|
Showing 1 - 22 of
22 matches in All Departments
The first history of schooling gathered as a single and continuous text since the 1980s. It is also the first attempt to put together a history of South African schooling from the perspective of the subjugated people.
It attempts to show, as South Africa moves from a landscape essentially marked by encounters of people at different frontiers – physical, geographical, economic, cultural and psychological (where only the first two have previously received real attention) – how education is conceptualised, mobilised and used by all the players in the emerging country from the colonial Dutch and British periods into apartheid.
This book covers the period of the history of South African schooling from the establishment of the first school in 1658 to 1910 when South Africa became a Union. It approaches the task of narrating this history as a deliberate intervention. The intervention is that of restoring into the narrative the place of the subjugated people in the unfolding of a landscape which they share with a racialised white community. Propelled by a post-colonial framing of South Africa’s history, it offers itself as a deliberate counter to dominant historiographic and systematic privileging of the country’s elites. As such, it works on a larger canvas than simply the school. It deliberately works the story of schooling alongside the bigger socioeconomic history of South Africa, i.e., Dutch settlement of the Cape, the arrival of colonial Britain and the dramatic discovery of gold and diamonds leading to the industrialisation of South Africa. The story of schooling, the text seeks to emphasise, cannot be told independently of what is going on economically, politically and socially in the making of modern South Africa. Modernity, as a consequence, is a major theme of the book.
In telling the story of formal schooling in South Africa, the text, critically, seeks to retrieve the experience of the subjugated to present a wider and larger canvas upon which to describe the process of the making of the South African school. The text works historically with the Dutch East Indian experience up until 1804 when schooling was characterised by its neglect. It shows then how it develops a systematic character through the institutionalisation of a formal system in 1839 and the initiatives of missionaries. It draws the story to a close by looking at how formal systems are established in the colonies, the Boer Republics and the protectorates.
Thematically, the text seeks to thread through the conceits of race and class to show how, contradictorily, they take expression through conflict and struggle. In this conflict and struggle people who are not white (i.e., they do not yet have the racialised labels that apartheid brings in the middle of the 20th century) are systematically marginalised and discriminated against. They work with their discrimination, however, in generative ways by taking opportunity when it arises and exercising political agency.
The book is important because it explains the roots of educational inequality. It shows how inequality is systematically installed in almost every step of the way. For a period, in the middle of the 19th century, attempts were made to forestall this inequality. The text shows how the British administration acceded to eugenicist influences which pushed children of colour out of what were called first-class schools into segregated missionary-run institutions.
Windows 2003 Server is unquestionably the dominant enterprise level
operating system in the industry, with 95% of all companies running
it. And for the last tow years, over 50% of all product upgrades
have been security related. Securing Windows Server, according to
bill gates, is the company's #1 priority.
The book will start off by teaching readers to create the
conceptual design of their Active Directory infrastructure by
gathering and analyzing business and technical requirements. Next,
readers will create the logical design for an Active Directory
infrastructure. Here the book starts to drill deeper and focus on
aspects such as group policy design. Finally, readers will learn to
create the physical design for an active directory and network
Infrastructure including DNS server placement; DC and GC placements
and Flexible Single Master Operations (FSMO) role placement.
The next book in our best selling and critically acclaimed How to
Cheat series. This is the perfect book for users who have already
purchased How to Cheat at Managing Windows 2003 Small Business
Server.
* Active Directory is the market leader in the directory services
space, and 57% of all Microsoft corporate customers have deployed
AD
* Follows Syngress's proven "How To Cheat" methodology
* Companion Web site offers dozens of templates, "Cheat Sheets,"
and checklists for readers
CompTIA's Network+ certification is a globally-recognized,
vendor neutral exam that has helped over 235,000 IT professionals
reach further and higher in their careers. The 2009 Network+ exam
(N10-004) is a major update with more focus on security and
wireless aspects of networking. Our new study guide has been
updated accordingly with focus on network, systems, and WAN
security and complete coverage of today's wireless networking
standards. As always this companion covers the core Network+
material including basic design principles, management and
operation of a network infrastructure, and testing tools. After
reading this book not only will you be able to ace the exam but you
will be able to maintain, troubleshoot, and install computer
networks.
New to this edition are: Intensified focus on network
securityTwo NEW practice exams to help eliminate test-day
jittersTiered chapter ending quesitons that allow gradual
learning
New to this edition in accordance with the newly revised exam is an
intensified focus on network securityTwo NEW practice exams to help
eliminate test-day jittersTiered chapter ending questions that
allow for graduated learningCovers everything from test taking
techniques to advanced topics - keeping the beginner and
intermediate IT professional in mindLayout of the guide parallels
the Network+ N10-004 objectives for ease of study
Social networks, particularly public ones, have become part of
the fabric of how we communicate and collaborate as a society. With
value from micro-level personal networking to macro-level outreach,
social networking has become pervasive in people s lives and is now
becoming a significant driving force in business. These new
platforms have provided new approaches to many critical enterprise
functions, including identifying, communicating, and gathering
feedback with customers (e.g., Facebook, Ning); locating expertise
(e.g., LinkedIn); providing new communication platforms (e.g.,
Twitter); and collaborating with a community, small or large (e.g.,
wikis). However, many organizations have stayed away from potential
benefits of social networks because of the significant risks
associated with them. This book will help an organization
understand the risks present in social networks and provide a
framework covering policy, training and technology to address those
concerns and mitigate the risks presented to leverage social media
in their organization. The book also acknowledges that many
organizations have already exposed themselves to more risk than
they think from social networking and offers strategies for
"dialing it back" to retake control.
Defines an organization's goals for social networkingPresents the
risks present in social networking and how to mitigate themExplains
how to maintain continuous social networking security"
"Google Earth Forensics" is the first book to explain how to use
Google Earth in digital forensic investigations. This book teaches
you how to leverage Google's free tool to craft compelling
location-based evidence for use in investigations and in the
courtroom. It shows how to extract location-based data that can be
used to display evidence in compelling audiovisual manners that
explain and inform the data in contextual, meaningful, and
easy-to-understand ways.
As mobile computing devices become more and more prevalent and
powerful, they are becoming more and more useful in the field of
law enforcement investigations and forensics. Of all the widely
used mobile applications, none have more potential for helping
solve crimes than those with geo-location tools.
Written for investigators and forensic practitioners, "Google
Earth Forensics" is written by an investigator and trainer with
more than 13 years of experience in law enforcement who will show
you how to use this valuable tool anywhere at the crime scene, in
the lab, or in the courtroom.
Learn how to extract location-based evidence using the Google Earth
program or app on computers and mobile devicesCovers the basics of
GPS systems, the usage of Google Earth, and helps sort through data
imported from external evidence sourcesIncludes tips on presenting
evidence in compelling, easy-to-understand formats
When it comes to computer crimes, the criminals got a big head
start. But the law enforcement and IT security communities are now
working diligently to develop the knowledge, skills, and tools to
successfully investigate and prosecute Cybercrime cases. When the
first edition of "Scene of the Cybercrime" published in 2002, it
was one of the first books that educated IT security professionals
and law enforcement how to fight Cybercrime. Over the past 5 years
a great deal has changed in how computer crimes are perpetrated and
subsequently investigated. Also, the IT security and law
enforcement communities have dramatically improved their ability to
deal with Cybercrime, largely as a result of increased spending and
training. According to the 2006 Computer Security Institute's and
FBI's joint Cybercrime report: 52% of companies reported
unauthorized use of computer systems in the prior 12 months. Each
of these incidents is a Cybecrime requiring a certain level of
investigation and remediation. And in many cases, an investigation
is mandates by federal compliance regulations such as
Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data
Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and
updated book which covers all of the technological, legal, and
regulatory changes, which have occurred since the first edition.
The book is written for dual audience; IT security professionals
and members of law enforcement. It gives the technical experts a
little peek into the law enforcement world, a highly structured
environment where the "letter of the law" is paramount and
procedures must be followed closely lest an investigation be
contaminated and all the evidence collected rendered useless. It
also provides law enforcement officers with an idea of some of the
technical aspects of how cyber crimes are committed, and how
technology can be used to track down and build a case against the
criminals who commit them. Scene of the Cybercrime, Second Editions
provides a roadmap that those on both sides of the table can use to
navigate the legal and technical landscape to understand, prevent,
detect, and successfully prosecute the criminal behavior that is as
much a threat to the online community as "traditional" crime is to
the neighborhoods in which we live. Also included is an all new
chapter on Worldwide Forensics Acts and Laws.
* Companion Web site provides custom tools and scripts, which
readers can download for conducting digital, forensic
investigations.
* Special chapters outline how Cybercrime investigations must be
reported and investigated by corporate IT staff to meet federal
mandates from Sarbanes Oxley, and the Payment Card Industry (PCI)
Data Security Standard
* Details forensic investigative techniques for the most common
operating systems (Windows, Linux and UNIX) as well as cutting edge
devices including iPods, Blackberries, and cell phones.
Many exciting frontiers of science and engineering require
understanding the spatiotemporal properties of sustained
nonequilibrium systems such as fluids, plasmas, reacting and
diffusing chemicals, crystals solidifying from a melt, heart
muscle, and networks of excitable neurons in brains. This
introductory textbook for graduate students in biology, chemistry,
engineering, mathematics, and physics provides a systematic account
of the basic science common to these diverse areas. This book
provides a careful pedagogical motivation of key concepts,
discusses why diverse nonequilibrium systems often show similar
patterns and dynamics, and gives a balanced discussion of the role
of experiments, simulation, and analytics. It contains numerous
worked examples and over 150 exercises. This book will also
interest scientists who want to learn about the experiments,
simulations, and theory that explain how complex patterns form in
sustained nonequilibrium systems.
The Basics of Cyber Safety: Computer and Mobile Device Safety Made
Easy presents modern tactics on how to secure computer and mobile
devices, including what behaviors are safe while surfing,
searching, and interacting with others in the virtual world. The
book's author, Professor John Sammons, who teaches information
security at Marshall University, introduces readers to the basic
concepts of protecting their computer, mobile devices, and data
during a time that is described as the most connected in history.
This timely resource provides useful information for readers who
know very little about the basic principles of keeping the devices
they are connected to-or themselves-secure while online. In
addition, the text discusses, in a non-technical way, the cost of
connectedness to your privacy, and what you can do to it, including
how to avoid all kinds of viruses, malware, cybercrime, and
identity theft. Final sections provide the latest information on
safe computing in the workplace and at school, and give parents
steps they can take to keep young kids and teens safe online.
The book begins with real world cases of botnet attacks to
underscore the need for action. Next the book will explain botnet
fundamentals using real world examples. These chapters will cover
what they are, how they operate, and the environment and technology
that makes them possible. The following chapters will analyze
botnets for opportunities to detect, track, and remove them. Then
the book will describe intelligence gathering efforts and results
obtained to date. Public domain tools like OurMon, developed by Jim
Binkley of Portland State University, will be described in detail
along with discussions of other tools and resources that are useful
in the fight against Botnets.
* This is the first book to explain the newest internet threat -
Botnets, zombie armies, bot herders, what is being done, and what
you can do to protect your enterprise
* Botnets are the most complicated and difficult threat the hacker
world has unleashed - read how to protect yourself
Over 75% of network attacks are targeted at the web application
layer. This book provides explicit hacks, tutorials, penetration
tests, and step-by-step demonstrations for security professionals
and Web application developers to defend their most vulnerable
applications.
This book defines Web application security, why it should be
addressed earlier in the lifecycle in development and quality
assurance, and how it differs from other types of Internet
security. Additionally, the book examines the procedures and
technologies that are essential to developing, penetration testing
and releasing a secure Web application. Through a review of recent
Web application breaches, the book will expose the prolific methods
hackers use to execute Web attacks using common vulnerabilities
such as SQL Injection, Cross-Site Scripting and Buffer Overflows in
the application layer. By taking an in-depth look at the techniques
hackers use to exploit Web applications, readers will be better
equipped to protect confidential.
* The Yankee Group estimates the market for Web
application-security products and services will grow to $1.74
billion by 2007 from $140 million in 2002 * Author Michael Cross is
a highly sought after speaker who regularly delivers Web
Application presentations at leading conferences including: Black
Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security,
RSA Conferences, and more * The Companion Web site will have
downloadable code and scripts presented in the book (http:
//www.elsevierdirect.com/v2/companion.jsp?ISBN=9781597490610)
Enter the other night life of Las Vegas. Away form the bright
lights of the Strip are the subdued spot lights that cast onto
stages for the exotic dancers. It is a reality for the women who
work it and men seeking pleasure. There is one man who does not
agree with the lifestyle the women are leading. The game of tease
and sex can lead to sudden death. It is Byron who is more than
happy to take them to their grave. Tom Beckley, twenty year veteran
of Metro, finds himself involved in the case and stumbles onto
something no one has ever seen before.
|
You may like...
She Said
Carey Mulligan, Zoe Kazan, …
DVD
R93
Discovery Miles 930
|