हज़ारो वर्ष पूर्व सुरों की कुछ शाखाएँ अपने मूल निवास हिमालय की तराइयों से निकलकर सुदूर पश्चिम में बस गई । धीरे-धीरे वे आज के भारत से लेकर पश्चिम एशिया तक स्थान-स्थान पर फैल गए। नई सभ्यताओं ने जन्म लिया और आवागमन के नए मार्ग स्थापित हुए। विश्व के बड़े भू-भाग पर शासन करने वाले सुरों ने देव की उपाधि धारण कर ली। समय के साथ सुर दो समूहों में विभाजित हो गए। वे, जो सुरों की कठिन सिद्धांतों वाली जीवन-पद्धति से सहमत नहीं थे, उन्होंने असुर नाम अपना लिया। सुरों और असुरों के बीच प्राय: झड़पें होती रहती थीं। पर समुद्री मार्गों की खोज के लिए उन्होंने मिलकर समुद्र-मंथन अभियान चलाया, जो उन्हें आश्चर्यों और रहस्यों के लोक में ले गया। इस रहस्य लोक में उन्हें मिला सोम नामक अमृत, जिस पर अधिकार को लेकर एक बार फिर सुरों और असुरों के मध्य विवाद उत्पन्न हो गया। ' देवों का उदय' प्राचीन कथाओं को लेकर लिखा गया एक उपन्यास है, जिसमें लेखकों ने सहस्त्रों वर्ष पूर्व सुरों और देवों की एक नई उभरती हुई विकसित सभ्यता की कल्पना की है।
Cisco NAC Appliance Enforcing Host Security with Clean Access Authenticate, inspect, remediate, and authorize end-point devices using Cisco NAC Appliance Jamey Heary, CCIE® No. 7680 Contributing authors: Jerry Lin, CCIE No. 6469, Chad Sullivan, CCIE No. 6493, and Alok Agrawal With today's security challenges and threats growing more sophisticated, perimeter defense alone is no longer sufficient. Few organizations are closed entities with well-defined security perimeters, which has led to the creation of perimeterless networks with ubiquitous access. Organizations need to have internal security systems that are more comprehensive, pervasive, and tightly integrated than in the past. Cisco® Network Admission Control (NAC) Appliance, formerly known as Cisco Clean Access, provides a powerful host security policy inspection, enforcement, and remediation solution that is designed to meet these new challenges. Cisco NAC Appliance allows you to enforce host security policies on all hosts (managed and unmanaged) as they enter the interior of the network, regardless of their access method, ownership, device type, application set, or operating system. Cisco NAC Appliance provides proactive protection at the network entry point. Cisco NAC Appliance provides you with all the information needed to understand, design, configure, deploy, and troubleshoot the Cisco NAC Appliance solution. You will learn about all aspects of the NAC Appliance solution including configuration and best practices for design, implementation, troubleshooting, and creating a host security policy. Jamey Heary, CCIE® No. 7680, is a security consulting systems engineer at Cisco, where he works with its largest customers in the northwest United States. Jamey joined Cisco in 2000 and currently leads its Western Security Asset team and is a field advisor for its U.S. Security Virtual team. His areas of expertise include network and host security design and implementation, security regulatory compliance, and routing and switching. His other certifications include CISSP, CCSP®, and Microsoft MCSE. He is also a Certified HIPAA Security Professional. He has been working in the IT field for 13 years and in IT security for 9 years. Understand why network attacks and intellectual property losses can originate from internal network hosts Examine different NAC Appliance design options Build host security policies and assign the appropriate network access privileges for various user roles Streamline the enforcement of existing security policies with the concrete measures NAC Appliance can provide Set up and configure the NAC Appliance solution Learn best practices for the deployment of NAC Appliance Monitor, maintain, and troubleshoot the Cisco NAC Appliance solution This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Cisco Press–Security Covers: End-Point Security
Cisco NAC Appliance Enforcing Host Security with Clean Access Authenticate, inspect, remediate, and authorize end-point devices using Cisco NAC Appliance Jamey Heary, CCIE® No. 7680 Contributing authors: Jerry Lin, CCIE No. 6469, Chad Sullivan, CCIE No. 6493, and Alok Agrawal With today's security challenges and threats growing more sophisticated, perimeter defense alone is no longer sufficient. Few organizations are closed entities with well-defined security perimeters, which has led to the creation of perimeterless networks with ubiquitous access. Organizations need to have internal security systems that are more comprehensive, pervasive, and tightly integrated than in the past. Cisco® Network Admission Control (NAC) Appliance, formerly known as Cisco Clean Access, provides a powerful host security policy inspection, enforcement, and remediation solution that is designed to meet these new challenges. Cisco NAC Appliance allows you to enforce host security policies on all hosts (managed and unmanaged) as they enter the interior of the network, regardless of their access method, ownership, device type, application set, or operating system. Cisco NAC Appliance provides proactive protection at the network entry point. Cisco NAC Appliance provides you with all the information needed to understand, design, configure, deploy, and troubleshoot the Cisco NAC Appliance solution. You will learn about all aspects of the NAC Appliance solution including configuration and best practices for design, implementation, troubleshooting, and creating a host security policy. Jamey Heary, CCIE® No. 7680, is a security consulting systems engineer at Cisco, where he works with its largest customers in the northwest United States. Jamey joined Cisco in 2000 and currently leads its Western Security Asset team and is a field advisor for its U.S. Security Virtual team. His areas of expertise include network and host security design and implementation, security regulatory compliance, and routing and switching. His other certifications include CISSP, CCSP®, and Microsoft MCSE. He is also a Certified HIPAA Security Professional. He has been working in the IT field for 13 years and in IT security for 9 years. Understand why network attacks and intellectual property losses can originate from internal network hosts Examine different NAC Appliance design options Build host security policies and assign the appropriate network access privileges for various user roles Streamline the enforcement of existing security policies with the concrete measures NAC Appliance can provide Set up and configure the NAC Appliance solution Learn best practices for the deployment of NAC Appliance Monitor, maintain, and troubleshoot the Cisco NAC Appliance solution This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Cisco Press–Security Covers: End-Point Security
An excellent book for commerce students appearing in competitive, professional and other examinations. 1.Editing of Collected Data, 2 .Classification and Tabulation of Data., 3. Diagrammatic Presentation of Data, 4. Graphic Presentation of Data, 5. Construction of Frequency Distribution, 6. Measures of Central Tendency, 7. Geometric Mean and Harmonic Mean, 8. Partition Values, 9. Measures of Dispersion, 10. Measures of Skewness, 11. Moments, 12. Measures of Kurtosis, 13. Correlation, Appendix 14. Index Numbers, 15. Analysis of Time Series.
This three-volume work presents a compendium of current and seminal papers on parallel/distributed processing offered at the 22nd International Conference on Parallel Processing, held August 16-20, 1993 in Chicago, Illinois. Topics include processor architectures; mapping algorithms to parallel systems, performance evaluations; fault diagnosis, recovery, and tolerance; cube networks; portable software; synchronization; compilers; hypercube computing; and image processing and graphics. Computer professionals in parallel processing, distributed systems, and software engineering will find this book essential to their complete computer reference library.
Thousands of years ago, various streams of Suras travelled to the west from their land of origin in the foothills of the Himalayas, expanding their footprint from present day india to west Asia. New civilisations flourished, and new land routes were established. As rulers of the world, the Suras assumed the title of the Devas, or the gods. With time, the Suras broke up into two groups. Those not agreeing with the strict life principles of the Suras separated, and assumed the label, the Asuras. They were mostly at loggerheads with the Suras, but came together to discover the sea routes in an expedition known as Samudra-Manthan. The journey revealed an amazing world of mysteries. But quarrels broke out for the possession of a wonder plant called Soma. THE RISE OF THE DEVAS is a concept novel that treats ancient legends from a different perspective.
The International Conference on Advances in Multidisciplinary Research & Applications (ICAMRA-2023) is an esteemed gathering of researchers, academicians, industry professionals, and experts from around the world. This conference serves as a platform for exchanging knowledge, insights, and ideas across various disciplines, fostering interdisciplinary collaboration, and exploring the latest advancements in research and their applications. ICAMRA-2023 will feature a diverse range of topics encompassing multidisciplinary research, interdisciplinary applications, and cutting-edge innovations. Participants will have the opportunity to delve into emerging trends, discuss global perspectives, and contribute to the advancement of knowledge in their respective fields. The conference will cover a wide array of thematic areas, including but not limited to sustainable development, data analytics and artificial intelligence, digital transformation, health and wellness, environmental science and conservation, education and pedagogy, social sciences and humanities, business and economics, engineering and technology, cybersecurity and privacy, big data and cloud computing, medical advancements and healthcare systems, and energy and renewable resources. ICAMRA-2023 aims to provide a conducive environment for networking, collaboration, and intellectual discourse. It offers a platform for researchers, practitioners, and industry professionals to share their research findings, exchange best practices, and explore potential collaborations for addressing real-world challenges. The conference will feature keynote speeches, plenary sessions, panel discussions, paper presentations, and poster sessions, enabling participants to showcase their research and engage in stimulating discussions. Attendees will have the opportunity to gain insights from renowned experts, attend workshops and tutorials, and connect with fellow researchers and professionals from diverse backgrounds.
The Indian National Science Academy was established in January 1935 with the objective of promoting science in India and harnessing scientific knowledge for the cause of humanity and national welfare. In 1968 it was designated as the adhering organisation in India to the International Council for Scientific Union (ICSU) on behalf of the Government of India. Over the years, the Academy has published a number of journals, volumes, biographical memoirs, etc. The year 2009–2010 will be specially celebrated to mark the Platinum Jubilee of the Academy. Many programmes are planned in different centres in India on this occasion. In addition, the Academy has decided to publish a number of special volumes on different s- jects ranging from earth sciences to life sciences. This volume is on Physics and Chemistry of the Earth’s Interior. One of the main objectives of geophysicists is to establish the internal structure of the earth as revealed by seismic tomography. It is also their primary goal to correlate geophy- cal data to reveal thermal and chemical state of the crust, mantle and core of the earth. In - der to interpret seismic velocities and associated density and elastic properties in terms of mineralogical and petrological models of the earth’s interior, thermodynamic and hi- pressure temperature data from mineral physics are essential. With the advent of different types of multi-anvil and laser-heated diamond anvil equipment, it is now possible to simulate conditions prevalent even in the lower mantle and core of the earth.
This thoroughly revised and enlarged edition brings to light the latest developments taking place in the area of Customer Relationship Management (CRM), and focuses on current CRM practices of various service industries. This edition is organised into five parts containing 19 chapters. Part I focuses on making the readers aware of the conceptual and literary developments, and also on the strategic implementation of the concepts. Part II discusses the research aspects of CRM. Part III deals with the applications of information technologies in CRM. Part IV provides the various newer and emerging concepts in CRM. Finally, Part V analyses the CRM applications in various sectors, industries and companies. Primarily intended as a textbook for the students of Management, the book would prove to be an invaluable asset for professionals in service industries. New to This Edition Includes five new chapters, namely Research Techniques and Methods in Customer Relationship Management; Customer Satisfaction; Customer Loyalty; Service Quality; and Service Recovery Management, along with several additions of new text and revisions of the existing text. Provides latest advancements in CRM to keep the students abreast of these developments. Gives as many as 16 Case Studies with critical analysis of different industries to help the readers understand the subject. Covers a number of illustrations to elucidate the concepts discussed. Gives Project Assignment in each chapter.
Stress is the greatest killer of modern times. Almost everyone is affected by it. Some degree of stress is normal, natural and inevitable in personal, family and work life. However, the quantum of stress has a direct impact on happiness in life and excellence in professional field. Being aware and careful about it can save a person from a number of problems and help to make him happy and contended. There are evidences of happier life among people who have an understanding of stress and its possible remedies to keep it at bay. The book “Stress Management” gives an insight into the nature, types and causes of stress and discusses its possible cures and remedies. The sources of stress such as paucity of money or time, age factor, anger, poor communication, burden of studies and making of career have been critically analyzed. It has a complete set of solutions for all categories of stressed people of different age groups and backgrounds. The book is a complete treatise on stress and no aspect of it has been left unattended to. It will surely make the readers stress free and thus enable them to lead a happy and healthy life.
Enables the reader to test an analog circuit that is implemented either in bipolar or MOS technology. Examines the testing and fault diagnosis of analog and analog part of mixed signal circuits. Covers the testing and fault diagnosis of both bipolar and Metal Oxide Semiconductor (MOS) circuits and introduces . Also contains problems that can be used as quiz or homework.
Over the past several years, extensive research has been done on the microbial production of polyunsaturated fatty acids (PUFA). Regardless, research on the oleaginous microalgae used as feedstock for biofuels production and the overall story about the production of nutraceutical fatty acids from oleaginous microalgae has been very limited. This volume provides an exclusive insight on the production of nutraceutical fatty acids from oleaginous microalgae and their role on human health. Some saturated and monounsaturated fatty acids can be synthesized by humans, whereas long-chain polyunsaturated fatty acids (PUFAs) such as α-linolenic acid and linoleic acid cannot and are deemed essential. The products of these acids, such as DHA, which is important for early visual and neurological development, are extremely important to human health. Replacing SFAs with omega-3 and omega-6 fatty acids in the diet reduce the risk of cardiovascular diseases and prevent Alzheimer's, bipolar disorder, and schizophrenia, among other benefits. The ever-rising global demand for omega-3 & 6 PUFAs, however, cannot be met solely by fish oil, due to diminishing fish stocks and pollution of marine ecosystems, which has led to increased interest in alternative sustainable sources. Vegetable oils from genetically engineered plant oilseeds and microorganisms are two potential alternatives to fish oil, even though omega-3 PUFAs are highest in the latter. Although transgenic plants present numerous advantages, their production is dependent on seasonal and climatic conditions and the availability of arable land. Moreover, there are public concerns regarding the cultivation of transgenic crops in open ecosystems. These, together with regulatory issues restrict the large-scale production of genetically modified crops. Microorganisms, however, are known natural producers of microbial oils similar to those obtained from plants and animals and a possible source of nutritionally important omega-3 & 6 PUFAs. This groundbreaking volume presents invaluable new research on essential fatty acids, their production from various oleaginous microorganisms, biochemical and metabolic engineering to improve PUFAs content in oil, extraction and purification of omega 3 fatty acids, and the current market scenario. Whether a veteran engineer or scientist using it as a reference or a professor using it as a textbook, this outstanding new volume is a must-have for any engineer or scientist working in food science.
The Magnesium Technology Symposium, the event on which this collection is based, is one of the largest yearly gatherings of magnesium specialists in the world. Papers represent all aspects of the field, ranging from primary production to applications to recycling. Moreover, papers explore everything from basic research findings to industrialization. Magnesium Technology 2015 covers a broad spectrum of current topics, including alloys and their properties; cast products and processing; wrought products and processing; forming, joining, and machining; corrosion and surface finishing; ecology; and structural applications. In addition, there is coverage of new and emerging applications. The collection includes more than 80 papers.
Design clever algorithms that discover hidden patterns and draw responses from unstructured, unlabeled data. Key FeaturesBuild state-of-the-art algorithms that can solve your business' problemsLearn how to find hidden patterns in your dataRevise key concepts with hands-on exercises using real-world datasetsBook Description Starting with the basics, Applied Unsupervised Learning with R explains clustering methods, distribution analysis, data encoders, and features of R that enable you to understand your data better and get answers to your most pressing business questions. This book begins with the most important and commonly used method for unsupervised learning - clustering - and explains the three main clustering algorithms - k-means, divisive, and agglomerative. Following this, you'll study market basket analysis, kernel density estimation, principal component analysis, and anomaly detection. You'll be introduced to these methods using code written in R, with further instructions on how to work with, edit, and improve R code. To help you gain a practical understanding, the book also features useful tips on applying these methods to real business problems, including market segmentation and fraud detection. By working through interesting activities, you'll explore data encoders and latent variable models. By the end of this book, you will have a better understanding of different anomaly detection methods, such as outlier detection, Mahalanobis distances, and contextual and collective anomaly detection. What you will learnImplement clustering methods such as k-means, agglomerative, and divisiveWrite code in R to analyze market segmentation and consumer behaviorEstimate distribution and probabilities of different outcomesImplement dimension reduction using principal component analysisApply anomaly detection methods to identify fraudDesign algorithms with R and learn how to edit or improve codeWho this book is for Applied Unsupervised Learning with R is designed for business professionals who want to learn about methods to understand their data better, and developers who have an interest in unsupervised learning. Although the book is for beginners, it will be beneficial to have some basic, beginner-level familiarity with R. This includes an understanding of how to open the R console, how to read data, and how to create a loop. To easily understand the concepts of this book, you should also know basic mathematical concepts, including exponents, square roots, means, and medians.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.