0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (6)
  • R5,000 - R10,000 (3)
  • -
Status
Brand

Showing 1 - 13 of 13 matches in All Departments

Taurine 4 - Taurine and Excitable Tissues (Hardcover, 2002 ed.): Laura Della Corte, Ryan J. Huxtable, Giampietro Sgaragli,... Taurine 4 - Taurine and Excitable Tissues (Hardcover, 2002 ed.)
Laura Della Corte, Ryan J. Huxtable, Giampietro Sgaragli, Keith F. Tipton
R5,976 Discovery Miles 59 760 Ships in 10 - 15 working days

Mitochondria from mammalian tissues possess an elaborate system for 2+ 2+ transporting Ca across their inner membrane which consists of Ca import, 2+ via the Ca uniporter, in response to the mitochondrial membrane 2+ + potential ?? and of Ca release by an antiport system in exchange for H + 9,23 or Na (see Fig. l) . Because the uniporter is dependent upon the external 2+ 2+ 2+ 2+ Ca concentration ([Ca ]), mitochondria accumulate Ca until the [Ca ] o o 2+ decreases to the level at which the uniporter activity balances the Ca efflux. 2+ The [Ca ] at which the uniporter and efflux activities are equal is defined o the "setpoint" andcorresponds to values between 0.3-3M. 2+ Figure 1. The Ca transport system of the inner membrane of mammalian mitochondria. U, + 2+ + + uniporter. I, Na -independent efflux mechanism or Ca /2H exchanger. D, Na -dependent 2+ + efflux mechanism or Ca /2Na exchanger. PTP, permeability transition pore. FP, 11 flavoprotein. ?? membrane potential. ? pH gradient. Adapted from .

Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition): R. Anderson, J. D Dewar Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition)
R. Anderson, J. D Dewar; Edited by Harold F. Tipton
R2,304 Discovery Miles 23 040 Ships in 12 - 19 working days

The (ISC)(2) (R) Systems Security Certified Practitioner (SSCP (R)) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK (R) has quickly become the book that many of today's security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)(2) CBK. Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text: Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)(2) certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Information Security Management Handbook (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause
R8,104 Discovery Miles 81 040 Ships in 12 - 19 working days

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.

The Rise of Asia - Economics, Society and Politics in Contemporary Asia (Hardcover): F. Tipton The Rise of Asia - Economics, Society and Politics in Contemporary Asia (Hardcover)
F. Tipton
R4,949 Discovery Miles 49 490 Ships in 12 - 19 working days

The shifting balance of economic power away from Western Europe and the United States and towards East and Southeast Asia - firstly Japan, then the small 'Tiger' economies, and now the larger nations of Southeast Asia and China, the potential 'Dragons' - has provoked anger, dismay and a search for the 'secrets' of growth and for 'lessons' to be learned. The Rise of Asia brings together recent scholarship analysing the process of economic, social and political development in East and Southeast Asia from the mid-nineteenth century to the present day.

Information Security Management Handbook, Volume 6 (Paperback, 6th edition): Harold F. Tipton, Micki Krause Nozaki Information Security Management Handbook, Volume 6 (Paperback, 6th edition)
Harold F. Tipton, Micki Krause Nozaki
R1,535 Discovery Miles 15 350 Ships in 12 - 19 working days

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), this volume features new information on advanced persistent threats, HIPAA requirements, social networks, virtualization, and SOA. Its comprehensive coverage touches on all the key areas IT security professionals need to know, including: Access Control: Technologies and administration including the requirements of current laws Telecommunications and Network Security: Addressing the Internet, intranet, and extranet Information Security and Risk Management: Organizational culture, preparing for a security audit, and the risks of social media Application Security: Ever-present malware threats and building security into the development process Security Architecture and Design: Principles of design including zones of trust Cryptography: Elliptic curve cryptosystems, format-preserving encryption Operations Security: Event analysis Business Continuity and Disaster Recovery Planning: Business continuity in the cloud Legal, Regulations, Compliance, and Investigation: Persistent threats and incident response in the virtual realm Physical Security: Essential aspects of physical security The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

Information Security Management Handbook, Volume 6 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Nozaki Information Security Management Handbook, Volume 6 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause Nozaki
R4,517 Discovery Miles 45 170 Ships in 12 - 19 working days

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), this volume features new information on advanced persistent threats, HIPAA requirements, social networks, virtualization, and SOA. Its comprehensive coverage touches on all the key areas IT security professionals need to know, including: Access Control: Technologies and administration including the requirements of current laws Telecommunications and Network Security: Addressing the Internet, intranet, and extranet Information Security and Risk Management: Organizational culture, preparing for a security audit, and the risks of social media Application Security: Ever-present malware threats and building security into the development process Security Architecture and Design: Principles of design including zones of trust Cryptography: Elliptic curve cryptosystems, format-preserving encryption Operations Security: Event analysis Business Continuity and Disaster Recovery Planning: Business continuity in the cloud Legal, Regulations, Compliance, and Investigation: Persistent threats and incident response in the virtual realm Physical Security: Essential aspects of physical security The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

Information Security Management Handbook, Volume 5 (Hardcover, 6th edition): Micki Krause Nozaki, Harold F. Tipton Information Security Management Handbook, Volume 5 (Hardcover, 6th edition)
Micki Krause Nozaki, Harold F. Tipton
R4,525 Discovery Miles 45 250 Ships in 12 - 19 working days

Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning. The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations.

Information Security Management Handbook, Volume 3 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook, Volume 3 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause
R4,492 Discovery Miles 44 920 Ships in 12 - 19 working days

Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know.

Captures the crucial elements of the CBK

Exploring the ten domains of the CBK, the book explores access control, telecommunications and network security, information security and risk management, application security, and cryptography. In addition, the expert contributors address security architecture and design, operations security, business continuity planning and disaster recovery planning. The book also covers legal regulations, compliance, investigation, and physical security. In this anthology of treatises dealing with the management and technical facets of information security, the contributors examine varied topics such as anywhere computing, virtualization, podslurping, quantum computing, mashups, blue snarfing, mobile device theft, social computing, voting machine insecurity, and format string vulnerabilities.

Also available on CD-ROM

Safeguarding information continues to be a crucial concern of all IT professionals. As new risks threaten the security of our systems, it is imperative that those charged with protecting that information continually update their armor of knowledge to guard against tomorrow's hackers and software vulnerabilities. This comprehensive Handbook, also available in fully searchable CD-ROM format keeps IT professionals abreast of new developments on the security horizon and reinforces timeless concepts, providing them with the best information, guidance, and counsel they can obtain.

Information Security Management Handbook, Volume 2 (Paperback, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook, Volume 2 (Paperback, 6th edition)
Harold F. Tipton, Micki Krause
R1,917 Discovery Miles 19 170 Ships in 12 - 19 working days

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job.

Information Security Management Handbook, Volume 4 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Nozaki Information Security Management Handbook, Volume 4 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause Nozaki
R4,522 Discovery Miles 45 220 Ships in 12 - 19 working days

Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance.

Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP(r) Common Body of Knowledge (CBK(r)). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography.

As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.

Information Security Management Handbook, Volume 2 (Hardcover, 6th edition): Harold F. Tipton, Micki Krause Information Security Management Handbook, Volume 2 (Hardcover, 6th edition)
Harold F. Tipton, Micki Krause
R4,061 Discovery Miles 40 610 Ships in 12 - 19 working days

A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT professionals updated and current in their field and on the job.

Taurine 4 - Taurine and Excitable Tissues (Paperback, Softcover reprint of the original 1st ed. 2002): Laura Della Corte, Ryan... Taurine 4 - Taurine and Excitable Tissues (Paperback, Softcover reprint of the original 1st ed. 2002)
Laura Della Corte, Ryan J. Huxtable, Giampietro Sgaragli, Keith F. Tipton
R5,690 Discovery Miles 56 900 Ships in 10 - 15 working days

Mitochondria from mammalian tissues possess an elaborate system for 2+ 2+ transporting Ca across their inner membrane which consists of Ca import, 2+ via the Ca uniporter, in response to the mitochondrial membrane 2+ + potential ?? and of Ca release by an antiport system in exchange for H + 9,23 or Na (see Fig. l) . Because the uniporter is dependent upon the external 2+ 2+ 2+ 2+ Ca concentration ([Ca ]), mitochondria accumulate Ca until the [Ca ] o o 2+ decreases to the level at which the uniporter activity balances the Ca efflux. 2+ The [Ca ] at which the uniporter and efflux activities are equal is defined o the "setpoint" andcorresponds to values between 0.3-3M. 2+ Figure 1. The Ca transport system of the inner membrane of mammalian mitochondria. U, + 2+ + + uniporter. I, Na -independent efflux mechanism or Ca /2H exchanger. D, Na -dependent 2+ + efflux mechanism or Ca /2Na exchanger. PTP, permeability transition pore. FP, 11 flavoprotein. ?? membrane potential. ? pH gradient. Adapted from .

Information Security Management Handbook, Volume 4 (Paperback, 6th edition): Harold F. Tipton, Micki Krause Nozaki Information Security Management Handbook, Volume 4 (Paperback, 6th edition)
Harold F. Tipton, Micki Krause Nozaki
R1,923 Discovery Miles 19 230 Ships in 12 - 19 working days

Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Providing an up-to-date compilation of the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, Sixth Edition, Volume 4 reflects the latest changes to information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, and governance. New material also addresses risk management, business continuity planning, disaster recovery planning, and cryptography. As the risks that threaten the security of our systems continue to evolve, it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format, this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments, new vulnerabilities, and possible threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Nutritional Epigenomics, Volume 14
Bradley S. Ferguson Paperback R4,264 Discovery Miles 42 640
Emerging Nanotechnologies in Immunology…
Ranjita Shegokar, Eliana B. Souto Hardcover R3,510 R3,280 Discovery Miles 32 800
Fundamentals of Nanotoxicology…
P.K. Gupta Paperback R3,129 Discovery Miles 31 290
Process-Induced Food Toxicants…
RH Stadler Hardcover R5,013 Discovery Miles 50 130
Personal Care Products and Human Health
Philippa D. Darbre Paperback R3,147 Discovery Miles 31 470
Cytotoxicity
Tulay Askin Celik Hardcover R3,370 Discovery Miles 33 700
Bone Toxicology
Susan Y. Smith, Aurore Varela, … Hardcover R5,888 Discovery Miles 58 880
Handbook of Arsenic Toxicology
Swaran Jeet Singh Flora Hardcover R4,258 R3,825 Discovery Miles 38 250
Clinical Applications of Botulinum…
Keith A Foster Hardcover R4,354 Discovery Miles 43 540
Processing Contaminants in Edible Oils…
Shaun MacMahon, Jessica K. Beekman Paperback R3,702 Discovery Miles 37 020

 

Partners