0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

How To Read Egyptian Hieroglyphs - A step-by-step guide to teach yourself (Hardcover): Mark Collier, Bill Manley, Richard... How To Read Egyptian Hieroglyphs - A step-by-step guide to teach yourself (Hardcover)
Mark Collier, Bill Manley, Richard Parkinson
R412 R381 Discovery Miles 3 810 Save R31 (8%) Ships in 12 - 17 working days
How to Read Egyptian Hieroglyphs (Hardcover, Revised edition): Mark Collier How to Read Egyptian Hieroglyphs (Hardcover, Revised edition)
Mark Collier
R899 Discovery Miles 8 990 Ships in 10 - 15 working days

Hieroglyphs are pictures used as signs in writing. When standing before an ancient tablet in a museum or visiting an Egyptian monument, we marvel at this unique writing and puzzle over its meaning. Now, with the help of Egyptologists Mark Collier and Bill Manley, museum-goers, tourists, and armchair travelers alike can gain a basic knowledge of the language and culture of ancient Egypt.
Collier and Manley's novel approach is informed by years of experience teaching Egyptian hieroglyphs to non-specialists. Using attractive drawings of actual inscriptions displayed in the British Museum, they concentrate on the kind of hieroglyphs readers might encounter in other collections, especially funerary writings and tomb scenes. Each chapter introduces a new aspect of hieroglyphic script or Middle Egyptian grammar and encourages acquisition of reading skills with practical exercises.
The texts offer insights into the daily experiences of their ancient authors and touch on topics ranging from pharaonic administration to family life to the Egyptian way of death. With this book as a guide, one can enjoy a whole new experience in understanding Egyptian art and artifacts around the world.

Procedures, Techniques, Rules...I Wish I Learned in School (Paperback): Mark Collier Procedures, Techniques, Rules...I Wish I Learned in School (Paperback)
Mark Collier; Dorie McClelland, Andrae Ballard
R245 Discovery Miles 2 450 Ships in 10 - 15 working days
The UCL Lahun Papyri (Paperback): Mark Collier, Stephen Quirke The UCL Lahun Papyri (Paperback)
Mark Collier, Stephen Quirke
R3,566 Discovery Miles 35 660 Ships in 10 - 15 working days

This volume completes the presentation of all University College London's Lahun papyri. Over half of the great mass of papyrus fragments retrieved by Petrie from the Middle-Kingdom town-site near al-Lahun (Fayum region) comprises administrative records and the authors have divided the analyses into items for which Petrie-Griffith lot numbers are known, items for which Petrie-Griffith lot numbers are not known, and items of less determinate content not included in other series. The work includes a CD showing colour photographs of the original material.

The UCL Lahun Papyri: Religious Literary Legal Mathematical and Medical (Paperback): Mark Collier, Stephen Quirke The UCL Lahun Papyri: Religious Literary Legal Mathematical and Medical (Paperback)
Mark Collier, Stephen Quirke
R1,788 Discovery Miles 17 880 Ships in 10 - 15 working days

This volume presents transcriptions with transliterations and translations of five broad types of papyri discovered during Petrie's excavations of Lahun. Digital photographs of the papyri are presented on the enclosed CD.

The UCL Lahun Papyri (Paperback): Mark Collier, Stephen Quirke The UCL Lahun Papyri (Paperback)
Mark Collier, Stephen Quirke
R2,282 Discovery Miles 22 820 Ships in 10 - 15 working days

The University College London Lahun (Middle Kingdom) papyri constitute one of the most remarkable harvests of papyri of any age. This volume communicates the content of the surviving letters and letter fragments from the Petrie excavations at Lahun in an accessible and affordable format. The letters and fragments are from original letters: model letters, letter copies, and reports are reserved for future publications. The volume is intended not only for Egyptological researchers, but also for learners in higher and further education. This mass of writing calls for a more nuanced appreciation of the roles of writing and reading, and the social reach of the written culture across the different classes, ages, genders inhabiting this architecture and landscape. (The reader will find three means of access to the original content: Printed pages with transcriptions, transliterations, and translations: A printed index: The entire collection of papyri on an accompanying CD.)

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Paperback, 2nd edition): Mark... Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Paperback, 2nd edition)
Mark Collier, David Endler
R1,641 R1,298 Discovery Miles 12 980 Save R343 (21%) Ships in 10 - 15 working days

The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

"The original edition, "Hacking Exposed: Voice over IP Secrets & Solutions," provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers." --Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious

"Powerful UC hacking secrets revealed within. An outstanding and informative book. "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions" walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security." --Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class

"After reading "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions," I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions" is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold." --J. Oquendo, Lead Security Engineer, E-Fensive Security Strategies

""Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions," includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece." --Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy

"This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them." --Shane Green, Senior Voice Security Analyst

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. "Hacking Exposed Unified Communications & VoIP," Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud, and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video, and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Budget Compact Mirror [Blue]
R9 Discovery Miles 90
Tommee Tippee - Explora Feeding Bowl…
R155 R139 Discovery Miles 1 390
Home Quip Stainless Steel Double Wall…
R181 R155 Discovery Miles 1 550
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Call The Midwife - Season 10
Jenny Agutter, Linda Bassett, … DVD R209 Discovery Miles 2 090
Bestway Focus Goggles (7 yrs+)(3…
 (1)
R35 Discovery Miles 350
Tommy EDC Spray for Men (30ml…
R479 Discovery Miles 4 790

 

Partners