0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 36 matches in All Departments

Economics Of The Family And Farming Systems In Sub-saharan Africa - Development Perspectives (Paperback): Ram D Singh Economics Of The Family And Farming Systems In Sub-saharan Africa - Development Perspectives (Paperback)
Ram D Singh
R1,291 Discovery Miles 12 910 Ships in 12 - 17 working days

This book presents an integrated analysis of the dynamics of the economics of households and farm production in the setting of a polygynous family structure and traditional agriculture in sub-Saharan rural Africa. It focuses on some basic facts about poverty among the farm people of rural Africa.

Economics Of The Family And Farming Systems In Sub-saharan Africa - Development Perspectives (Hardcover): Ram D Singh Economics Of The Family And Farming Systems In Sub-saharan Africa - Development Perspectives (Hardcover)
Ram D Singh
R4,144 Discovery Miles 41 440 Ships in 12 - 17 working days

This book presents an integrated analysis of the dynamics of the economics of households and farm production in the setting of a polygynous family structure and traditional agriculture in sub-Saharan rural Africa. It focuses on some basic facts about poverty among the farm people of rural Africa.

Grace in Dying - A Message of Hope, Comfort and Spiritual Transformation (Paperback, 1st ed): Kathleen D Singh Grace in Dying - A Message of Hope, Comfort and Spiritual Transformation (Paperback, 1st ed)
Kathleen D Singh
R458 R380 Discovery Miles 3 800 Save R78 (17%) Ships in 10 - 15 working days

Deposit Insurance (Hardcover): A Campbell, J. La Brosse, D. Mayes, D. Singh, John Raymond La Brosse Deposit Insurance (Hardcover)
A Campbell, J. La Brosse, D. Mayes, D. Singh, John Raymond La Brosse
R2,987 Discovery Miles 29 870 Ships in 10 - 15 working days

Deposit insurance has risen rapidly over the last few years across the world. It was brought into renewed prominence with the reform of the system in the United States in the 1980s after the Savings and Loans crisis, and was accelerated by the rash of financial crises that have struck Europe, Asia and South America in recent years. The contributions to this volume strike a fascinating balance between the interest of regulators, the view of academics as to how the issues should be handled, and the interests of banks and their depositors.

Functional Analysis and Operator Theory - Proceedings of a Conference held in Memory of U.N.Singh, New Delhi, India, 2-6... Functional Analysis and Operator Theory - Proceedings of a Conference held in Memory of U.N.Singh, New Delhi, India, 2-6 August, 1990 (Paperback, 1992 ed.)
B.S. Yadav, D. Singh
R1,386 Discovery Miles 13 860 Ships in 10 - 15 working days

From the Contents: A. Lambert: Weighted shifts and composition operators on L2; - A.S.Cavaretta/A.Sharma: Variation diminishing properties and convexityfor the tensor product Bernstein operator; - B.P. Duggal: A note on generalised commutativity theorems in the Schatten norm; - B.S.Yadav/D.Singh/S.Agrawal: De Branges Modules in H2(Ck) of the torus; - D. Sarason: Weak compactness of holomorphic composition operators on H1; - H.Helson/J.E.McCarthy: Continuity of seminorms; - J.A. Siddiqui: Maximal ideals in local Carleman algebras; - J.G. Klunie: Convergence of polynomials with restricted zeros; - J.P. Kahane: On a theorem of Polya; - U.N. Singh: The Carleman-Fourier transform and its applications; - W. Zelasko: Extending seminorms in locally pseudoconvex algebras;

Mechanical Properties and Performance of Engineering Ceramics and Composites VII - Ceramic Engineering and Science Proceedings,... Mechanical Properties and Performance of Engineering Ceramics and Composites VII - Ceramic Engineering and Science Proceedings, V33 Issue 2 (Hardcover, Volume 33, Issue 2)
D. Singh
R2,219 Discovery Miles 22 190 Ships in 12 - 17 working days

This collection of 33 papers deals with mechanical behaviors associated with systems ranging from diamond reinforced silicon carbide to rare earth pyrosilicates. Presented at The Mechanical Behavior and Performance of Ceramics & Composites Symposium in January 2012 during the 36th International Conference on Advanced Ceramics and Composites (ICACC), it offers researchers from around the world the opportunity to explore new and emerging issues in all aspects of the field.

Mechanical Properties and Performance of Engineeri ng Ceramics and Composites VIII - Ceramic Engineer ing and Science... Mechanical Properties and Performance of Engineeri ng Ceramics and Composites VIII - Ceramic Engineer ing and Science Proceedings, Volume 34 Issue 2 (Hardcover, Volume 34, Issue 2)
D. Singh
R2,182 Discovery Miles 21 820 Ships in 12 - 17 working days

Ceramic Engineering and Science Proceedings Volume 34, Issue 2 - Mechanical Properties and Performance of Engineering Ceramics and Composites VIII A collection of 21 papers from The American Ceramic Society's 37th International Conference on Advanced Ceramics and Composites, held in Daytona Beach, Florida, January 27-February 1, 2013. This issue includes papers presented in Symposium 1 - Mechanical Behavior and Performance of Ceramics and Composites.

Mechanical Properties and Performance of Engineering Ceramics and Composites VI - Ceramic Engineering and Science Proceedings... Mechanical Properties and Performance of Engineering Ceramics and Composites VI - Ceramic Engineering and Science Proceedings V32 Issue 2 (Hardcover, Volume 32, Issue 2)
D. Singh
R2,272 Discovery Miles 22 720 Ships in 12 - 17 working days

This book is a collection of papers from The American Ceramic Society's 35th International Conference on Advanced Ceramics and Composites, held in Daytona Beach, Florida, January 23-28, 2011. This issue includes papers presented in the Mechanical Behavior and Performance of Ceramics & Composites Symposium on topics such as processing-microstructure properties correlations; fracture mechanics, modeling and testing; tribological properties; applications; and processing.

Proceedings of the 12th Pacific Rim Conference on Ceramic and Glass Technology; Ceramic Transactions , Volume 264 (Hardcover):... Proceedings of the 12th Pacific Rim Conference on Ceramic and Glass Technology; Ceramic Transactions , Volume 264 (Hardcover)
D. Singh
R5,890 Discovery Miles 58 900 Ships in 12 - 17 working days

Ceramic Transactions, Volume 264, Proceedings of the 12th Pacific Rim Conference on Ceramic and Glass Technology Dileep Singh, Manabu Fukushima, Young-Wook Kim, Kiyoshi Shimamura, Nobuhito Imanaka, Tatsuki Ohji, Jake Amoroso, and Michael Lanagan; Editors This proceedings contains a collection of 32 papers presented at the 12th Pacific Rim Conference on Ceramic and Glass Technology (PacRim12), May 21-26, 2017 in Waikoloa, Hawaii. PacRim is a bi-annual conference held in collaboration with the ceramic societies of the Pacific Rim countries - The American Ceramic Society, The Chinese Ceramic Society, The Korean Ceramic Society, and the Australian Ceramic Society. Topics included in this collection include multiscale modeling and simulation, processing and manufacturing, nanotechnology, multifunctional materials, ceramics for energy and the environment, biomedical materials, and more

Design, Development, and Applications of Structural Ceramics, Composites, and Nanomaterials , Ceramic Transactions Volume 244... Design, Development, and Applications of Structural Ceramics, Composites, and Nanomaterials , Ceramic Transactions Volume 244 (Hardcover)
D. Singh
R3,318 Discovery Miles 33 180 Ships in 12 - 17 working days

Contains a collection of papers from the below symposia held during the 10th Pacific Rim Conference on Ceramic and Glass Technology (PacRim10), June 2-7, 2013, in Coronado, California 2012: * Engineering Ceramics and Ceramic Matrix Composites: Design, Development, and Application * Advanced Ceramic Coatings: Processing, Properties, and Application * Geopolymers Low Energy, Environmentally Friendly, Inorganic Polymeric Ceramic * Multifunctional Metal Oxide Nanostructures and Heteroarchitectures for Energy and Device Application * Advanced Characterization and Modeling of Ceramic Interfaces

The Ultimate Kali Linux Book - Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire (Paperback,... The Ultimate Kali Linux Book - Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire (Paperback, 2nd Revised edition)
Glen D. Singh
R1,584 Discovery Miles 15 840 Ships in 9 - 15 working days

Explore the latest ethical hacking tools and techniques to perform penetration testing from scratch Purchase of the print or Kindle book includes a free eBook in the PDF format Key Features Learn to compromise enterprise networks with Kali Linux Gain comprehensive insights into security concepts using advanced real-life hacker techniques Use Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environment Book DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux book, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux. What you will learn Explore the fundamentals of ethical hacking Understand how to install and configure Kali Linux Perform asset and network discovery techniques Focus on how to perform vulnerability assessments Exploit the trust in Active Directory domain services Perform advanced exploitation with Command and Control (C2) techniques Implement advanced wireless hacking techniques Become well-versed with exploiting vulnerable web applications Who this book is forThis pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.

Clinical Ophthalmic Oncology - Retinal Tumors (Hardcover, 2nd ed. 2014): Arun D. Singh, Bertil Damato Clinical Ophthalmic Oncology - Retinal Tumors (Hardcover, 2nd ed. 2014)
Arun D. Singh, Bertil Damato
R4,424 R3,710 Discovery Miles 37 100 Save R714 (16%) Ships in 12 - 17 working days

Written by internationally renowned experts, Clinical Ophthalmic Oncology provides practical guidance and advice on the diagnosis and management of the complete range of ocular cancers. The book supplies all of the state-of-the-art knowledge required in order to identify these cancers early and to treat them as effectively as possible. Using the information provided, readers will be able to provide effective patient care using the latest knowledge on all aspects of ophthalmic oncology, to verify diagnostic conclusions based on comparison with numerous full-color clinical photographs, and to locate required information quickly owing to the clinically focused and user-friendly format. In this volume guidance is provided on diagnosis and therapy for retinal tumors including vitreoretinal lymphoma and paraneoplastic disorders.

Design, Development, and Applications of Engineering Ceramics and Composites - Ceramic Transactions V215 (Hardcover, New): D.... Design, Development, and Applications of Engineering Ceramics and Composites - Ceramic Transactions V215 (Hardcover, New)
D. Singh
R3,062 Discovery Miles 30 620 Ships in 12 - 17 working days

This compilation of proceedings covering the latest scientific and technological developments in design, development, and applications of engineering ceramics and composites provides a useful one-stop resource for understanding the most important issues in design, development, and applications of engineering ceramics and composites. Logically organized and carefully selected articles give insight into design, development, and applications of engineering ceramics and composites and incorporates the latest developments related to design, development, and applications of engineering ceramics and composites including developments in engineering ceramics, advanced ceramic coatings, and geopolymers.

Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful... Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
R1,131 Discovery Miles 11 310 Ships in 10 - 15 working days

Use real-world reconnaissance techniques to efficiently gather sensitive information on systems and networks Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn how adversaries use reconnaissance techniques to discover security vulnerabilities on systems Develop advanced open source intelligence capabilities to find sensitive information Explore automated reconnaissance and vulnerability assessment tools to profile systems and networks Book DescriptionThis book explores reconnaissance techniques – the first step in discovering security vulnerabilities and exposed network infrastructure. It aids ethical hackers in understanding adversaries’ methods of identifying and mapping attack surfaces, such as network entry points, which enables them to exploit the target and steal confidential information. Reconnaissance for Ethical Hackers helps you get a comprehensive understanding of how threat actors are able to successfully leverage the information collected during the reconnaissance phase to scan and enumerate the network, collect information, and pose various security threats. This book helps you stay one step ahead in knowing how adversaries use tactics, techniques, and procedures (TTPs) to successfully gain information about their targets, while you develop a solid foundation on information gathering strategies as a cybersecurity professional. The concluding chapters will assist you in developing the skills and techniques used by real adversaries to identify vulnerable points of entry into an organization and mitigate reconnaissance-based attacks. By the end of this book, you’ll have gained a solid understanding of reconnaissance, as well as learned how to secure yourself and your organization without causing significant disruption.What you will learn Understand the tactics, techniques, and procedures of reconnaissance Grasp the importance of attack surface management for organizations Find out how to conceal your identity online as an ethical hacker Explore advanced open source intelligence (OSINT) techniques Perform active reconnaissance to discover live hosts and exposed ports Use automated tools to perform vulnerability assessments on systems Discover how to efficiently perform reconnaissance on web applications Implement open source threat detection and monitoring tools Who this book is forIf you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. Cybersecurity professionals will find this book useful in determining the attack surface of their organizations and assets on their network, while understanding the behavior of adversaries.

Clinical Ophthalmic Oncology - Orbital Tumors (Hardcover, 2nd ed. 2014): Julian D. Perry, Arun D. Singh Clinical Ophthalmic Oncology - Orbital Tumors (Hardcover, 2nd ed. 2014)
Julian D. Perry, Arun D. Singh
R4,525 Discovery Miles 45 250 Ships in 10 - 15 working days

Written by internationally renowned experts, Clinical Ophthalmic Oncology provides practical guidance and advice on the diagnosis and management of the complete range of ocular cancers. The book supplies all of the state-of-the-art knowledge required in order to identify these cancers early and to treat them as effectively as possible. Using the information provided, readers will be able to provide effective patient care using the latest knowledge on all aspects of ophthalmic oncology, to verify diagnostic conclusions based on comparison with numerous full-color clinical photographs, and to locate required information quickly owing to the clinically focused and user-friendly format. This volume describes the classification, differential diagnosis, and imaging of orbital tumors and discusses the most suitable treatment options for different tumor types. "

Mechanical Properties & Performance of Engineering  Ceramics and Composites IX - Ceramic Engineering  and Science Proceedings,... Mechanical Properties & Performance of Engineering Ceramics and Composites IX - Ceramic Engineering and Science Proceedings, Volume 35 Issue 2 (Hardcover, Volume 35, Issue 2)
D. Singh
R3,851 Discovery Miles 38 510 Ships in 12 - 17 working days

The Ceramic Engineering and Science Proceeding has been published by The American Ceramic Society since 1980. This series contains a collection of papers dealing with issues in both traditional ceramics (i.e., glass, whitewares, refractories, and porcelain enamel) and advanced ceramics. Topics covered in the area of advanced ceramic include bioceramics, nanomaterials, composites, solid oxide fuel cells, mechanical properties and structural design, advanced ceramic coatings, ceramic armor, porous ceramics, and more.

CompTIA Network+ N10-008 Certification Guide - The ultimate guide to passing the N10-008 exam (Paperback, 2nd Revised edition):... CompTIA Network+ N10-008 Certification Guide - The ultimate guide to passing the N10-008 exam (Paperback, 2nd Revised edition)
Glen D. Singh
R1,438 Discovery Miles 14 380 Ships in 10 - 15 working days

Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide. Purchase of the print or Kindle book includes a free eBook in the PDF format. Key Features A step-by-step guide to gaining a clear understanding of the Network+ certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-008 exam with the help of 200+ practice test questions and answers Book DescriptionThis book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach. You'll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you'll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques. By the end of this book, you'll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You'll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world. What you will learn Explore common networking concepts, services, and architecture Identify common cloud architecture and virtualization concepts Discover routing and switching technologies Implement wireless technologies and solutions Understand network security concepts to mitigate cyber attacks Explore best practices to harden networks from threats Use best practices to discover and resolve common networking issues Who this book is forThis book is for students, network administrators, network engineers, NOC engineers, systems administrators, cybersecurity professionals, and enthusiasts. No prior knowledge in networking is required to get started with this book.

Clinical Ophthalmic Oncology - Orbital Tumors (Hardcover, 3rd ed. 2019): Catherine J. Hwang, Bhupendra C.K. Patel, Arun D. Singh Clinical Ophthalmic Oncology - Orbital Tumors (Hardcover, 3rd ed. 2019)
Catherine J. Hwang, Bhupendra C.K. Patel, Arun D. Singh
R2,925 Discovery Miles 29 250 Ships in 12 - 17 working days

Written by internationally renowned experts, the 3rd edition of this six volume textbook provides detailed practical guidance and advice on the diagnosis and management of the complete range of ocular cancers. Supplying the reader with state-of-the-art knowledge required in order to identify these cancers early and to treat them as effectively as possible, this book is divided into six volumes: Basic Principles, Eyelid and Conjunctival Tumors, Orbital Tumors, Uveal Tumors, Retinal Tumors, and Retinoblastoma. The information presented enables readers to provide effective patient care using the latest knowledge on ophthalmic oncology and to verify diagnostic conclusions based on comparison with numerous full-color clinical photographs from the authors' private collections, histopathologic microphotographs, imaging studies, and crisp illustrations. Clinical Ophthalmic Oncology's clinically focused and user-friendly format allows for rapid retrieval of information in daily practice and is written for residents, fellows, and any physician involved in the care of patients with ocular or orbital malignancies. Additionally, this edition adds several hundred new images to improve comprehension of procedures and techniques. This volume discusses everything from the differential diagnosis and evaluation to orbital imaging and management.

Leaderboard - A Kid-Friendly Guide for Developing Leadership Skills (Paperback): Brittany D Singh Williams Leaderboard - A Kid-Friendly Guide for Developing Leadership Skills (Paperback)
Brittany D Singh Williams
R376 Discovery Miles 3 760 Ships in 10 - 15 working days
Cisco Certified CyberOps Associate 200-201 Certification Guide - Learn blue teaming strategies and incident response techniques... Cisco Certified CyberOps Associate 200-201 Certification Guide - Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents (Paperback)
Glen D. Singh
R1,426 Discovery Miles 14 260 Ships in 10 - 15 working days

Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certification Key Features Receive expert guidance on how to kickstart your career in the cybersecurity industry Gain hands-on experience while studying for the Cisco Certified CyberOps Associate certification exam Work through practical labs and exercises mapped directly to the exam objectives Book DescriptionAchieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt. The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry. By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide. What you will learn Incorporate security into your architecture to prevent attacks Discover how to implement and prepare secure designs Identify access control models for digital assets Identify point of entry, determine scope, contain threats, and remediate Find out how to perform malware analysis and interpretation Implement security technologies to detect and analyze threats Who this book is forThis book is for students who want to pursue a career in cybersecurity operations, threat detection and analysis, and incident response. IT professionals, network security engineers, security operations center (SOC) engineers, and cybersecurity analysts looking for a career boost and those looking to get certified in Cisco cybersecurity technologies and break into the cybersecurity industry will also benefit from this book. No prior knowledge of IT networking and cybersecurity industries is needed.

Kaalchakra Chronicles - The Incarnated (Paperback): Manish D. Singh Kaalchakra Chronicles - The Incarnated (Paperback)
Manish D. Singh
R760 Discovery Miles 7 600 Ships in 10 - 15 working days
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide - Begin a successful career in networking with 200-301... Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide - Begin a successful career in networking with 200-301 CCNA certification (Paperback)
Glen D. Singh
R1,101 Discovery Miles 11 010 Ships in 10 - 15 working days

Prepare to take the Cisco Certified Network Associate (200-301 CCNA) exam and get to grips with the essentials of networking, security, and automation Key Features Secure your future in network engineering with this intensive boot camp-style certification guide Gain knowledge of the latest trends in Cisco networking and security and boost your career prospects Design and implement a wide range of networking technologies and services using Cisco solutions Book DescriptionIn the dynamic technology landscape, staying on top of the latest technology trends is a must, especially if you want to build a career in network administration. Achieving CCNA 200-301 certification will validate your knowledge of networking concepts, and this book will help you to do just that. This exam guide focuses on the fundamentals to help you gain a high-level understanding of networking, security, IP connectivity, IP services, programmability, and automation. Starting with the functions of various networking components, you'll discover how they are used to build and improve an enterprise network. You'll then delve into configuring networking devices using a command-line interface (CLI) to provide network access, services, security, connectivity, and management. The book covers important aspects of network engineering using a variety of hands-on labs and real-world scenarios that will help you gain essential practical skills. As you make progress, this CCNA certification study guide will help you get to grips with the solutions and technologies that you need to implement and administer a broad range of modern networks and IT infrastructures. By the end of this book, you'll have gained the confidence to pass the Cisco CCNA 200-301 exam on the first attempt and be well-versed in a variety of network administration and security engineering solutions. What you will learn Understand the benefits of creating an optimal network Create and implement IP schemes in an enterprise network Design and implement virtual local area networks (VLANs) Administer dynamic routing protocols, network security, and automation Get to grips with various IP services that are essential to every network Discover how to troubleshoot networking devices Who this book is forThis guide is for IT professionals looking to boost their network engineering and security administration career prospects. If you want to gain a Cisco CCNA certification and start a career as a network security professional, you'll find this book useful. Although no knowledge about Cisco technologies is expected, a basic understanding of industry-level network fundamentals will help you grasp the topics covered easily.

Learn Kali Linux 2019 - Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark... Learn Kali Linux 2019 - Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark (Paperback)
Glen D. Singh
R1,147 Discovery Miles 11 470 Ships in 10 - 15 working days

Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key Features Get up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacks Learn to use Linux commands in the way ethical hackers do to gain control of your environment Book DescriptionThe current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently deal with crucial security aspects. Through real-world examples, you'll understand how to set up a lab and later explore core penetration testing concepts. Throughout the course of this book, you'll get up to speed with gathering sensitive information and even discover different vulnerability assessment tools bundled in Kali Linux 2019. In later chapters, you'll gain insights into concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections to further build on your pentesting skills. You'll also focus on techniques such as bypassing controls, attacking the end user and maintaining persistence access through social media. Finally, this pentesting book covers best practices for performing complex penetration testing techniques in a highly secured environment. By the end of this book, you'll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity. What you will learn Explore the fundamentals of ethical hacking Learn how to install and configure Kali Linux Get up to speed with performing wireless network pentesting Gain insights into passive and active information gathering Understand web application pentesting Decode WEP, WPA, and WPA2 encryptions using a variety of methods, such as the fake authentication attack, the ARP request replay attack, and the dictionary attack Who this book is forIf you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2019.2, then this book is for you. The book will also help if you're simply looking to learn more about ethical hacking and various security breaches. Although prior knowledge of Kali Linux is not necessary, some understanding of cybersecurity will be useful.

Hands-On Penetration Testing with Kali NetHunter - Spy on and protect vulnerable ecosystems using the power of Kali Linux for... Hands-On Penetration Testing with Kali NetHunter - Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go (Paperback)
Glen D. Singh, Sean Philip Oriyano
R1,098 Discovery Miles 10 980 Ships in 10 - 15 working days

Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data Book DescriptionKali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor. What you will learn Choose and configure a hardware device to use Kali NetHunter Use various tools during pentests Understand NetHunter suite components Discover tips to effectively use a compact mobile platform Create your own Kali NetHunter-enabled device and configure it for optimal results Learn to scan and gather information from a target Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices Who this book is forHands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful.

Bhaktivedanta Institute Monograph Series - Produced for the 1977 Life Comes from Life Conference (Paperback): Richard L.... Bhaktivedanta Institute Monograph Series - Produced for the 1977 Life Comes from Life Conference (Paperback)
Richard L. Thompson, Thoudam D Singh
R545 Discovery Miles 5 450 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Cadac Jet 24 For Skottel 8309s And…
R95 Discovery Miles 950
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990
How To Fix (Unf*ck) A Country - 6 Things…
Roy Havemann Paperback R310 R210 Discovery Miles 2 100
Bestway Hydro-Swim Squiggle Wiggle Dive…
R62 Discovery Miles 620
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Stealth SX-C10-X Twin Rechargeable…
R499 R269 Discovery Miles 2 690
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Gale Hayman Delicious Cotton Candy Eau…
R1,484 R862 Discovery Miles 8 620
Genuine Leather Wallet With Clip Closure…
R299 R246 Discovery Miles 2 460

 

Partners