|
Showing 1 - 25 of
27 matches in All Departments
|
Deposit Insurance (Hardcover)
A Campbell, J. La Brosse, D. Mayes, D. Singh, John Raymond La Brosse
|
R2,816
Discovery Miles 28 160
|
Ships in 10 - 15 working days
|
Deposit insurance has risen rapidly over the last few years
across the world. It was brought into renewed prominence with the
reform of the system in the United States in the 1980s after the
Savings and Loans crisis, and was accelerated by the rash of
financial crises that have struck Europe, Asia and South America in
recent years. The contributions to this volume strike a fascinating
balance between the interest of regulators, the view of academics
as to how the issues should be handled, and the interests of banks
and their depositors.
This book presents an integrated analysis of the dynamics of the
economics of households and farm production in the setting of a
polygynous family structure and traditional agriculture in
sub-Saharan rural Africa. It focuses on some basic facts about
poverty among the farm people of rural Africa.
Written by internationally renowned experts, Clinical Ophthalmic
Oncology provides practical guidance and advice on the diagnosis
and management of the complete range of ocular cancers. The book
supplies all of the state-of-the-art knowledge required in order to
identify these cancers early and to treat them as effectively as
possible. Using the information provided, readers will be able to
provide effective patient care using the latest knowledge on all
aspects of ophthalmic oncology, to verify diagnostic conclusions
based on comparison with numerous full-color clinical photographs,
and to locate required information quickly owing to the clinically
focused and user-friendly format. This volume describes the
classification, differential diagnosis, and imaging of orbital
tumors and discusses the most suitable treatment options for
different tumor types. "
From the Contents: A. Lambert: Weighted shifts and composition
operators on L2; - A.S.Cavaretta/A.Sharma: Variation diminishing
properties and convexityfor the tensor product Bernstein operator;
- B.P. Duggal: A note on generalised commutativity theorems in the
Schatten norm; - B.S.Yadav/D.Singh/S.Agrawal: De Branges Modules in
H2(Ck) of the torus; - D. Sarason: Weak compactness of holomorphic
composition operators on H1; - H.Helson/J.E.McCarthy: Continuity of
seminorms; - J.A. Siddiqui: Maximal ideals in local Carleman
algebras; - J.G. Klunie: Convergence of polynomials with restricted
zeros; - J.P. Kahane: On a theorem of Polya; - U.N. Singh: The
Carleman-Fourier transform and its applications; - W. Zelasko:
Extending seminorms in locally pseudoconvex algebras;
This collection of 33 papers deals with mechanical behaviors
associated with systems ranging from diamond reinforced silicon
carbide to rare earth pyrosilicates. Presented at The Mechanical
Behavior and Performance of Ceramics & Composites Symposium in
January 2012 during the 36th International Conference on Advanced
Ceramics and Composites (ICACC), it offers researchers from around
the world the opportunity to explore new and emerging issues in all
aspects of the field.
Ceramic Engineering and Science Proceedings Volume 34, Issue 2 -
Mechanical Properties and Performance of Engineering Ceramics and
Composites VIII A collection of 21 papers from The American Ceramic
Society's 37th International Conference on Advanced Ceramics and
Composites, held in Daytona Beach, Florida, January 27-February 1,
2013. This issue includes papers presented in Symposium 1 -
Mechanical Behavior and Performance of Ceramics and Composites.
This book is a collection of papers from The American Ceramic
Society's 35th International Conference on Advanced Ceramics and
Composites, held in Daytona Beach, Florida, January 23-28, 2011.
This issue includes papers presented in the Mechanical Behavior and
Performance of Ceramics & Composites Symposium on topics such
as processing-microstructure properties correlations; fracture
mechanics, modeling and testing; tribological properties;
applications; and processing.
Ceramic Transactions, Volume 264, Proceedings of the 12th Pacific
Rim Conference on Ceramic and Glass Technology Dileep Singh, Manabu
Fukushima, Young-Wook Kim, Kiyoshi Shimamura, Nobuhito Imanaka,
Tatsuki Ohji, Jake Amoroso, and Michael Lanagan; Editors This
proceedings contains a collection of 32 papers presented at the
12th Pacific Rim Conference on Ceramic and Glass Technology
(PacRim12), May 21-26, 2017 in Waikoloa, Hawaii. PacRim is a
bi-annual conference held in collaboration with the ceramic
societies of the Pacific Rim countries - The American Ceramic
Society, The Chinese Ceramic Society, The Korean Ceramic Society,
and the Australian Ceramic Society. Topics included in this
collection include multiscale modeling and simulation, processing
and manufacturing, nanotechnology, multifunctional materials,
ceramics for energy and the environment, biomedical materials, and
more
Contains a collection of papers from the below symposia held during
the 10th Pacific Rim Conference on Ceramic and Glass Technology
(PacRim10), June 2-7, 2013, in Coronado, California 2012: *
Engineering Ceramics and Ceramic Matrix Composites: Design,
Development, and Application * Advanced Ceramic Coatings:
Processing, Properties, and Application * Geopolymers Low Energy,
Environmentally Friendly, Inorganic Polymeric Ceramic *
Multifunctional Metal Oxide Nanostructures and Heteroarchitectures
for Energy and Device Application * Advanced Characterization and
Modeling of Ceramic Interfaces
Use real-world reconnaissance techniques to efficiently gather
sensitive information on systems and networks Purchase of the print
or Kindle book includes a free PDF eBook Key Features Learn how
adversaries use reconnaissance techniques to discover security
vulnerabilities on systems Develop advanced open source
intelligence capabilities to find sensitive information Explore
automated reconnaissance and vulnerability assessment tools to
profile systems and networks Book DescriptionThis book explores
reconnaissance techniques – the first step in discovering
security vulnerabilities and exposed network infrastructure. It
aids ethical hackers in understanding adversaries’ methods of
identifying and mapping attack surfaces, such as network entry
points, which enables them to exploit the target and steal
confidential information. Reconnaissance for Ethical Hackers helps
you get a comprehensive understanding of how threat actors are able
to successfully leverage the information collected during the
reconnaissance phase to scan and enumerate the network, collect
information, and pose various security threats. This book helps you
stay one step ahead in knowing how adversaries use tactics,
techniques, and procedures (TTPs) to successfully gain information
about their targets, while you develop a solid foundation on
information gathering strategies as a cybersecurity professional.
The concluding chapters will assist you in developing the skills
and techniques used by real adversaries to identify vulnerable
points of entry into an organization and mitigate
reconnaissance-based attacks. By the end of this book, you’ll
have gained a solid understanding of reconnaissance, as well as
learned how to secure yourself and your organization without
causing significant disruption.What you will learn Understand the
tactics, techniques, and procedures of reconnaissance Grasp the
importance of attack surface management for organizations Find out
how to conceal your identity online as an ethical hacker Explore
advanced open source intelligence (OSINT) techniques Perform active
reconnaissance to discover live hosts and exposed ports Use
automated tools to perform vulnerability assessments on systems
Discover how to efficiently perform reconnaissance on web
applications Implement open source threat detection and monitoring
tools Who this book is forIf you are an ethical hacker, a
penetration tester, red teamer, or any cybersecurity professional
looking to understand the impact of reconnaissance-based attacks,
how they take place, and what organizations can do to protect
against them, then this book is for you. Cybersecurity
professionals will find this book useful in determining the attack
surface of their organizations and assets on their network, while
understanding the behavior of adversaries.
The Ceramic Engineering and Science Proceeding has been published
by The American Ceramic Society since 1980. This series contains a
collection of papers dealing with issues in both traditional
ceramics (i.e., glass, whitewares, refractories, and porcelain
enamel) and advanced ceramics. Topics covered in the area of
advanced ceramic include bioceramics, nanomaterials, composites,
solid oxide fuel cells, mechanical properties and structural
design, advanced ceramic coatings, ceramic armor, porous ceramics,
and more.
Become a network specialist by developing your skills in network
implementation, operations and security while covering all the exam
topics for CompTIA Network+ N10-008 certification in an
easy-to-follow guide. Purchase of the print or Kindle book includes
a free eBook in the PDF format. Key Features A step-by-step guide
to gaining a clear understanding of the Network+ certification
Learn about network architecture, protocols, security, and network
troubleshooting Confidently ace the N10-008 exam with the help of
200+ practice test questions and answers Book DescriptionThis book
helps you to easily understand core networking concepts without the
need of prior industry experience or knowledge within this fi eld
of study. This updated second edition of the CompTIA Network+
N10-008 Certification Guide begins by introducing you to the core
fundamentals of networking technologies and concepts, before
progressing to intermediate and advanced topics using a
student-centric approach. You'll explore best practices for
designing and implementing a resilient and scalable network
infrastructure to support modern applications and services.
Additionally, you'll learn network security concepts and
technologies to effectively secure organizations from cyber attacks
and threats. The book also shows you how to efficiently discover
and resolve networking issues using common troubleshooting
techniques. By the end of this book, you'll have gained sufficient
knowledge to efficiently design, implement, and maintain a network
infrastructure as a successful network professional within the
industry. You'll also have gained knowledge of all the official
CompTIA Network+ N10-008 exam objectives, networking technologies,
and how to apply your skills in the real world. What you will learn
Explore common networking concepts, services, and architecture
Identify common cloud architecture and virtualization concepts
Discover routing and switching technologies Implement wireless
technologies and solutions Understand network security concepts to
mitigate cyber attacks Explore best practices to harden networks
from threats Use best practices to discover and resolve common
networking issues Who this book is forThis book is for students,
network administrators, network engineers, NOC engineers, systems
administrators, cybersecurity professionals, and enthusiasts. No
prior knowledge in networking is required to get started with this
book.
Explore the latest ethical hacking tools and techniques to perform
penetration testing from scratch Purchase of the print or Kindle
book includes a free eBook in the PDF format Key Features Learn to
compromise enterprise networks with Kali Linux Gain comprehensive
insights into security concepts using advanced real-life hacker
techniques Use Kali Linux in the same way ethical hackers and
penetration testers do to gain control of your environment Book
DescriptionKali Linux is the most popular and advanced penetration
testing Linux distribution within the cybersecurity industry. Using
Kali Linux, a cybersecurity professional will be able to discover
and exploit various vulnerabilities and perform advanced
penetration testing on both enterprise wired and wireless networks.
This book is a comprehensive guide for those who are new to Kali
Linux and penetration testing that will have you up to speed in no
time. Using real-world scenarios, you'll understand how to set up a
lab and explore core penetration testing concepts. Throughout this
book, you'll focus on information gathering and even discover
different vulnerability assessment tools bundled in Kali Linux.
You'll learn to discover target systems on a network, identify
security flaws on devices, exploit security weaknesses and gain
access to networks, set up Command and Control (C2) operations, and
perform web application penetration testing. In this updated second
edition, you'll be able to compromise Active Directory and exploit
enterprise networks. Finally, this book covers best practices for
performing complex web penetration testing techniques in a highly
secured environment. By the end of this Kali Linux book, you'll
have gained the skills to perform advanced penetration testing on
enterprise networks using Kali Linux. What you will learn Explore
the fundamentals of ethical hacking Understand how to install and
configure Kali Linux Perform asset and network discovery techniques
Focus on how to perform vulnerability assessments Exploit the trust
in Active Directory domain services Perform advanced exploitation
with Command and Control (C2) techniques Implement advanced
wireless hacking techniques Become well-versed with exploiting
vulnerable web applications Who this book is forThis pentesting
book is for students, trainers, cybersecurity professionals, cyber
enthusiasts, network security professionals, ethical hackers,
penetration testers, and security engineers. If you do not have any
prior knowledge and are looking to become an expert in penetration
testing using the Kali Linux operating system (OS), then this book
is for you.
Prepare to take the Cisco Certified Network Associate (200-301
CCNA) exam and get to grips with the essentials of networking,
security, and automation Key Features Secure your future in network
engineering with this intensive boot camp-style certification guide
Gain knowledge of the latest trends in Cisco networking and
security and boost your career prospects Design and implement a
wide range of networking technologies and services using Cisco
solutions Book DescriptionIn the dynamic technology landscape,
staying on top of the latest technology trends is a must,
especially if you want to build a career in network administration.
Achieving CCNA 200-301 certification will validate your knowledge
of networking concepts, and this book will help you to do just
that. This exam guide focuses on the fundamentals to help you gain
a high-level understanding of networking, security, IP
connectivity, IP services, programmability, and automation.
Starting with the functions of various networking components,
you'll discover how they are used to build and improve an
enterprise network. You'll then delve into configuring networking
devices using a command-line interface (CLI) to provide network
access, services, security, connectivity, and management. The book
covers important aspects of network engineering using a variety of
hands-on labs and real-world scenarios that will help you gain
essential practical skills. As you make progress, this CCNA
certification study guide will help you get to grips with the
solutions and technologies that you need to implement and
administer a broad range of modern networks and IT infrastructures.
By the end of this book, you'll have gained the confidence to pass
the Cisco CCNA 200-301 exam on the first attempt and be well-versed
in a variety of network administration and security engineering
solutions. What you will learn Understand the benefits of creating
an optimal network Create and implement IP schemes in an enterprise
network Design and implement virtual local area networks (VLANs)
Administer dynamic routing protocols, network security, and
automation Get to grips with various IP services that are essential
to every network Discover how to troubleshoot networking devices
Who this book is forThis guide is for IT professionals looking to
boost their network engineering and security administration career
prospects. If you want to gain a Cisco CCNA certification and start
a career as a network security professional, you'll find this book
useful. Although no knowledge about Cisco technologies is expected,
a basic understanding of industry-level network fundamentals will
help you grasp the topics covered easily.
Convert Android to a powerful pentesting platform. Key Features Get
up and running with Kali Linux NetHunter Connect your Android
device and gain full control over Windows, OSX, or Linux devices
Crack Wi-Fi passwords and gain access to devices connected over the
same network collecting intellectual data Book DescriptionKali
NetHunter is a version of the popular and powerful Kali Linux
pentesting platform, designed to be installed on mobile devices.
Hands-On Penetration Testing with Kali NetHunter will teach you the
components of NetHunter and how to install the software. You'll
also learn about the different tools included and how to optimize
and use a package, obtain desired results, perform tests, and make
your environment more secure. Starting with an introduction to Kali
NetHunter, you will delve into different phases of the pentesting
process. This book will show you how to build your penetration
testing environment and set up your lab. You will gain insight into
gathering intellectual data, exploiting vulnerable areas, and
gaining control over target systems. As you progress through the
book, you will explore the NetHunter tools available for exploiting
wired and wireless devices. You will work through new ways to
deploy existing tools designed to reduce the chances of detection.
In the concluding chapters, you will discover tips and best
practices for integrating security hardening into your Android
ecosystem. By the end of this book, you will have learned to
successfully use a mobile penetration testing device based on Kali
NetHunter and Android to accomplish the same tasks you would
traditionally, but in a smaller and more mobile form factor. What
you will learn Choose and configure a hardware device to use Kali
NetHunter Use various tools during pentests Understand NetHunter
suite components Discover tips to effectively use a compact mobile
platform Create your own Kali NetHunter-enabled device and
configure it for optimal results Learn to scan and gather
information from a target Explore hardware adapters for testing and
auditing wireless networks and Bluetooth devices Who this book is
forHands-On Penetration Testing with Kali NetHunter is for
pentesters, ethical hackers, and security professionals who want to
learn to use Kali NetHunter for complete mobile penetration testing
and are interested in venturing into the mobile domain. Some prior
understanding of networking assessment and Kali Linux will be
helpful.
Explore the latest ethical hacking tools and techniques in Kali
Linux 2019 to perform penetration testing from scratch Key Features
Get up and running with Kali Linux 2019.2 Gain comprehensive
insights into security concepts such as social engineering,
wireless network exploitation, and web application attacks Learn to
use Linux commands in the way ethical hackers do to gain control of
your environment Book DescriptionThe current rise in hacking and
security breaches makes it more important than ever to effectively
pentest your environment, ensuring endpoint protection. This book
will take you through the latest version of Kali Linux and help you
use various tools and techniques to efficiently deal with crucial
security aspects. Through real-world examples, you'll understand
how to set up a lab and later explore core penetration testing
concepts. Throughout the course of this book, you'll get up to
speed with gathering sensitive information and even discover
different vulnerability assessment tools bundled in Kali Linux
2019. In later chapters, you'll gain insights into concepts such as
social engineering, attacking wireless networks, exploitation of
web applications and remote access connections to further build on
your pentesting skills. You'll also focus on techniques such as
bypassing controls, attacking the end user and maintaining
persistence access through social media. Finally, this pentesting
book covers best practices for performing complex penetration
testing techniques in a highly secured environment. By the end of
this book, you'll be able to use Kali Linux to detect
vulnerabilities and secure your system by applying penetration
testing techniques of varying complexity. What you will learn
Explore the fundamentals of ethical hacking Learn how to install
and configure Kali Linux Get up to speed with performing wireless
network pentesting Gain insights into passive and active
information gathering Understand web application pentesting Decode
WEP, WPA, and WPA2 encryptions using a variety of methods, such as
the fake authentication attack, the ARP request replay attack, and
the dictionary attack Who this book is forIf you are an IT security
professional or a security consultant who wants to get started with
penetration testing using Kali Linux 2019.2, then this book is for
you. The book will also help if you're simply looking to learn more
about ethical hacking and various security breaches. Although prior
knowledge of Kali Linux is not necessary, some understanding of
cybersecurity will be useful.
This is a practical certification guide covering all the exam
topics in an easy-to-follow manner backed with self-assessment
scenarios for better preparation. Key Features A step-by-step guide
to give you a clear understanding of the Network+ Certification
Learn about network architecture, protocols, security, and network
troubleshooting Confidently ace the N10-007 exam with the help of
practice tests Book DescriptionCompTIA certified professionals have
always had the upper hand in the information technology industry.
This book will be your ideal guide to efficiently passing and
achieving this certification. Learn from industry experts and
implement their practices to resolve complex IT issues. This book
revolves around networking concepts where readers will learn topics
like network architecture, security, network monitoring, and
troubleshooting. This book will not only prepare the readers
conceptually but will also help them pass the N10-007 exam. This
guide will also provide practice exercise after every chapter where
readers can ensure their concepts are clear. By the end of this
book, readers will leverage this guide and the included practice
questions to boost their confidence in appearing for the actual
certificate. What you will learn Explain the purpose of a variety
of networking concepts and implement them appropriately Understand
physical security and common attacks while securing wired and
wireless networks Understand the fundamentals of IPv4 and IPv6
Determine and explain the appropriate cabling, device, and storage
technologies Understand network troubleshooting methodology and
appropriate tools to support connectivity and performance Use best
practices to manage the network, determine policies, and ensure
business continuity Who this book is forThis book is ideal for
readers wanting to pass the CompTIA Network+ certificate. Rookie
network engineers and system administrators interested in enhancing
their networking skills would also benefit from this book. No Prior
knowledge on networking would be needed.
Become a Cisco security specialist by developing your skills in
network security and explore advanced security technologies Key
Features Enhance your skills in network security by learning about
Cisco's device configuration and installation Unlock the practical
aspects of CCNA security to secure your devices Explore tips and
tricks to help you achieve the CCNA Security 210-260 Certification
Book DescriptionWith CCNA Security certification, a network
professional can demonstrate the skills required to develop
security infrastructure, recognize threats and vulnerabilities to
networks, and mitigate security threats. The CCNA Security 210-260
Certification Guide will help you grasp the fundamentals of network
security and prepare you for the Cisco CCNA Security Certification
exam. You'll begin by getting a grip on the fundamentals of network
security and exploring the different tools available. Then, you'll
see how to securely manage your network devices by implementing the
AAA framework and configuring different management plane protocols.
Next, you'll learn about security on the data link layer by
implementing various security toolkits. You'll be introduced to
various firewall technologies and will understand how to configure
a zone-based firewall on a Cisco IOS device. You'll configure a
site-to-site VPN on a Cisco device and get familiar with different
types of VPNs and configurations. Finally, you'll delve into the
concepts of IPS and endpoint security to secure your organization's
network infrastructure. By the end of this book, you'll be ready to
take the CCNA Security Exam (210-260). What you will learn Grasp
the fundamentals of network security Configure routing protocols to
secure network devices Mitigate different styles of security
attacks using Cisco devices Explore the different types of firewall
technologies Discover the Cisco ASA functionality and gain insights
into some advanced ASA configurations Implement IPS on a Cisco
device and understand the concept of endpoint security Who this
book is forCCNA Security 210-260 Certification Guide can help you
become a network security engineer, a cyber security professional,
or a security administrator. You should have valid CCENT or CCNA
Routing and Switching certification before taking your CCNA
Security exam.
|
|