feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • 2020-2024  (43)
  • 2005-2009  (8)
  • Electronic books  (51)
Medientyp
Sprache
Region
Erscheinungszeitraum
Jahr
  • 1
    UID:
    almahu_9949602262502882
    Umfang: 1 online resource (515 pages)
    Ausgabe: 1st ed.
    ISBN: 9781484228968
    Anmerkung: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Weitere Ausg.: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    London :Palgrave Macmillan UK :
    UID:
    almahu_9947918253902882
    Umfang: XLI, 272 p. , online resource.
    ISBN: 9780230594326
    Serie: Finance and Capital Markets Series
    Inhalt: This book addresses key topics relating to international trade; letters of credit mechanism, collections of bills, trade customs and practice. Dealing with complicated implementation issues in a forthright and comprehensive fashion, it is an essential tool for navigating the procedures of international trade finance.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9781349363605
    Sprache: Englisch
    Schlagwort(e): Electronic books
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (Deutschlandweit zugänglich)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9949568770802882
    Umfang: 1 online resource (576 pages)
    Ausgabe: 1st ed.
    ISBN: 9789464632224
    Serie: Atlantis Highlights in Intelligent Systems Series ; v.9
    Anmerkung: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 Review Procedure -- 2 Quality Criteria -- 3 Key Metrics -- Digital Economy Enabling High-Quality Manufacturing Development: Evidence from Chinese Provincial Data -- 1 Introduction -- 2 Theoretical Mechanism and Research Hypothesis -- 2.1 Digital Economy Enables the Direct Mechanism of Action of High-Quality Manufacturing Development -- 2.2 Digital Economy, Innovation Effect and High-Quality Development of Manufacturing -- 2.3 Digital Economy, Efficient Resource Allocation and High-Quality Development of Manufacturing -- 3 Study Design -- 3.1 Model Building -- 3.2 Variable Selection and Data Sources -- 4 Empirical Analysis -- 4.1 Baseline Regression Analysis -- 4.2 Endogeneity Analysis -- 4.3 Subregional Inspection -- 4.4 Mechanism of Action Analysis -- 5 Conclusions -- References -- The Lexicon Construction and Quantitative Research of Digital Economy Policy Texts -- 1 Introduction -- 2 Research Status -- 3 Lexicon Construction of Digital Economic Policy -- 3.1 Data Sources -- 3.2 Neologism Discovery -- 3.3 Comparison of Segmentation Effect -- 4 Classification of Policy Text -- 4.1 Experimental Data -- 4.2 Model and Parameter -- 4.3 Experimental Result -- 5 Analysis of Policy Hotspots -- 5.1 Policy Keywords -- 5.2 Policy Topics -- 6 Conclusion -- References -- Measurement and Evaluation of Provincial Digital Economy Development Efficiency -- 1 Introduction -- 2 Provincial Digital Economy Development Level Measurement -- 2.1 Construction of Indicator System -- 2.2 Data Sources -- 2.3 Analysis of Results -- 3 Analysis of Provincial Digital Economy Output Efficiency -- 3.1 Research Models -- 3.2 Empirical Results and Analysis -- 4 Conclusions and Recommendations -- 4.1 Conclusions -- 4.2 Research Recommendations -- References. , How Digital Transformation of Enterprises Can Improve Labor Productivity: Evidence from Chinese-Listed Companies -- 1 Introduction -- 2 Literature Review and Hypothesis -- 3 Models and Data -- 3.1 Models -- 3.2 Data -- 4 Results and Discussion -- 4.1 Digital Transformation and Labor Productivity -- 4.2 Intermediate Mechanism: Capital Intensity (CI) and Innovation Input (R& -- D) -- 4.3 Heterogeneity Analysis -- 5 Conclusions -- References -- Design of Adaptive Defense System for Marketing Information Management Based on Blockchain Technology -- 1 Introduction -- 2 Application of Blockchain Technology in Marketing Information Management Adaptive Defense System -- 2.1 Blockchain Basics -- 2.2 Blockchain-Related Technologies -- 2.3 Scenarios of Blockchain Technology Application -- 3 Network Security Adaptive Defense Technology -- 3.1 Intrusion Detection -- 3.2 Intrusion Prevention -- 4 Design of Adaptive Defense System for Marketing Information Management -- 4.1 System Architecture -- 4.2 System Function Module -- 5 System Testing -- 5.1 Set up the Network Environment -- 5.2 Verify the Performance Improvement Effect -- 6 Conclusion -- References -- Comparative Study of LSTM and Transformer for A-Share Stock Price Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Stock Price in China -- 2.2 Deep Learning in Stock Prediction -- 3 Methodology -- 3.1 LSTM -- 3.2 Transformer -- 3.3 Evaluation Metrics -- 4 Experiments -- 4.1 Data Selection -- 4.2 Data Pre-processing -- 5 Experiment Result -- 6 Conclusions -- References -- Can Digital Inclusive Finance Improve Business Export Resilience? -- 1 Introduction -- 2 Theoretical Analysis and Hypotheses -- 3 Study Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Setting -- 3.3 Model Construction -- 4 Analysis of Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Correlation Analysis. , 4.3 Analysis of Regression Results -- 4.4 Analysis of the Mechanism of Action -- 4.5 Heterogeneity Analysis -- 5 Robustness Test -- 5.1 Substitution of Explanatory Variables -- 5.2 Change in Estimation Method and Sample Scope -- 5.3 Instrumental Variable Method -- 6 Research Findings and Insights -- References -- Research on Active Firefighting Robot Navigation Based on the Improved AUKF Algorithm -- 1 Introduction -- 2 Multi-source Fusion Localization Method Based on Improved AUKF Algorithm -- 3 Experimental Analysis -- 4 Conclusion -- References -- Analysis and Research on Big Data Storage Technology Based on Machine Learning -- 1 Introduction -- 2 Neural Network Overview -- 3 The Basic Principles and Models of Artificial Neural Networks -- 3.1 The Basic Principle of Neural Network Composition -- 3.2 Structure of Neural Networks -- 4 BP Algorithm -- 4.1 Mathematical Description of BP Algorithm -- 4.2 Shortcomings of BP Algorithm -- 5 Improved Modeling of Neural Network BP Algorithm Using Genetic Algorithm (GA) -- 6 Design of the System -- 6.1 System Composition -- 7 Conclusions -- References -- k-Surrounding Neighbors: Incorporating Serendipity in Collaborative Recommendations -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Evaluation on the MovieLens Dataset -- 4.1 Prediction Accuracy -- 4.2 Intra-list Diversity -- 4.3 Novelty -- 5 Conclusion -- References -- Data Generation and Latent Space Based Feature Transfer Using ED-VAEGAN, an Improved Encoder and Decoder Loss VAEGAN Network -- 1 Introduction -- 2 Methods -- 2.1 VAE'S Reparameterization Trick -- 2.2 Training Theory of GANs -- 2.3 Loss Functions VAE -- 2.4 Loss Functions DCGAN -- 2.5 Loss Functions ED-VAEGAN -- 2.6 Loss Functions f-w VAEGAN -- 2.7 Loss Functions p-w VAEGAN -- 2.8 Latent Space Continuity Quality -- 3 Experiments -- 4 Results and Discussions -- 5 Conclusion. , References -- Digital Investment Risk Evaluation Model of Power Grid Enterprises Based on FAHP-AOA-LSSVM -- 1 Introduction -- 2 Fuzzy Analytic Hierarchy Process -- 2.1 Establish Judgment Matrix -- 2.2 Determine the Membership Function -- 2.3 Single-Factor Evaluation -- 2.4 Determine the Weight Vector -- 2.5 Consistency Test -- 3 AOA's Improved Risk Evaluation Model of LSSVM -- 3.1 Principle of LSSVM Evaluation -- 3.2 AOA Search for Optimal Solutions of LSSVM Parameters -- 4 Construction of Risk Evaluation Index System for Power Grid Digital Investment -- 4.1 Questionnaire Design and Data Sources -- 4.2 Expert Evaluation -- 5 Example Analysis -- 5.1 Determining the Evaluation Value of the Project -- 5.2 Parameter Setting -- 5.3 Analysis of Results -- 6 Conclusion -- References -- Research on Machine Learning Driven Stock Selection Strategy -- 1 Introduction -- 2 Methodology -- 2.1 Research Scheme -- 2.2 Data -- 3 Empirical Analysis -- 3.1 Single Machine Learning Algorithm Performance -- 3.2 Integrated Machine Learning Algorithm Performance -- 4 Important Anomalies of Chinese Stock Market -- 5 Discussion and Conclusion -- 5.1 Discussion -- 5.2 Conclusion -- References -- An Identification Method for High Voltage Power Grid Insulator Based on Mobilenet-SSD Network -- 1 Introduction -- 2 Target Detection Network of Lightweight Mobilenet-SSD -- 2.1 Multi-scale Feature Fusion Target Detection Network -- 2.2 Light Weight Backbone Feature Extraction Network -- 2.3 Fused Network of MobileNet and SSD -- 3 Sample Analysis -- 4 Conclusion -- References -- Insights into the Correlation Between Digital Marketing Effectiveness and the 5A Crowd Assets Model -- 1 Introduction -- 2 Digital Marketing Theory and the Landing of Contemporary e-commerce Data Platforms -- 2.1 Digital Marketing and Consumer Operations. , 2.2 Crowd Assets Model from Traditional to Digital Marketing -- 2.3 Upgrade of Crowd Assets Model-- 5A -- 3 Study Design -- 3.1 Research Background -- 3.2 Correlation Analysis of Seeding with A3 -- 3.3 Correlation Analysis Between A3 and GMV (Gross Merchandise Volume) -- 3.4 K-means Clustering Algorithm -- 4 Research Conclusions and Values -- References -- A Credit Card Default Prediction Method Based on CatBoost -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experiment -- 4.1 Feature Engineering -- 4.2 Training Parameters -- 4.3 Evaluation Metrics -- 4.4 Evaluation Results -- 5 Conclusion -- References -- Prediction of Shanghai Composite Index Based on Macroeconomic Indicators and Artificial Intelligence Method -- 1 Introduction -- 2 Macro-economy and Stock Market Forecast -- 2.1 Macro-economy -- 2.2 Stock Market Forecast -- 3 Neural Network and Support Vector Machine Research -- 3.1 Introduction to Neural Networks -- 3.2 Learning of Neural Networks -- 3.3 Support Vector Machine -- 4 An Empirical Study of Machine Learning Methods in SSE Index Forecasting -- 4.1 Introduction to the Empirical Environment -- 4.2 SSE Index Prediction Based on BP Neural Network -- 4.3 SSE Index Prediction Based on Support Vector Machine -- 5 Conclusion -- References -- Research on the Development Level of Digital Economy Based on Fuzzy Comprehensive Evaluation -- 1 Introduction -- 2 Fuzzy Comprehensive Evaluation of Digital Economy Development in Anhui Province -- 2.1 Indicator System Determination and Weight Calculation -- 2.2 Fuzzy Comprehensive Evaluation -- 2.3 Chapter Summary -- 3 Conclusions -- References -- Factors Influencing Customer Addictive Purchase Behaviours of Toy Blind Boxes -- 1 Introduction -- 2 Research Methods -- 3 Research Design -- 4 Analysis -- 4.1 Qualitative Analysis -- 4.2 Further Analysis -- 5 Discussions -- 6 Conclusion. , References.
    Weitere Ausg.: Print version: Hemachandran, K. Proceedings of the 2023 2nd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2023) Dordrecht : Atlantis Press (Zeger Karssen),c2023 ISBN 9789464632217
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Durham :Duke University Press,
    UID:
    almahu_9949065569902882
    Umfang: 1 online resource (256 p.)
    ISBN: 9781478007197 , 9783110696318
    Inhalt: Amitava Kumar's Every Day I Write the Book is for academic writers what Annie Dillard's The Writing Life and Stephen King's On Writing are for creative writers. Alongside Kumar's interviews with an array of scholars whose distinct writing offers inspiring examples for students and academics alike, the book's pages are full of practical advice about everything from how to write criticism to making use of a kitchen timer. Communication, engagement, honesty: these are the aims and sources of good writing. Storytelling, attention to organization, solid work habits: these are its tools. Kumar's own voice is present in his essays about the writing process and in his perceptive and witty observations on the academic world. A writing manual as well as a manifesto, Every Day I Write the Book will interest and guide aspiring writers everywhere.
    Anmerkung: Frontmatter -- , Contents -- , Introduction. The 90-Day Book -- , Part I. Self-Help -- , Part II. Writing a Book: A Brief History -- , Part III. Credos -- , Part IV. Form -- , Part V. Academic Interest -- , Part VI. Style -- , Part VII. Exercises -- , Part VIII. The Groves of Academe -- , Part IX. Materials -- , Acknowledgments -- , Appendix A. Ten Rules of Writing -- , Appendix B. PEN Ten Interview -- , Notes -- , Index , Mode of access: Internet via World Wide Web. , In English.
    In: DUP Frontlist eBook-Package 2020, De Gruyter, 9783110696318
    In: EBOOK PACKAGE COMPLETE 2020 English, De Gruyter, 9783110704716
    In: EBOOK PACKAGE COMPLETE 2020, De Gruyter, 9783110704518
    In: EBOOK PACKAGE Linguistics 2020 English, De Gruyter, 9783110704761
    In: EBOOK PACKAGE Linguistics 2020, De Gruyter, 9783110704563
    Sprache: Englisch
    Fachgebiete: Allgemeines , Anglistik
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic books
    URL: Cover
    URL: Cover
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    almahu_9949319354502882
    Umfang: 1 online resource (109 pages)
    ISBN: 9781789246063
    Inhalt: The Ganges-Brahmaputra-Meghna deltas has newly emerged 'char' islands, which are very vulnerable, socially, institutionally and environmentally. This book explains how the Governments of Bangladesh and the Netherlands cooperated on a land-based rural development project to give settlers security and purpose.
    Anmerkung: Front Cover -- Title Page -- Copyright -- Contents -- Figures and Tables -- Contributors -- Glossary -- Acknowledgements -- 1. The Coastal Chars of Bangladesh -- 2. The Birth of CDSP-IV -- 3. Managing Char Development and Settlement: A Complex Process -- 4. Involving the Communities and Civil Society -- 5. Role of Women in Development -- 6. Developing the Infrastructure -- 7. The Land Settlement Process -- 8. The Power of Agriculture -- 9. Money Matters - Savings and Loans -- 10. Environmental Improvement with Trees -- 11. Income and Quality of Life -- 12. Our Pride -- 13. When the Project Leaves -- References -- Back Cover.
    Weitere Ausg.: Print version: Jenkins, Andrew New Land, New Life Oxford : CAB International,c2020 ISBN 9781789246049
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Abingdon, Oxon ; : Routledge/Taylor & Francis Group,
    UID:
    almahu_9949383647102882
    Umfang: 1 online resource
    ISBN: 9781351035262 , 1351035266 , 9781351035248 , 135103524X , 9781351035255 , 1351035258 , 9781351035231 , 1351035231
    Serie: Routledge Research on Asian Development ; 6
    Inhalt: "This book assesses the roadmap for the implementation of the SDGs in South Asia, focusing in particular on the areas of poverty reduction, inequality, health/wellbeing and water and sanitation. South Asia is amongst the fastest growing regions in the world, with an aggregate GDP in excess of 2 trillion US dollars, but at the same time it has significant deficits in human development, with 37% of the world's poor and nearly half of the world's malnourished children. For South Asia, the United Nations' sustainable development goals (SDGs) represent a constructive opportunity to end many of the region's deprivations in a time-bound and systematic manner. Starting with the legacy of the Millennium Development Goals, the book goes on to provide a country by country overview of strategies for addressing the problems of poverty, health, water, and sanitation. South-South Cooperation and in particular the South Asian Association for Regional Cooperation (SAARC) are discussed, and finally the editors present a summary of policy priorities for social development. This book aims to be a useful resource for researchers, policy influencers, planners, implementers, students, and activists aiming to push to achieve the SDGs"--
    Anmerkung: Preface : through the looking glass : sustainable development in South Asia / Nitya Khemka and Suraj Kumar -- The Uunfinished MDG agenda and SDGs / Nitya Khemka and Suraj Kumar -- Sustainable development goals in South Asia : progress, challenges and the way forward / Jayati Ghosh -- Sustainable development goals in Bangladesh : promises, prospects and opportunities / Syed Munir Khasru, Avia Nahreen and Marzuka Ahmad Radia -- Where does India stand on the sustainable development goals? : progress and challenges / Anjana Thampi -- Sustainable development goals in Nepal : prospects and challenges / Shrochis Karki and Uma Pradhan -- Sustainable development goals in Pakistan : an analysis / Sahar Asad -- "Leave no woman behind" : goal 5 through the South Asian lens / Vidisha Mishra -- Reporting of South Asian countries on the SDGs at the global level : experiences, challenges and way forward / Nathalie Risse -- Towards a policy agenda for achieving SDGs in South Asia / Nagesh Kumar -- South-South cooperation in South Asia to achieve the sustainable development goals / Shiladitya Chatterjee -- Conclusion : policy priorities for social development / Nitya Khemka and Suraj Kumar.
    Weitere Ausg.: Print version : Social development and the Sustainable Development Goals in South Asia. Abingdon, Oxon ; New York, NY : Routledge/Taylor & Francis Group, 2020 ISBN 9781138490475
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    London ; : Routledge/Taylor & Francis Group,
    UID:
    almahu_9949385887702882
    Umfang: 1 online resource (xvii, 234 pages)
    ISBN: 9781000751048 , 100075104X , 9780367809447 , 0367809443 , 9781000751284 , 1000751287 , 9781000751161 , 1000751163
    Inhalt: "This book develops a critical understanding of Mahatma Gandhi's philosophy and practice in the context of contemporary challenges and engages with some of his key work and ideas. It highlights the relevance of Gandhi's legacy in the quest towards peace-building, equity and global justice. The volume examines diverse facets of Gandhi's holistic view of human life--social, economic and political--for the creation of a just society. Bringing together expert analyses and reflections, the chapters here emphasise the philosophical and practical urgency of Gandhi's thought and action. They explore the significance of his concepts of truth and nonviolence to address moral, spiritual and ethical issues, growing intolerance, conflict and violence, poverty and hunger, and environmental crisis for the present world. The volume serves as a platform for constructive dialoguefor academics, researchers, policymakers and students to re-imagine Gandhi and his moral and political principles. It will be of great interest to those in philosophy, political studies, Gandhi studies, history, cultural studies, peace studies and sociology"--Publisher's description
    Anmerkung: Introduction: understanding Gandhi--why Gandhi matters today -- Part I: Gandhian philosophy. Philosophy and practice: a Gandhi-informed approach -- A conceptual history of Gandhi's Satyagraha -- The scrutinised life: Gandhi and his interlocutors -- Part II: Gandhi and Swaraj. Swaraj in Gandhian perspective: some reflections -- Gandhian Swaraj: a theory of self-knowledge -- The different connotations of Swaraj: envisioning the postcolonial nation in Mahatma Gandhi, Acharya Prafulla Chandra Ray and Rabindranath Tagore -- Part III: Gandhi and social justice. Modernity, colonial injustice and individual responsibility: a study of Gandhi and Ambedkar -- The Ambedkar-Gandhi debate (1931-1956): alternative approaches to memory and identity -- Beyond 'the Doctor and the Saint' controversy: reassessing Gandhi as a social crusader -- Gandhi and the 'race' question -- Part IV: Post-Gandhian legacy: issues and challenges. What can India learn from Gandhi today? -- Waiting for the waves: India Against Corruption movement and the Aam Aadmi Party -- post-Gandhian legacies -- Gandhi's dialogical truth force: applying Satyagraha models of practical rational inquiry to the crises of ecology, global governance and technology -- Gandhi: an apostolic architect of humanism.
    Weitere Ausg.: Print version: Gandhi and the contemporary world. London ; New York : Routledge, Taylor & Francis Group, 2020 ISBN 9781138062382
    Sprache: Englisch
    Schlagwort(e): History. ; Electronic books ; Aufsatzsammlung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Abingdon, Oxon ; : Routledge,
    UID:
    almahu_9949383642202882
    Umfang: 1 online resource (viii, 207 pages)
    ISBN: 0429331606 , 9781000708301 , 1000708306 , 9781000708134 , 1000708136 , 9781000708479 , 1000708470 , 9780429331602
    Inhalt: "This book presents a historical account of the development of an acrolectal variety of the English language in colonial India. It highlights the phenomenon of Indianisation of the English language and its significance in the articulation of the Indian identity in pre-Independence India. This volume also discusses the socio-cultural milieu in which English became the first choice for writers and political leaders. Using examples primarily from the writings of Rammohan Roy, Bankimchandra, Krupabai Satthianadhan and Gandhi and from the speeches of Vivekananda, Tagore and Subhas Bose, this book argues that prose written in English in the nineteenth and the early twentieth century scripted a nationalist discourse through its appropriation of the coloniser's language. It also examines how these works, which absorbed elements of Indian culture and languages, paved the path for the emergence of Indian English as a distinct dialect of the English language. This book will be useful for teachers, scholars and students of English literature, linguistics, and cultural studies. It will also be of use to general readers interested in the history of the English language and the history of modern India"--
    Anmerkung: 1. Introduction -- 2. A Historical Background -- 3. Articles, Letters and a Diary -- 4. Four Works of Fiction -- 5. Speeches Philosophical -- 6. Speeches Political -- 7. Two Letters and a Manifesto -- 8. Conclusion -- Bibliography -- Index.
    Weitere Ausg.: Print version: Auddy, Ranjan Kumar. In search of Indian English New York : Routledge, 2019. ISBN 9780367352714
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Abingdon, Oxon ; : Routledge,
    UID:
    almahu_9949386282002882
    Umfang: 1 online resource : , illustrations, maps
    ISBN: 9781000215519 , 1000215512 , 9781000215496 , 1000215490 , 9781003105718 , 1003105718 , 9781000215502 , 1000215504
    Inhalt: The centrality of the Himalayas as a connecting point or perhaps a sacred core for the Asian continent and its civilisations has captivated every explorer and scholar. The Himalaya is the meeting point of two geotectonic plates, three biogeographical realms, two ancient civilisations, two different language streams and six religions. This book is about the determinant factors which are at work in the Himalayas in the context of what it constitutes in terms of its spatiality, legends and myths, religious beliefs, rituals and traditions. The book suggests that there is no single way for understanding the Himalayas. There are layers of structures, imposition and superimposition of human history, religious traits and beliefs that continue to shape the Asian dynamics. An understanding of the ultimate union of the Himalayas, its confluences and its bridging role is essential for Asian balance. This book is a collaborative effort of an internationally acclaimed linguist, a diplomat-cum-geopolitician and a young Asianist. It provides countless themes that will be intellectually stimulating to scholars and students with varied interests. Please note: This title is co-published with KW Publishers, New Delhi. Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.
    Anmerkung: Originally published: New Delhi: KW Publishers Pvt Ltd., 2016.
    Weitere Ausg.: Print version: ISBN 0367611716
    Weitere Ausg.: ISBN 9780367611712
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    [S.l.] :ROUTLEDGE INDIA,
    UID:
    almahu_9949386531802882
    Umfang: 1 online resource
    ISBN: 9781000214512 , 1000214516 , 9781000214673 , 1000214672 , 9781000214598 , 1000214591 , 9781003105305 , 1003105300
    Inhalt: As the fourth largest military spender in the world, India has a huge defence economy supported by a budget amounting to nearly $67 billion in 2020-21. This book examines how well India's defence economy is managed, through a detailed statistical exposition of five key themes - defence planning, expenditure, arms production, procurement and offsets. This book is based on hard-core evidence collected from multiple government and other credible sources including the ministries of Defence, Finance, and Commerce and Industry, Comptroller and Auditor General of India and the Reserve Bank of India. It discusses key issues such as the evolution of India's defence plan; the feasibility of increasing defence spending; India's defence acquisition system; and the recent reform measures taken under the rubric of the Make in India' initiative. Well supplemented with original tables and figures, India's Defence Economy will be indispensable to students and researchers of defence and security studies, politics and international relations, finance, development studies, economics, strategic studies, South Asian politics, foreign policy and peace studies. It will also be of interest to defence ministry officials, senior armed forces personnel, military attachs, defence training institutes and strategic think tanks.
    Weitere Ausg.: Print version: ISBN 0367564963
    Weitere Ausg.: ISBN 9780367564964
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz