explore the ramifications ofoil dependence in areas such as Aboriginal rights, environmentalpolicy, labour law, women’s equity, urban social policy, and thearts. If, as they argue, reliance on oil has weakened democraticstructures in Alberta, then what of Canada as whole, where theshort-term priorities of the oil industry continue to shape federalpolicy?
Автор: Verma Rishabh, Shrivastava Neha Название: .Net Core 2.0 by Example ISBN: 1788395093 ISBN-13(EAN): 9781788395090 Издательство: Неизвестно Цена: 10666.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: With the rise in the number of tools and technologies available today, developers and architects are always exploring ways to create better and smarter solutions. Before, the differences between target platforms was a major roadblock, but that`s not the case now. .NET Core 2.0 By Example will take you on an exciting journey to building better ...
Автор: Shrivastava Manoj Название: Re-Energising Indian Intelligence ISBN: 9382652000 ISBN-13(EAN): 9789382652007 Издательство: Неизвестно Рейтинг: Цена: 11035.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analysed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with s
Автор: Shrivastava V. K. Название: Manthan: Multifaceted Reflections on the Indian Armed Forces ISBN: 9390439043 ISBN-13(EAN): 9789390439041 Издательство: Неизвестно Рейтинг: Цена: 9564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book establishes the relevance of war as an instrument of state policy, and the necessity of armed forces to protect and promote national interests. It then traces India's warring traditions and the enviable professionalism of the Indian armed forces. Reflecting on their post-independence military ventures it analyses why, despite five wars, India's vexed territorial and border disputes have remained unresolved.
Later chapters critically dilate on a range of weighty issues related to the armed forces such as their apolitical nature, India's strategic culture, state of the civil-military relations, absence of a defence policy, ad hoc defence planning et al, and how these have acted as set back forces for the Services. One of the chapters debates the pros and cons of a coup in India and yet another one exhorts the armed forces to introspect. The book closes with a set of assertions that would keep the armed forces ready and relevant to match the national aspirations of rising India.
Автор: Shrivastava Anurag, Deshpande Tanmay Название: Hadoop Blueprints ISBN: 1783980303 ISBN-13(EAN): 9781783980307 Издательство: Неизвестно Рейтинг: Цена: 9378.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Shrivastava Mohith Название: Salesforce Essentials for Administrators ISBN: 1784398071 ISBN-13(EAN): 9781784398071 Издательство: Неизвестно Рейтинг: Цена: 6435.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book is designed to show you how to create robust, scalable, highly available and fault-tolerant solutions by learning different aspects of solution architecture and next-generation architecture design in the cloud environment.
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently.
Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law.
Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today’s organizations.
On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders’ abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime.
Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru