0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 27 matches in All Departments

Deposit Insurance (Hardcover): A Campbell, J. La Brosse, D. Mayes, D. Singh, John Raymond La Brosse Deposit Insurance (Hardcover)
A Campbell, J. La Brosse, D. Mayes, D. Singh, John Raymond La Brosse
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

Deposit insurance has risen rapidly over the last few years across the world. It was brought into renewed prominence with the reform of the system in the United States in the 1980s after the Savings and Loans crisis, and was accelerated by the rash of financial crises that have struck Europe, Asia and South America in recent years. The contributions to this volume strike a fascinating balance between the interest of regulators, the view of academics as to how the issues should be handled, and the interests of banks and their depositors.

Economics Of The Family And Farming Systems In Sub-saharan Africa - Development Perspectives (Hardcover): Ram D Singh Economics Of The Family And Farming Systems In Sub-saharan Africa - Development Perspectives (Hardcover)
Ram D Singh
R3,887 Discovery Miles 38 870 Ships in 12 - 17 working days

This book presents an integrated analysis of the dynamics of the economics of households and farm production in the setting of a polygynous family structure and traditional agriculture in sub-Saharan rural Africa. It focuses on some basic facts about poverty among the farm people of rural Africa.

Grace in Dying - A Message of Hope, Comfort and Spiritual Transformation (Paperback, 1st ed): Kathleen D Singh Grace in Dying - A Message of Hope, Comfort and Spiritual Transformation (Paperback, 1st ed)
Kathleen D Singh
R424 R357 Discovery Miles 3 570 Save R67 (16%) Ships in 10 - 15 working days

Clinical Ophthalmic Oncology - Orbital Tumors (Hardcover, 2nd ed. 2014): Julian D. Perry, Arun D. Singh Clinical Ophthalmic Oncology - Orbital Tumors (Hardcover, 2nd ed. 2014)
Julian D. Perry, Arun D. Singh
R4,265 Discovery Miles 42 650 Ships in 10 - 15 working days

Written by internationally renowned experts, Clinical Ophthalmic Oncology provides practical guidance and advice on the diagnosis and management of the complete range of ocular cancers. The book supplies all of the state-of-the-art knowledge required in order to identify these cancers early and to treat them as effectively as possible. Using the information provided, readers will be able to provide effective patient care using the latest knowledge on all aspects of ophthalmic oncology, to verify diagnostic conclusions based on comparison with numerous full-color clinical photographs, and to locate required information quickly owing to the clinically focused and user-friendly format. This volume describes the classification, differential diagnosis, and imaging of orbital tumors and discusses the most suitable treatment options for different tumor types. "

Functional Analysis and Operator Theory - Proceedings of a Conference held in Memory of U.N.Singh, New Delhi, India, 2-6... Functional Analysis and Operator Theory - Proceedings of a Conference held in Memory of U.N.Singh, New Delhi, India, 2-6 August, 1990 (Paperback, 1992 ed.)
B.S. Yadav, D. Singh
R1,307 Discovery Miles 13 070 Ships in 10 - 15 working days

From the Contents: A. Lambert: Weighted shifts and composition operators on L2; - A.S.Cavaretta/A.Sharma: Variation diminishing properties and convexityfor the tensor product Bernstein operator; - B.P. Duggal: A note on generalised commutativity theorems in the Schatten norm; - B.S.Yadav/D.Singh/S.Agrawal: De Branges Modules in H2(Ck) of the torus; - D. Sarason: Weak compactness of holomorphic composition operators on H1; - H.Helson/J.E.McCarthy: Continuity of seminorms; - J.A. Siddiqui: Maximal ideals in local Carleman algebras; - J.G. Klunie: Convergence of polynomials with restricted zeros; - J.P. Kahane: On a theorem of Polya; - U.N. Singh: The Carleman-Fourier transform and its applications; - W. Zelasko: Extending seminorms in locally pseudoconvex algebras;

Mechanical Properties and Performance of Engineering Ceramics and Composites VII - Ceramic Engineering and Science Proceedings,... Mechanical Properties and Performance of Engineering Ceramics and Composites VII - Ceramic Engineering and Science Proceedings, V33 Issue 2 (Hardcover, Volume 33, Issue 2)
D. Singh
R2,083 Discovery Miles 20 830 Ships in 12 - 17 working days

This collection of 33 papers deals with mechanical behaviors associated with systems ranging from diamond reinforced silicon carbide to rare earth pyrosilicates. Presented at The Mechanical Behavior and Performance of Ceramics & Composites Symposium in January 2012 during the 36th International Conference on Advanced Ceramics and Composites (ICACC), it offers researchers from around the world the opportunity to explore new and emerging issues in all aspects of the field.

The Singing Guru - Legends and Adventures of Guru Nanak, the First Sikh (Hardcover): Kamla K. Kapur The Singing Guru - Legends and Adventures of Guru Nanak, the First Sikh (Hardcover)
Kamla K. Kapur; Foreword by Nikky-Guninder Kaur Ph.D. Singh
R555 R516 Discovery Miles 5 160 Save R39 (7%) Ships in 12 - 17 working days
Mechanical Properties and Performance of Engineeri ng Ceramics and Composites VIII - Ceramic Engineer ing and Science... Mechanical Properties and Performance of Engineeri ng Ceramics and Composites VIII - Ceramic Engineer ing and Science Proceedings, Volume 34 Issue 2 (Hardcover, Volume 34, Issue 2)
D. Singh
R2,048 Discovery Miles 20 480 Ships in 12 - 17 working days

Ceramic Engineering and Science Proceedings Volume 34, Issue 2 - Mechanical Properties and Performance of Engineering Ceramics and Composites VIII A collection of 21 papers from The American Ceramic Society's 37th International Conference on Advanced Ceramics and Composites, held in Daytona Beach, Florida, January 27-February 1, 2013. This issue includes papers presented in Symposium 1 - Mechanical Behavior and Performance of Ceramics and Composites.

Mechanical Properties and Performance of Engineering Ceramics and Composites VI - Ceramic Engineering and Science Proceedings... Mechanical Properties and Performance of Engineering Ceramics and Composites VI - Ceramic Engineering and Science Proceedings V32 Issue 2 (Hardcover, Volume 32, Issue 2)
D. Singh
R2,133 Discovery Miles 21 330 Ships in 12 - 17 working days

This book is a collection of papers from The American Ceramic Society's 35th International Conference on Advanced Ceramics and Composites, held in Daytona Beach, Florida, January 23-28, 2011. This issue includes papers presented in the Mechanical Behavior and Performance of Ceramics & Composites Symposium on topics such as processing-microstructure properties correlations; fracture mechanics, modeling and testing; tribological properties; applications; and processing.

Proceedings of the 12th Pacific Rim Conference on Ceramic and Glass Technology; Ceramic Transactions , Volume 264 (Hardcover):... Proceedings of the 12th Pacific Rim Conference on Ceramic and Glass Technology; Ceramic Transactions , Volume 264 (Hardcover)
D. Singh
R5,522 Discovery Miles 55 220 Ships in 12 - 17 working days

Ceramic Transactions, Volume 264, Proceedings of the 12th Pacific Rim Conference on Ceramic and Glass Technology Dileep Singh, Manabu Fukushima, Young-Wook Kim, Kiyoshi Shimamura, Nobuhito Imanaka, Tatsuki Ohji, Jake Amoroso, and Michael Lanagan; Editors This proceedings contains a collection of 32 papers presented at the 12th Pacific Rim Conference on Ceramic and Glass Technology (PacRim12), May 21-26, 2017 in Waikoloa, Hawaii. PacRim is a bi-annual conference held in collaboration with the ceramic societies of the Pacific Rim countries - The American Ceramic Society, The Chinese Ceramic Society, The Korean Ceramic Society, and the Australian Ceramic Society. Topics included in this collection include multiscale modeling and simulation, processing and manufacturing, nanotechnology, multifunctional materials, ceramics for energy and the environment, biomedical materials, and more

Design, Development, and Applications of Structural Ceramics, Composites, and Nanomaterials , Ceramic Transactions Volume 244... Design, Development, and Applications of Structural Ceramics, Composites, and Nanomaterials , Ceramic Transactions Volume 244 (Hardcover)
D. Singh
R3,113 Discovery Miles 31 130 Ships in 12 - 17 working days

Contains a collection of papers from the below symposia held during the 10th Pacific Rim Conference on Ceramic and Glass Technology (PacRim10), June 2-7, 2013, in Coronado, California 2012: * Engineering Ceramics and Ceramic Matrix Composites: Design, Development, and Application * Advanced Ceramic Coatings: Processing, Properties, and Application * Geopolymers Low Energy, Environmentally Friendly, Inorganic Polymeric Ceramic * Multifunctional Metal Oxide Nanostructures and Heteroarchitectures for Energy and Device Application * Advanced Characterization and Modeling of Ceramic Interfaces

Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful... Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
R1,067 Discovery Miles 10 670 Ships in 10 - 15 working days

Use real-world reconnaissance techniques to efficiently gather sensitive information on systems and networks Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn how adversaries use reconnaissance techniques to discover security vulnerabilities on systems Develop advanced open source intelligence capabilities to find sensitive information Explore automated reconnaissance and vulnerability assessment tools to profile systems and networks Book DescriptionThis book explores reconnaissance techniques – the first step in discovering security vulnerabilities and exposed network infrastructure. It aids ethical hackers in understanding adversaries’ methods of identifying and mapping attack surfaces, such as network entry points, which enables them to exploit the target and steal confidential information. Reconnaissance for Ethical Hackers helps you get a comprehensive understanding of how threat actors are able to successfully leverage the information collected during the reconnaissance phase to scan and enumerate the network, collect information, and pose various security threats. This book helps you stay one step ahead in knowing how adversaries use tactics, techniques, and procedures (TTPs) to successfully gain information about their targets, while you develop a solid foundation on information gathering strategies as a cybersecurity professional. The concluding chapters will assist you in developing the skills and techniques used by real adversaries to identify vulnerable points of entry into an organization and mitigate reconnaissance-based attacks. By the end of this book, you’ll have gained a solid understanding of reconnaissance, as well as learned how to secure yourself and your organization without causing significant disruption.What you will learn Understand the tactics, techniques, and procedures of reconnaissance Grasp the importance of attack surface management for organizations Find out how to conceal your identity online as an ethical hacker Explore advanced open source intelligence (OSINT) techniques Perform active reconnaissance to discover live hosts and exposed ports Use automated tools to perform vulnerability assessments on systems Discover how to efficiently perform reconnaissance on web applications Implement open source threat detection and monitoring tools Who this book is forIf you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. Cybersecurity professionals will find this book useful in determining the attack surface of their organizations and assets on their network, while understanding the behavior of adversaries.

Mechanical Properties & Performance of Engineering  Ceramics and Composites IX - Ceramic Engineering  and Science Proceedings,... Mechanical Properties & Performance of Engineering Ceramics and Composites IX - Ceramic Engineering and Science Proceedings, Volume 35 Issue 2 (Hardcover, Volume 35, Issue 2)
D. Singh
R3,613 Discovery Miles 36 130 Ships in 12 - 17 working days

The Ceramic Engineering and Science Proceeding has been published by The American Ceramic Society since 1980. This series contains a collection of papers dealing with issues in both traditional ceramics (i.e., glass, whitewares, refractories, and porcelain enamel) and advanced ceramics. Topics covered in the area of advanced ceramic include bioceramics, nanomaterials, composites, solid oxide fuel cells, mechanical properties and structural design, advanced ceramic coatings, ceramic armor, porous ceramics, and more.

CompTIA Network+ N10-008 Certification Guide - The ultimate guide to passing the N10-008 exam (Paperback, 2nd Revised edition):... CompTIA Network+ N10-008 Certification Guide - The ultimate guide to passing the N10-008 exam (Paperback, 2nd Revised edition)
Glen D. Singh
R1,358 Discovery Miles 13 580 Ships in 10 - 15 working days

Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide. Purchase of the print or Kindle book includes a free eBook in the PDF format. Key Features A step-by-step guide to gaining a clear understanding of the Network+ certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-008 exam with the help of 200+ practice test questions and answers Book DescriptionThis book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach. You'll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you'll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques. By the end of this book, you'll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You'll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world. What you will learn Explore common networking concepts, services, and architecture Identify common cloud architecture and virtualization concepts Discover routing and switching technologies Implement wireless technologies and solutions Understand network security concepts to mitigate cyber attacks Explore best practices to harden networks from threats Use best practices to discover and resolve common networking issues Who this book is forThis book is for students, network administrators, network engineers, NOC engineers, systems administrators, cybersecurity professionals, and enthusiasts. No prior knowledge in networking is required to get started with this book.

Leaderboard - A Kid-Friendly Guide for Developing Leadership Skills (Paperback): Brittany D Singh Williams Leaderboard - A Kid-Friendly Guide for Developing Leadership Skills (Paperback)
Brittany D Singh Williams
R354 Discovery Miles 3 540 Ships in 10 - 15 working days
The Ultimate Kali Linux Book - Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire (Paperback,... The Ultimate Kali Linux Book - Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire (Paperback, 2nd Revised edition)
Glen D. Singh
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch Purchase of the print or Kindle book includes a free eBook in the PDF format Key Features Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment Book DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux book, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. What you will learn Explore the fundamentals of ethical hacking Understand how to install and configure Kali Linux Perform asset and network discovery techniques Focus on how to perform vulnerability assessments Exploit the trust in Active Directory domain services Perform advanced exploitation with Command and Control (C2) techniques Implement advanced wireless hacking techniques Become well-versed with exploiting vulnerable web applications Who this book is forThis pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.

Kaalchakra Chronicles - The Incarnated (Paperback): Manish D. Singh Kaalchakra Chronicles - The Incarnated (Paperback)
Manish D. Singh
R718 Discovery Miles 7 180 Ships in 10 - 15 working days
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide - Begin a successful career in networking with 200-301... Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide - Begin a successful career in networking with 200-301 CCNA certification (Paperback)
Glen D. Singh
R1,036 Discovery Miles 10 360 Ships in 10 - 15 working days

Prepare to take the Cisco Certified Network Associate (200-301 CCNA) exam and get to grips with the essentials of networking, security, and automation Key Features Secure your future in network engineering with this intensive boot camp-style certification guide Gain knowledge of the latest trends in Cisco networking and security and boost your career prospects Design and implement a wide range of networking technologies and services using Cisco solutions Book DescriptionIn the dynamic technology landscape, staying on top of the latest technology trends is a must, especially if you want to build a career in network administration. Achieving CCNA 200-301 certification will validate your knowledge of networking concepts, and this book will help you to do just that. This exam guide focuses on the fundamentals to help you gain a high-level understanding of networking, security, IP connectivity, IP services, programmability, and automation. Starting with the functions of various networking components, you'll discover how they are used to build and improve an enterprise network. You'll then delve into configuring networking devices using a command-line interface (CLI) to provide network access, services, security, connectivity, and management. The book covers important aspects of network engineering using a variety of hands-on labs and real-world scenarios that will help you gain essential practical skills. As you make progress, this CCNA certification study guide will help you get to grips with the solutions and technologies that you need to implement and administer a broad range of modern networks and IT infrastructures. By the end of this book, you'll have gained the confidence to pass the Cisco CCNA 200-301 exam on the first attempt and be well-versed in a variety of network administration and security engineering solutions. What you will learn Understand the benefits of creating an optimal network Create and implement IP schemes in an enterprise network Design and implement virtual local area networks (VLANs) Administer dynamic routing protocols, network security, and automation Get to grips with various IP services that are essential to every network Discover how to troubleshoot networking devices Who this book is forThis guide is for IT professionals looking to boost their network engineering and security administration career prospects. If you want to gain a Cisco CCNA certification and start a career as a network security professional, you'll find this book useful. Although no knowledge about Cisco technologies is expected, a basic understanding of industry-level network fundamentals will help you grasp the topics covered easily.

Hands-On Penetration Testing with Kali NetHunter - Spy on and protect vulnerable ecosystems using the power of Kali Linux for... Hands-On Penetration Testing with Kali NetHunter - Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go (Paperback)
Glen D. Singh, Sean Philip Oriyano
R1,038 Discovery Miles 10 380 Ships in 10 - 15 working days

Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data Book DescriptionKali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor. What you will learn Choose and configure a hardware device to use Kali NetHunter Use various tools during pentests Understand NetHunter suite components Discover tips to effectively use a compact mobile platform Create your own Kali NetHunter-enabled device and configure it for optimal results Learn to scan and gather information from a target Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices Who this book is forHands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful.

Bhaktivedanta Institute Monograph Series - Produced for the 1977 Life Comes from Life Conference (Paperback): Richard L.... Bhaktivedanta Institute Monograph Series - Produced for the 1977 Life Comes from Life Conference (Paperback)
Richard L. Thompson, Thoudam D Singh
R511 Discovery Miles 5 110 Ships in 10 - 15 working days
Learn Kali Linux 2019 - Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark... Learn Kali Linux 2019 - Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark (Paperback)
Glen D. Singh
R1,081 Discovery Miles 10 810 Ships in 10 - 15 working days

Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key Features Get up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacks Learn to use Linux commands in the way ethical hackers do to gain control of your environment Book DescriptionThe current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently deal with crucial security aspects. Through real-world examples, you'll understand how to set up a lab and later explore core penetration testing concepts. Throughout the course of this book, you'll get up to speed with gathering sensitive information and even discover different vulnerability assessment tools bundled in Kali Linux 2019. In later chapters, you'll gain insights into concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections to further build on your pentesting skills. You'll also focus on techniques such as bypassing controls, attacking the end user and maintaining persistence access through social media. Finally, this pentesting book covers best practices for performing complex penetration testing techniques in a highly secured environment. By the end of this book, you'll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity. What you will learn Explore the fundamentals of ethical hacking Learn how to install and configure Kali Linux Get up to speed with performing wireless network pentesting Gain insights into passive and active information gathering Understand web application pentesting Decode WEP, WPA, and WPA2 encryptions using a variety of methods, such as the fake authentication attack, the ARP request replay attack, and the dictionary attack Who this book is forIf you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2019.2, then this book is for you. The book will also help if you're simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux is not necessary, some understanding of cybersecurity will be useful.

CompTIA Network+ Certification Guide - The ultimate guide to passing the N10-007 exam (Paperback): Glen D. Singh, Rishi... CompTIA Network+ Certification Guide - The ultimate guide to passing the N10-007 exam (Paperback)
Glen D. Singh, Rishi Latchmepersad
R1,141 Discovery Miles 11 410 Ships in 10 - 15 working days

This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with self-assessment scenarios for better preparation. Key Features A step-by-step guide to give you a clear understanding of the Network+ Certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-007 exam with the help of practice tests Book DescriptionCompTIA certified professionals have always had the upper hand in the information technology industry. This book will be your ideal guide to efficiently passing and achieving this certification. Learn from industry experts and implement their practices to resolve complex IT issues. This book revolves around networking concepts where readers will learn topics like network architecture, security, network monitoring, and troubleshooting. This book will not only prepare the readers conceptually but will also help them pass the N10-007 exam. This guide will also provide practice exercise after every chapter where readers can ensure their concepts are clear. By the end of this book, readers will leverage this guide and the included practice questions to boost their confidence in appearing for the actual certificate. What you will learn Explain the purpose of a variety of networking concepts and implement them appropriately Understand physical security and common attacks while securing wired and wireless networks Understand the fundamentals of IPv4 and IPv6 Determine and explain the appropriate cabling, device, and storage technologies Understand network troubleshooting methodology and appropriate tools to support connectivity and performance Use best practices to manage the network, determine policies, and ensure business continuity Who this book is forThis book is ideal for readers wanting to pass the CompTIA Network+ certificate. Rookie network engineers and system administrators interested in enhancing their networking skills would also benefit from this book. No Prior knowledge on networking would be needed.

CCNA Security 210-260 Certification Guide - Build your knowledge of network security and pass your CCNA Security exam (210-260)... CCNA Security 210-260 Certification Guide - Build your knowledge of network security and pass your CCNA Security exam (210-260) (Paperback)
Glen D. Singh, Michael Vinod, Vijay Anandh
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Become a Cisco security specialist by developing your skills in network security and explore advanced security technologies Key Features Enhance your skills in network security by learning about Cisco's device configuration and installation Unlock the practical aspects of CCNA security to secure your devices Explore tips and tricks to help you achieve the CCNA Security 210-260 Certification Book DescriptionWith CCNA Security certification, a network professional can demonstrate the skills required to develop security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security 210-260 Certification Guide will help you grasp the fundamentals of network security and prepare you for the Cisco CCNA Security Certification exam. You'll begin by getting a grip on the fundamentals of network security and exploring the different tools available. Then, you'll see how to securely manage your network devices by implementing the AAA framework and configuring different management plane protocols. Next, you'll learn about security on the data link layer by implementing various security toolkits. You'll be introduced to various firewall technologies and will understand how to configure a zone-based firewall on a Cisco IOS device. You'll configure a site-to-site VPN on a Cisco device and get familiar with different types of VPNs and configurations. Finally, you'll delve into the concepts of IPS and endpoint security to secure your organization's network infrastructure. By the end of this book, you'll be ready to take the CCNA Security Exam (210-260). What you will learn Grasp the fundamentals of network security Configure routing protocols to secure network devices Mitigate different styles of security attacks using Cisco devices Explore the different types of firewall technologies Discover the Cisco ASA functionality and gain insights into some advanced ASA configurations Implement IPS on a Cisco device and understand the concept of endpoint security Who this book is forCCNA Security 210-260 Certification Guide can help you become a network security engineer, a cyber security professional, or a security administrator. You should have valid CCENT or CCNA Routing and Switching certification before taking your CCNA Security exam.

Heart to Heart (Paperback): D Singh-Heer Heart to Heart (Paperback)
D Singh-Heer
R830 R682 Discovery Miles 6 820 Save R148 (18%) Ships in 10 - 15 working days
Laureate Custom - Current Issues in Hc Policy & Practice (Paperback): John Pratt, L Shi, D. Singh Laureate Custom - Current Issues in Hc Policy & Practice (Paperback)
John Pratt, L Shi, D. Singh
R1,913 Discovery Miles 19 130 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Fast X
Vin Diesel, Jason Momoa, … DVD R172 R132 Discovery Miles 1 320
Sudocrem Skin & Baby Care Barrier Cream…
R128 Discovery Miles 1 280
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R289 Discovery Miles 2 890
Canon 445 Original Ink Cartridge (Black)
R700 R335 Discovery Miles 3 350
A Girl, A Bottle, A Boat
Train CD  (2)
R108 R55 Discovery Miles 550
Higher
Michael Buble CD  (1)
R459 Discovery Miles 4 590

 

Partners