|
Showing 1 - 7 of
7 matches in All Departments
For all courses in tourism development planning for both the public
and private sectors. Fundamentals of Planning and Developing
Tourism brings into focus the growing importance of tourism in
developing economies of the world, for social change, alleviating
poverty, and achieving sustained growth. It offers a complete,
organized, and quantifiable methodology for tourism development
planning that reflects economics, marketing, and crucial issues
such as conservation, capacity constraints, and social
acceptability. It covers all steps used for analyzing and planning
tourism development in free market, mixed, and centrally-planned
economies. The text is replete with historical explorations and
examples, including several real life case studies illuminating
both successes and failures in tourism planning and development.
|
Yeti Needs a Haircut (Hardcover)
Angela Halgrimson; Illustrated by Brian Barber; Edited by Lily Coyle
|
R476
R395
Discovery Miles 3 950
Save R81 (17%)
|
Ships in 10 - 15 working days
|
Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical
guide for those preparing for the Linux+ certification exam. The
book begins with a review of important concepts that are needed for
successful operating system installation. These include computer
hardware, environment settings, partitions, and network settings.
The book presents the strategies for creating filesystems;
different types of filesystems; the tools used to create
filesystems; and the tools used to administer filesystems. It
explains the Linux boot process; how to configure system and user
profiles as well as the common environment variables; and how to
use BASH command line interpreter. The remaining chapters discuss
how to install, configure, support, and remove applications; the
configuration of Linux as a workstation and as a server; securing
the Linux system; and common tools for managing a system. Each
chapter includes information on exam objectives, exam warnings, and
the top five toughest questions along with their answers.
Windows 2003 Server is unquestionably the dominant enterprise level
operating system in the industry, with 95% of all companies running
it. And for the last tow years, over 50% of all product upgrades
have been security related. Securing Windows Server, according to
bill gates, is the company's #1 priority.
The book will start off by teaching readers to create the
conceptual design of their Active Directory infrastructure by
gathering and analyzing business and technical requirements. Next,
readers will create the logical design for an Active Directory
infrastructure. Here the book starts to drill deeper and focus on
aspects such as group policy design. Finally, readers will learn to
create the physical design for an active directory and network
Infrastructure including DNS server placement; DC and GC placements
and Flexible Single Master Operations (FSMO) role placement.
The next book in our best selling and critically acclaimed How to
Cheat series. This is the perfect book for users who have already
purchased How to Cheat at Managing Windows 2003 Small Business
Server.
* Active Directory is the market leader in the directory services
space, and 57% of all Microsoft corporate customers have deployed
AD
* Follows Syngress's proven "How To Cheat" methodology
* Companion Web site offers dozens of templates, "Cheat Sheets,"
and checklists for readers
Seven Deadliest Microsoft Attacks explores some of the deadliest
attacks made against Microsoft software and networks and how these
attacks can impact the confidentiality, integrity, and availability
of the most closely guarded company secrets. If you need to keep up
with the latest hacks, attacks, and exploits effecting Microsoft
products, this book is for you. It pinpoints the most dangerous
hacks and exploits specific to Microsoft applications, laying out
the anatomy of these attacks including how to make your system more
secure. You will discover the best ways to defend against these
vicious hacks with step-by-step instruction and learn techniques to
make your computer and network impenetrable. The book consists of
seven chapters that cover the seven deadliest attacks against
Microsoft software and networks: attacks against Windows passwords;
escalation attacks; stored procedure attacks; mail service attacks;
client-side ActiveX and macro attacks; Web service attacks; and
multi-tier attacks. Each chapter provides an overview of a single
Microsoft software product, how it is used, and some of the core
functionality behind the software. Furthermore, each chapter
explores the anatomy of attacks against the software, the dangers
of an attack, and possible defenses to help prevent the attacks
described in the scenarios. This book will be a valuable resource
for those responsible for oversight of network security for either
small or large organizations. It will also benefit those interested
in learning the details behind attacks against Microsoft
infrastructure, products, and services; and how to defend against
them. Network administrators and integrators will find value in
learning how attacks can be executed, and transfer knowledge gained
from this book into improving existing deployment and integration
practices.
|
|