Chemical processing industry plays a pivotal role in the economy of a country, as chemicals are required in every sphere of our lives. This book covers chemical processing of dyes, pigments, drugs and pharmaceutical products, fermented products, agrochemicals, explosives, polymers, Period II and III chemicals, chemicals, sugar, coatings, starches, soaps and detergents, paper, pulp, glass, and cement. It includes sources of natural materials, collection process, purification, and extraction of different chemicals from natural materials like petroleum, coal and ores from the Earth. It includes manufacturing details of C1 to C4 and aromatic compounds obtained from natural materials. The book covers both traditional and modern sectors of the chemical processing industry. It provides knowledge on the properties of the chemical and manufacturing process (such as raw materials, chemical reactions, quantitative requirement, flow sheet diagram, procedure) and its uses. The book is based on the author's expertise and has been developed with an awareness of the quantitative requirement for manufacturing chemicals. Data has been collected from industry, thus it will be useful to industry personnel, research groups, academicians and institutional organizations.
“That day I realized I had lost her forever. I had lost her smile, her friendship, her voice… But still, somewhere in my heart, I believed her to be my girlfriend. My mute girlfriend.” Rohan is a telecom professional posted in Meerut and misses his girlfriend from college days, who had stopped interacting with him, without giving any reason. Although she had always stood by his side and her eyes reflected immense love, but she remained his mute girlfriend. The book opens with an SMS from Vaidehi to Rohan, after five long years. But before he could reply, his mobile gets damaged and he wanders in his memories to narrate a story. About how his girlfriend became his mute girlfriend after the first year of their engineering college. My Mute Girlfriend is a true romance story of how Rohan unravels the answers to why Vaidehi was mute for so long, and how their life is about to change. But little do they know that the worst is yet to come.
TOPICS IN THE BOOK Stakeholder Participation and Solid Waste Management in Lira City East Division Environmental and Health Impacts of Crude Oil Exploration in the Niger Delta Comparative Study of Air Quality Assessment in Bonny, Bille and Degema Communities in the Niger Delta Region, Nigeria Socio-economic Importance of Solar Desalination of Local Water Bodies: A Case Study of Uburu and Okposi Lakes, Ebonyi State, Nigeria Exploring Bio Augmentation as a Sustainable Approach for COD Reduction in Palm Oil Refinery Assessment of the Potentials of Theobroma cacao Pod-Feldspar Composite Adsorbent for Heavy Metal Removal in Waste Water
Development economics is about understanding how and why lives change. How Lives Change: Palanpur, India, and Development Economics studies a single village in a crucially important country to illuminate the drivers of these changes, why some people do better or worse than others, and what influences mobility and inequality. How Lives Change draws on seven decades of detailed data collection by a team of dedicated development economists to describe the evolution of Palanpur's economy, its society, and its politics. The emerging story of integration of the village economy with the outside world is placed against the backdrop of a rapidly transforming India and, in turn, helps to understand the transformation. It puts development economics into practice to assess its performance and potential in a unique and powerful way to show how the development of one village since India's independence can be set in the context of the entire country's story. How Lives Change sets out the role of, and scope for, public policy in shaping the lives of individuals. It describes how changes in Palanpur's economy since the late 1950s were initially driven by the advance of agriculture through land reforms, the expansion of irrigation and the introduction of "green revolution" technologies. Since the mid-1980s, newly emerging off-farm opportunities in nearby towns and outside agriculture became the key driver of growth and change, profoundly influencing poverty, income mobility, and inequality in Palanpur. Village institutions are shown to have evolved in subtle but clear ways over time, both shaping and being shaped by economic change. Individual entrepreneurship and initiative is found to play a critical role in driving and responding to the forces of change; and yet, against a backdrop of real economic growth and structural transformation, this book shows that human development outcomes have shown only weak progress and remain stubbornly resistant to change.
Indian Political Thought: Themes and Thinkers covers all major Indian political thinkers from the ancient, through medieval to the modern times. Thus, this book provides an overview of the evolution of the Indian political thought through different historical periods, giving an insight into the sociological and political conditions of the times that shaped the Indian political thinking. It does not only talk about the lives and times of the thinkers, but also explores the important themes that formed the basis of their political ideologies. The chapters discuss the contributions of the thinkers and at the same time examine some important themes including the theory of state, civil rights, ideal polity, governance, nationalism, democracy, social issues like gender and caste, swaraj, satyagraha, liberalism, constitutionalism, Marxism, socialism and Gandhism. With a comprehensive coverage of both the thinkers and the themes of the Indian political thought, this book caters to needs of the undergraduate as well as the post graduate courses of all Indian universities. It is valuable also for UGC-NET and civil service examinations.
There are some questions in life which do not have answers and there are some questions for which answers must not be searched. Amar, a Police Commissioner finds himself in a web of complex questions, which like layers of an onion, reveal another set of questions every time he answers a few. A mystery which becomes more complex at every stage and takes him from Delhi to Kolkota, from Malda to Dalhousie, from the past to the present, from outer life to inner turmoil... In the end, Amar must learn that “there are some questions in life which do not have answers and there are some questions for which answers must not be searched.”
This book enriches the readers with the advances in rock blasting techniques for mining and civil construction rock excavation projects, including the need for and importance of rock blasting, related theories, challenges in rock blasting operations, and rock blasting methodology for excavation of coal and overburden benches of opencast coal mines. It also discusses methods to estimate charge factors and dimensional parameters for different rock types of iron ore mines, blasting methodology for rock strata and the blasting technologies for civil construction projects. The book: Provides comprehensive review of the prediction methodologies of blasting results. Reviews insights into advanced blasting methodologies for rock excavation near sensitive structures. Includes case studies of coal mining, iron ore mining, limestone mining and civil construction projects. Explores the detailed theoretical background of rock blasting. Discusses methodologies of secondary blasting. This book is aimed at graduate students and researchers in mining, geotechnical, and rock engineering.
This book presents the principles and practices of rock blasting for underground hard rock mining. It covers a theoretical background of the rock blasting technology and comprehensive case studies on different stages of rock blasting for underground metalliferous mining. It includes the discussions on burn-cut face blasting pattern, slot raise excavation methodology, and ring blasting methods. It further discusses different practical challenges associated with underground blasting, viz. ore dilution, ground vibration, wall instability, etc., and their possible solutions. The book also covers the recent advancements in methodologies to predict blasting outcomes and instrumentations for monitoring rock blasting operations. The book is a useful reference for rock blasting practitioners, mining engineers, professionals, and researchers. It is also a valuable reference for undergraduate and postgraduate students.
Sukesh, Sanchita, Kapil and Siddhant die and go to Yamlok, where they meet Yamraj. Yamraj gives them one last chance to become alive again, and they can go back to earth, if they win the game: Island Game of Modern Life. The winner will be resurrected to life and could start life from where it ended. What was the game and who wins? What is a modern life? Is it really true that after people die, Yamraj gives one last chance to them to become alive again?
Institutions are norms that undergird organizations and are reflected in laws and practices. Over time, institutions take root and persist as they are path dependent and thus change resistant. Therefore, it is puzzling when institutions change. One such puzzle has been the enactment of the Right to Information (RTI) Act in India in 2005, which brought about institutional change by transforming the 'information regime'. Why did the government upend the norm of secrecy, which had historically been entrenched within the Indian State? This book uses archival material, internal government documents, and interviews to understand the why and how of institutional change. It demonstrates that the institutional change resulted from 'ideas' emerging gradually and incrementally, leading to a 'tipping point'. About the IDSA Series: This series interrogates the interplay between globalization, the state, and social forces in the making and un-making of institutions in South Asia. Why do institutions persist and change? Do we need to transcend materialism and dwell in ideas and culture as well to understand why institutions perform and fail? The first book in the Institutions and Development in South Asia series, this volume studies the historical institutionalism in the information regime in India by presenting an alternative narrative about the evolution of the RTI Act.
Prior to European expansion, communities of the Indian subcontinent had a strong maritime orientation. In this new archaeological study, Himanshu Prabha Ray explores seafaring activity, religious travel and political economy in this ancient period. By using archaeological data from the Red Sea to the Indonesian archipelago, she reveals how the early history of peninsular South Asia is interconnected with that of its Asian and Mediterranean partners in the Indian Ocean Region. The book departs from traditional studies, focusing on the communities maritime history rather than agrarian expansion and the emergence of the state. Rather than being a prime mover in social, economic and religious change, the state is viewed as just one participant in a complex interplay of social actors, including merchants, guilds, boat-builders, sailors, pilgrims, religious clergy and craft-producers. A study that will be welcomed by students of Archaeology and Ancient History, particularly those interested in South Asian Studies.
For most of us in the 21stcentury there is a word every one of us has heard of, the second most popular word after the word SEX is Corona. This book gives you a glimpse of the situation around us the challenges and risks taken by the common man in dealing with Corona and all the associated problems that he would have ever imagined. The reason for writing this book with a humorous touch and convey the message that you yourself do not make the destiny and there are numerous forces involved in keeping your peace at bay. I have made a sincere attempt to capture all that happened around me in a span of 60 days which felt like a life time. I would also thank the government of India for making me sit and wonder for 30 days in forced quarantine which has led to this book reaching to you all. All the incidents I have referred in this book do not pertain to any single individual or organization however they are glimpse of true incidents which occurred around me in a span of 60 days. I would like to thank the member of my family for all the support and encouragement received during the trying times. Kinneers or transgender, LGBT community for coming forward and providing people with masks food and support system. I would also thank the individuals and organizations who fed the stray dogs birds and cats during this time. Last but not the least I would like to also thank Mumbai Police for their efficient administration and control of the situation during the lockdown period.
Treta Yug- Raavan was very proud of himself that, no man on this earth, could defeat him, so even after knowing all this, he did not returned Sita Ji, but he got engaged in a task, that if he really died, then, he should sustain on this earth in one or another way. Dvapar Yug- Battlefield of Kurukshetr, Late evening, 18th day of war. Bheem smashed Duryodhan’s both thighs in the Mace dual. Duryodhan was lying on the ground, his both thigh’s femur bones ruptured and dislocated from pelvis. Ashwathama came and promised Duryodhana, that he will take back Hastinapur Kaliyug- Every Kaithi villager was watching same news, on TV and Mobile on Purali for last one day. The news was devastating, nothing left in the village. For Kaithi people it was like their second home is gone with all relatives, they were in extreme shock and anger. Everyone got some sense, that there is something in Purali which can be danger to us, and this danger is still there, anything can happen to us. No one still got clear picture, whether it a disease which is killing all of us or there is some enemy or a group against us? Whoever it is, how on earth someone can move a mountain to finish a village or is it really Lord Shiv, who is furious on us, if it is Lord Shiv’s wrath then, why Guru Aksi said, War?
Characterization and Treatment of Textile Wastewater covers fundamental knowledge of characterization of textile wastewater and adsorbents; naturally prepared adsorption and coagulation process for removal of COD, BOD and color. This book is intended for everyone actively working on the environment, especially for researchers in textile wastewater, as the problem of disposal of textile influent is worldwide. Potential technical environmental persons like engineers, project managers, consultants, and water analysts will find this book immediately useful for fine-tuning performance and reliability. This book will also be of interest to individuals who want effective knowledge of wastewater, adsorption and coagulation. - Includes definitions of pollutions, sources of wastewater in textile wastewater, various treatment methods, remedial measures and effect of waste - Examines research carried out and in progress worldwide by different researchers - Covers sampling procedures and determination of various parameters of textile wastewater
The Return of the Buddha traces the development of Buddhist archaeology in colonial India, examines its impact on the reconstruction of India’s Buddhist past, and the making of a public and academic discourse around these archaeological discoveries. The book discusses the role of the state and modern Buddhist institutions in the reconstitution of national heritage through promulgation of laws for the protection of Buddhist monuments, acquiring of land around the sites, restoration of edifices, and organization of the display and dissemination of relics. It also highlights the engagement of prominent Indian figures, such as Nehru, Gandhi, Ambedkar, and Tagore, with Buddhist themes in their writings. Stressing upon the lasting legacy of Buddhism in independent India, the author explores the use of Buddhist symbols and imagery in nation-building and the making of the constitution, as also the recent efforts to resurrect Buddhist centers of learning such as Nalanda. With rich archival sources, the book will immensely interest scholars, researchers and students of modern Indian history, culture, archaeology, Buddhist studies, and heritage management.
Silent Reveries is a poignant and heart-wrenching love story that delves into the lives of Saraswat and Meera. Set against a backdrop of longing and unspoken emotions, the novel captures the essence of a love that is as tender as it is tragic. As the story unfolds, the characters navigate the deep waters of love, loss, and heartache, leaving readers to reflect on the fragile nature of relationships and the enduring power of memories. Himanshu Jain, author of The Enigma of Hidden Strength, masterfully weaves a narrative that is both poetic and profound, drawing readers into a world where love blossoms only to be torn apart by the cruel hands of fate. With every page, Silent Reveries evokes emotions of vulnerability, resilience, and the haunting silence that lingers in the spaces between words. Published by VK Wordings Publications, soon to be rebranded as Hybrix Publications, this novel is a must-read for those who appreciate the complexities of human emotions and the beauty of a love that transcends time and space.
Himanshu Joshi (1935-2018) is a renowned storyteller and novelist, actively engaged in writing for nearly sixty years. His notable story collections include "Anttah Tatha Anya Kahaniyan", "Manushya Chinnah Tatha Anya Kahaniyan", "Jalte Hue Daine Tatha Anya Kahaniyan", "Teesra Kinara Tatha Anya Kahaniyan", "Antim Satya Tatha Anya Kahaniyan" and "Sagar Tat Ke Shahar". His major novels include "Mahasagar", "Aranya", "Chhaya Mat Chhuna Man", "Kagaar Ki Aag", "Samay Sakshi Hai", "Tumhare Liye" and "Su-Raj". With his intellectual memoirs, "Uttar-Parv" and "Aathva Sarg," as well as his poetry collection "Neel Nadi Ka Vriksh," he left a significant mark. His travelogues such as "Yatrayein" and "Norway: Suraj Chamke Adhi Raat" received special attention. He also wrote an untold story of the agony in the torture camp of Kala Pani called "Yatna Shivir Mein". His works have been translated and appreciated in various languages apart from all Indian languages, including English, Korean, Norwegian, Italian, Czech, Japanese, Chinese, Burmese, and Nepali. Some of his works were successfully broadcasted and performed through all india Radio and Doordarshan and have also found their place in theatre and cinema. He received numerous national and international honours and awards, adorning his literary career.
This volume focuses on the religious shrine in western India as an institution of cultural integration in the period spanning 200 BCE to 800 CE. It presents an analysis of religious architecture at multiple levels, both temporal and spatial, and distinguishes it as a ritual instrument that integrates individuals and communities into a cultural fabric. The work shows how these structures emphasise on communication with a host of audiences such as the lay worshipper, the ritual specialist, the royalty and the elite as well as the artisan and the sculptor. It also examines religious imagery, inscriptions, traditional lore and Sanskrit literature. The book will be of special interest to researchers and scholars of ancient Indian history, Hinduism, religious studies, architecture and South Asian studies.
This book at hand is an appropriate addition to the field of fractional calculus applied to control systems. If an engineer or a researcher wishes to delve into fractional-order systems, then this book has many collections of such systems to work upon, and this book also tells the reader about how one can convert an integer-order system into an appropriate fractional-order one through an efficient and simple algorithm. If the reader further wants to explore the controller design for the fractional-order systems, then for them, this book provides a variety of controller design strategies. The use of fractional-order derivatives and integrals in control theory leads to better results than integer-order approaches and hence provides solid motivation for further development of control theory. Fractional-order models are more useful than the integer-order models when accuracy is of paramount importance. Real-time experimental validation of controller design strategies for the fractional-order plants is available. This book is beneficial to the academic institutes for postgraduate and advanced research-level that need a specific textbook on fractional control and its applications in srobotic manipulators. The book is also a valuable teaching and learning resource for undergraduate and postgraduate students.
The books deals with the critical issues of climate change and its impact on agriculture and proposes climate smart agriculture as the probable solution to this issue. It discusses the impact of climate change and greenhouse gases emission on agriculture. It covers the strategies and management options of climate smart agriculture by including crop, water, soil, and energy management with examples and case studies. The subject matter has been presented in a very lucid language, containing real-time case studies, questions and few solved problems in specific chapters. The text is further enriched with simple line diagram and figures, chart, flow charts and tables. The book is primarily intended for researchers and professionals in the research areas of environmental science, agriculture, soil science, etc.
This book traces the archaeological trajectory of the expansion of Buddhism and its regional variations in South Asia. Focusing on the multireligious context of the subcontinent in the first millennium BCE, the volume breaks from conventional studies that pose Buddhism as a counter to the Vedic tradition to understanding the religion more integrally in terms of dhamma (teachings of the Buddha), dāna (practice of cultivating generosity) and the engagement with the written word. The work underlines that relic and image worship were important features in the spread of Buddhism in the region and were instrumental in bringing the monastics and the laity together. Further, the author examines the significance of the histories of monastic complexes (viharas, stupas, caityas) and also religious travel and pilgrimage that provided connections across the subcontinent and the seas. An interdisciplinary study, this book will be of great interest to students and scholars in South Asian studies, religion, especially Buddhist studies, history and archaeology.
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with easeConfidently perform networking and application attacks using task-oriented recipesBook Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book’s crisp and task-oriented recipes. What you will learnLearn how to install, set up and customize Kali for pentesting on multiple platformsPentest routers and embedded devicesGet insights into fiddling around with software-defined radioPwn and escalate through a corporate networkWrite good quality security reportsExplore digital forensics and memory analysis with Kali LinuxWho this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed.
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape (English Edition)
Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape (English Edition)
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies KEY FEATURES ● Explore sophisticated methods to network compromises, including establishing persistent access, lateral movement, and privilege escalation. ● Delve into methodologies for ethical hacking across various components, from routers and services to databases and Active Directory. ● Reinforce your skills through hands-on examples, real-world case scenarios, and insights from seasoned penetration testers, ensuring practical and applicable knowledge in every lesson. DESCRIPTION Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise. Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice. This handbook places a strong emphasis on interactive learning, focusing on playing with hashes, tickets, and keys. With its practical approach and expert guidance, this book serves as an invaluable resource, empowering you to confidently master advanced infrastructure attack strategies and bolster your cybersecurity expertise. WHAT WILL YOU LEARN ● Master the intricacies of infrastructure attacks and ethical system compromise techniques. ● Execute external and internal network reconnaissance to collect intelligence and pinpoint potential attack vectors. ● Utilize routers, services, databases, and Active Directory to secure initial access, establish persistence, and enable lateral movement. ● Systematically enumerate Windows and Linux systems, escalating privileges and extracting sensitive data with precision. ● Employ advanced pivoting techniques to traverse internal networks laterally. ● Conduct a thorough assessment of organizational security, showcasing the impact of vulnerabilities, and offering comprehensive remediation strategies. WHO IS THIS BOOK FOR? This book caters to information security professionals, ethical hackers, and penetration testers seeking to enhance their expertise in infrastructure attacks. Ideal for those with a foundational understanding of networking, operating systems, and penetration testing methodologies, it serves as an invaluable resource for individuals aiming to delve into advanced techniques for infrastructure attacks and further solidify their skill set. TABLE OF CONTENTS 1. Introduction to Infrastructure Attacks 2. Initial Reconnaissance and Enumeration 3. Attacking Routers 4. Looking for a Foothold 5. Getting Shells 6. Enumeration On Microsoft Windows 7. Enumeration on Linux 8. Internal Network Reconnaissance 9. Lateral Movement 10. Achieving First-level Pivoting 11. Attacking Databases 12. AD Reconnaissance and Enumeration 13. Path to Domain Admin 14. Playing with Hashes and Tickets Index
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.