0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 20 of 20 matches in All Departments

Green Innovation, Sustainable Development, and Circular Economy (Hardcover): Nitin Kumar Singh, Siddhartha Pandey, Himanshu... Green Innovation, Sustainable Development, and Circular Economy (Hardcover)
Nitin Kumar Singh, Siddhartha Pandey, Himanshu Sharma, Sunkulp Goel
R4,745 Discovery Miles 47 450 Ships in 12 - 17 working days

Although green innovation and technology is not new, so far very limited information is available regarding the diversified approaches for green technologies and engineering. This book highlights the challenges and opportunities, offering a roadmap for using various approaches in the most cost effective way. The book discusses the interrelationship between a circular economy and green technologies. It presents the dimensions of green innovations and illustrates the challenges of industrialization, especially in terms of material synthesis and utilized processes. It covers the current environmental and health challenges of societies and describes the role of stakeholders in developing sustainable societies and industries. This book provides a line of approach to core and interdisciplinary students, academicians, research scientists, and various industry personnel to present their ideas of green innovations with a common vision of sustainable development of community and industries in mind. Features Discusses the interrelationship between a circular economy and green technologies Presents the dimensions of green innovations Illustrates the challenges of industrialization, especially in terms of material synthesis and utilized processes Covers the current environmental and health challenges of societies Offers the identification and role of stakeholders in the sustainable development of societies and industries

Data-Driven Approaches for Effective Managerial Decision Making (Hardcover): Anubha, Himanshu Sharma Data-Driven Approaches for Effective Managerial Decision Making (Hardcover)
Anubha, Himanshu Sharma
R7,093 Discovery Miles 70 930 Ships in 10 - 15 working days

In today's competitive market, a manager must be able to look at data, understand it, analyze it, and then interpret it to design a smart business strategy. Big data is also a valuable source of information on how customers interact with firms through various mediums such as social media platforms, online reviews, and many more. The applications and uses of business analytics are numerous and must be further studied to ensure they are utilized appropriately. Data-Driven Approaches for Effective Managerial Decision Making investigates management concepts and applications using data analytics and outlines future research directions. The book also addresses contemporary advancements and innovations in the field of management. Covering key topics such as big data, business intelligence, and artificial intelligence, this reference work is ideal for managers, business owners, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

Data-Driven Approaches for Effective Managerial Decision Making (Paperback): Anubha, Himanshu Sharma Data-Driven Approaches for Effective Managerial Decision Making (Paperback)
Anubha, Himanshu Sharma
R5,481 Discovery Miles 54 810 Ships in 10 - 15 working days

In today's competitive market, a manager must be able to look at data, understand it, analyze it, and then interpret it to design a smart business strategy. Big data is also a valuable source of information on how customers interact with firms through various mediums such as social media platforms, online reviews, and many more. The applications and uses of business analytics are numerous and must be further studied to ensure they are utilized appropriately. Data-Driven Approaches for Effective Managerial Decision Making investigates management concepts and applications using data analytics and outlines future research directions. The book also addresses contemporary advancements and innovations in the field of management. Covering key topics such as big data, business intelligence, and artificial intelligence, this reference work is ideal for managers, business owners, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

Attribution Modelling in Google Ads and Facebook (Paperback): Himanshu Sharma Attribution Modelling in Google Ads and Facebook (Paperback)
Himanshu Sharma
R2,294 Discovery Miles 22 940 Ships in 10 - 15 working days
Attribution Modelling in Google Analytics and Beyond (Paperback): Himanshu Sharma Attribution Modelling in Google Analytics and Beyond (Paperback)
Himanshu Sharma
R2,295 Discovery Miles 22 950 Ships in 10 - 15 working days
Veer Tanaji Malusare (Paperback): Himanshu Sharma Veer Tanaji Malusare (Paperback)
Himanshu Sharma
R244 Discovery Miles 2 440 Ships in 10 - 15 working days
Attention - The Ultimate Antidote for Tension (Paperback): Himanshu Sharma (Shunyo) Attention - The Ultimate Antidote for Tension (Paperback)
Himanshu Sharma (Shunyo)
R331 Discovery Miles 3 310 Ships in 10 - 15 working days
Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation... Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation (Paperback)
Harpreet Singh, Himanshu Sharma
R1,212 Discovery Miles 12 120 Ships in 10 - 15 working days

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

Attribution Modelling in Google Ads and Facebook (Paperback): Himanshu Sharma Attribution Modelling in Google Ads and Facebook (Paperback)
Himanshu Sharma
R2,535 R2,369 Discovery Miles 23 690 Save R166 (7%) Ships in 10 - 15 working days
Kali Linux - An Ethical Hacker's Cookbook - Practical recipes that combine strategies, attacks, and tools for advanced... Kali Linux - An Ethical Hacker's Cookbook - Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition (Paperback, 2nd Revised edition)
Himanshu Sharma
R1,355 Discovery Miles 13 550 Ships in 10 - 15 working days

Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features Practical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Book DescriptionMany organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book's crisp and task-oriented recipes. What you will learn Learn how to install, set up and customize Kali for pentesting on multiple platforms Pentest routers and embedded devices Get insights into fiddling around with software-defined radio Pwn and escalate through a corporate network Write good quality security reports Explore digital forensics and memory analysis with Kali Linux Who this book is forIf you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed.

Hands-On Red Team Tactics - A practical guide to mastering Red Team operations (Paperback): Himanshu Sharma, Harpreet Singh Hands-On Red Team Tactics - A practical guide to mastering Red Team operations (Paperback)
Himanshu Sharma, Harpreet Singh
R1,243 Discovery Miles 12 430 Ships in 10 - 15 working days

Your one-stop guide to learning and implementing Red Team tactics effectively Key Features Target a complex enterprise environment in a Red Team activity Detect threats and respond to them with a real-world cyber-attack simulation Explore advanced penetration testing tools and techniques Book DescriptionRed Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities. Hands-On Red Team Tactics starts with an overview of pentesting and Red Teaming, before giving you an introduction to few of the latest pentesting tools. We will then move on to exploring Metasploit and getting to grips with Armitage. Once you have studied the fundamentals, you will learn how to use Cobalt Strike and how to set up its team server. The book introduces some common lesser known techniques for pivoting and how to pivot over SSH, before using Cobalt Strike to pivot. This comprehensive guide demonstrates advanced methods of post-exploitation using Cobalt Strike and introduces you to Command and Control (C2) servers and redirectors. All this will help you achieve persistence using beacons and data exfiltration, and will also give you the chance to run through the methodology to use Red Team activity tools such as Empire during a Red Team activity on Active Directory and Domain Controller. In addition to this, you will explore maintaining persistent access, staying untraceable, and getting reverse connections over different C2 covert channels. By the end of this book, you will have learned about advanced penetration testing tools, techniques to get reverse shells over encrypted channels, and processes for post-exploitation. What you will learn Get started with red team engagements using lesser-known methods Explore intermediate and advanced levels of post-exploitation techniques Get acquainted with all the tools and frameworks included in the Metasploit framework Discover the art of getting stealthy access to systems via Red Teaming Understand the concept of redirectors to add further anonymity to your C2 Get to grips with different uncommon techniques for data exfiltration Who this book is forHands-On Red Team Tactics is for you if you are an IT professional, pentester, security consultant, or ethical hacker interested in the IT security domain and wants to go beyond Penetration Testing. Prior knowledge of penetration testing is beneficial.

Kali Linux - An Ethical Hacker's Cookbook (Paperback): Himanshu Sharma Kali Linux - An Ethical Hacker's Cookbook (Paperback)
Himanshu Sharma
R1,323 Discovery Miles 13 230 Ships in 10 - 15 working days

Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book * Practical recipes to conduct effective penetration testing using the powerful Kali Linux * Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease * Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn * Installing, setting up and customizing Kali for pentesting on multiple platforms * Pentesting routers and embedded devices * Bug hunting 2017 * Pwning and escalating through corporate network * Buffer over?ows 101 * Auditing wireless networks * Fiddling around with software-defned radio * Hacking on the run with NetHunter * Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.

Master the Essentials of Email Marketing Analytics (Paperback): Himanshu Sharma Master the Essentials of Email Marketing Analytics (Paperback)
Himanshu Sharma
R594 Discovery Miles 5 940 Ships in 10 - 15 working days
Maths and Stats for Web Analytics and Conversion Optimization - The journey from 'data driven' to 'data... Maths and Stats for Web Analytics and Conversion Optimization - The journey from 'data driven' to 'data smart' (Paperback)
Himanshu Sharma
R1,312 Discovery Miles 13 120 Ships in 10 - 15 working days
Computerised Information System & Its Applications to Decision-Making (Paperback): Himanshu Sharma Computerised Information System & Its Applications to Decision-Making (Paperback)
Himanshu Sharma
R1,296 Discovery Miles 12 960 Ships in 10 - 15 working days

Information is the most important element for every business to run. Every industry such as banking, healthcare, telecom, defense, aerospace, education, politics etc. needs information to perform their operations and functional processes. Hence, 'Information Systems' is now become most significant tool for industries through which they can manage complex information, make effective policies, set long term goals, and get competitive advantage in the market. This work deals with the attempts to explore the various applications of information systems and their significance in different sectors such as academic institutions, service industries, and law and enforcement agencies. It includes valuable references for students and professionals working in the field of information systems.

Pharmacognostical studies on some selected medicinal plants (Paperback): Himanshu Sharma, Ashwani Kumar Pharmacognostical studies on some selected medicinal plants (Paperback)
Himanshu Sharma, Ashwani Kumar
R2,065 Discovery Miles 20 650 Ships in 10 - 15 working days

The history of medicinal plants is intimately connected with the history of botany. Primitive man lived at the mercy of nature, in constant terror of diseases. Natural health care is getting important world over as the human race is suffering from life style diseases. In India, the ayurvedic system of medicine has been in use for over three thousand years. Ethnopharmacognosyincludes the study of traditional concepts or methods for distinguishing between various plant parts such as bark, leaves, seeds, tubers, etc. and indigenous ways of distinction, if any, between the quality of such products from collections in different seasons or situations.Medicinal plants with anti-tumour potential elaborated: Ageratum conyzoides Aloe vera Curcuma longa Vinca rosea Taxus baccataMedicinal plants with anti-HIV potential have been presented. The book will be extremely useful for students, teachers, researchers and medical practitioners and and industry

Veer Tanaji Malusare (??? ?????? ???????) (Hindi, Paperback): Himanshu Sharma Veer Tanaji Malusare (??? ?????? ???????) (Hindi, Paperback)
Himanshu Sharma
R244 Discovery Miles 2 440 Ships in 10 - 15 working days
Kya Hua? PMC Ghotala (Hindi, Paperback): Himanshu Sharma Kya Hua? PMC Ghotala (Hindi, Paperback)
Himanshu Sharma
R213 Discovery Miles 2 130 Ships in 10 - 15 working days
Narveer Tanaji Malusare (Marathi, Paperback): Himanshu Sharma Narveer Tanaji Malusare (Marathi, Paperback)
Himanshu Sharma
R243 Discovery Miles 2 430 Ships in 10 - 15 working days
Supreme Court Ka Faisla - Kiski Jeet, Kiski Har? (Hindi, Paperback): Himanshu Sharma Supreme Court Ka Faisla - Kiski Jeet, Kiski Har? (Hindi, Paperback)
Himanshu Sharma
R210 Discovery Miles 2 100 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lucky Define - Plastic 3 Head…
R397 Discovery Miles 3 970
Bostik GluGo - Adhesive Remover (90ml)
R54 Discovery Miles 540
Bestway Floating Pool Thermometer
R56 Discovery Miles 560
First Dutch Brands Leaf Design Hanging…
R135 Discovery Miles 1 350
Cable Guys Controller and Smartphone…
R399 R349 Discovery Miles 3 490
Bostik Super Clear Tape on Dispenser…
R44 Discovery Miles 440
Complete Snack-A-Chew Iced Dog Biscuits…
R110 R104 Discovery Miles 1 040
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Batten Holder Brass 50mm Zenith (3 Pack)
R225 Discovery Miles 2 250
Complete Maintenance Dog Food - Large to…
R1,066 Discovery Miles 10 660

 

Partners