0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (11)
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (7)
  • -
Status
Brand

Showing 1 - 22 of 22 matches in All Departments

A New History Of Formal Schooling In South Africa 1658-1910 - An Education Of Contradictions (Paperback): Crain Soudien,... A New History Of Formal Schooling In South Africa 1658-1910 - An Education Of Contradictions (Paperback)
Crain Soudien, Charlotte Fischer, Michael Cross, Peter Kallaway
R395 R295 Discovery Miles 2 950 Save R100 (25%) Ships in 5 - 10 working days

The first history of schooling gathered as a single and continuous text since the 1980s. It is also the first attempt to put together a history of South African schooling from the perspective of the subjugated people.

It attempts to show, as South Africa moves from a landscape essentially marked by encounters of people at different frontiers – physical, geographical, economic, cultural and psychological (where only the first two have previously received real attention) – how education is conceptualised, mobilised and used by all the players in the emerging country from the colonial Dutch and British periods into apartheid.

This book covers the period of the history of South African schooling from the establishment of the first school in 1658 to 1910 when South Africa became a Union. It approaches the task of narrating this history as a deliberate intervention. The intervention is that of restoring into the narrative the place of the subjugated people in the unfolding of a landscape which they share with a racialised white community. Propelled by a post-colonial framing of South Africa’s history, it offers itself as a deliberate counter to dominant historiographic and systematic privileging of the country’s elites. As such, it works on a larger canvas than simply the school. It deliberately works the story of schooling alongside the bigger socioeconomic history of South Africa, i.e., Dutch settlement of the Cape, the arrival of colonial Britain and the dramatic discovery of gold and diamonds leading to the industrialisation of South Africa. The story of schooling, the text seeks to emphasise, cannot be told independently of what is going on economically, politically and socially in the making of modern South Africa. Modernity, as a consequence, is a major theme of the book.

In telling the story of formal schooling in South Africa, the text, critically, seeks to retrieve the experience of the subjugated to present a wider and larger canvas upon which to describe the process of the making of the South African school. The text works historically with the Dutch East Indian experience up until 1804 when schooling was characterised by its neglect. It shows then how it develops a systematic character through the institutionalisation of a formal system in 1839 and the initiatives of missionaries. It draws the story to a close by looking at how formal systems are established in the colonies, the Boer Republics and the protectorates.

Thematically, the text seeks to thread through the conceits of race and class to show how, contradictorily, they take expression through conflict and struggle. In this conflict and struggle people who are not white (i.e., they do not yet have the racialised labels that apartheid brings in the middle of the 20th century) are systematically marginalised and discriminated against. They work with their discrimination, however, in generative ways by taking opportunity when it arises and exercising political agency.

The book is important because it explains the roots of educational inequality. It shows how inequality is systematically installed in almost every step of the way. For a period, in the middle of the 19th century, attempts were made to forestall this inequality. The text shows how the British administration acceded to eugenicist influences which pushed children of colour out of what were called first-class schools into segregated missionary-run institutions.

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure (Paperback): Melissa M. Meyer, Michael Cross,... How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure (Paperback)
Melissa M. Meyer, Michael Cross, Hal Kurz, Brian Barber
R1,232 Discovery Miles 12 320 Ships in 12 - 17 working days

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.
The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement.
The next book in our best selling and critically acclaimed How to Cheat series. This is the perfect book for users who have already purchased How to Cheat at Managing Windows 2003 Small Business Server.
* Active Directory is the market leader in the directory services space, and 57% of all Microsoft corporate customers have deployed AD
* Follows Syngress's proven "How To Cheat" methodology
* Companion Web site offers dozens of templates, "Cheat Sheets," and checklists for readers

CompTIA Network+ Certification Study Guide: Exam N10-004 - Exam N10-004 2E (Paperback, 2nd edition): Robert Shimonski, Naomi... CompTIA Network+ Certification Study Guide: Exam N10-004 - Exam N10-004 2E (Paperback, 2nd edition)
Robert Shimonski, Naomi Alpern, Michael Cross, Dustin L. Fritz, Mohan Krishnamurthy, …
R1,747 Discovery Miles 17 470 Ships in 12 - 17 working days

CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major update with more focus on security and wireless aspects of networking. Our new study guide has been updated accordingly with focus on network, systems, and WAN security and complete coverage of today's wireless networking standards. As always this companion covers the core Network+ material including basic design principles, management and operation of a network infrastructure, and testing tools. After reading this book not only will you be able to ace the exam but you will be able to maintain, troubleshoot, and install computer networks.

New to this edition are: Intensified focus on network securityTwo NEW practice exams to help eliminate test-day jittersTiered chapter ending quesitons that allow gradual learning
New to this edition in accordance with the newly revised exam is an intensified focus on network securityTwo NEW practice exams to help eliminate test-day jittersTiered chapter ending questions that allow for graduated learningCovers everything from test taking techniques to advanced topics - keeping the beginner and intermediate IT professional in mindLayout of the guide parallels the Network+ N10-004 objectives for ease of study

Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback): Michael Cross Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback)
Michael Cross
R1,094 Discovery Miles 10 940 Ships in 12 - 17 working days

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
Defines an organization's goals for social networkingPresents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security"

Google Earth Forensics - Using Google Earth Geo-Location in Digital Forensic Investigations (Paperback): Michael Harrington,... Google Earth Forensics - Using Google Earth Geo-Location in Digital Forensic Investigations (Paperback)
Michael Harrington, Michael Cross
R813 Discovery Miles 8 130 Ships in 12 - 17 working days

"Google Earth Forensics" is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways.

As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools.

Written for investigators and forensic practitioners, "Google Earth Forensics" is written by an investigator and trainer with more than 13 years of experience in law enforcement who will show you how to use this valuable tool anywhere at the crime scene, in the lab, or in the courtroom.
Learn how to extract location-based evidence using the Google Earth program or app on computers and mobile devicesCovers the basics of GPS systems, the usage of Google Earth, and helps sort through data imported from external evidence sourcesIncludes tips on presenting evidence in compelling, easy-to-understand formats

Scene of the Cybercrime (Paperback, 2nd edition): Debra Littlejohn Shinder, Michael Cross Scene of the Cybercrime (Paperback, 2nd edition)
Debra Littlejohn Shinder, Michael Cross
R1,319 Discovery Miles 13 190 Ships in 12 - 17 working days

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws.

* Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations.
* Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard
* Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones.

Pattern Formation and Dynamics in Nonequilibrium Systems (Hardcover): Michael Cross, Henry Greenside Pattern Formation and Dynamics in Nonequilibrium Systems (Hardcover)
Michael Cross, Henry Greenside
R2,486 Discovery Miles 24 860 Ships in 12 - 17 working days

Many exciting frontiers of science and engineering require understanding the spatiotemporal properties of sustained nonequilibrium systems such as fluids, plasmas, reacting and diffusing chemicals, crystals solidifying from a melt, heart muscle, and networks of excitable neurons in brains. This introductory textbook for graduate students in biology, chemistry, engineering, mathematics, and physics provides a systematic account of the basic science common to these diverse areas. This book provides a careful pedagogical motivation of key concepts, discusses why diverse nonequilibrium systems often show similar patterns and dynamics, and gives a balanced discussion of the role of experiments, simulation, and analytics. It contains numerous worked examples and over 150 exercises. This book will also interest scientists who want to learn about the experiments, simulations, and theory that explain how complex patterns form in sustained nonequilibrium systems.

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R736 Discovery Miles 7 360 Ships in 12 - 17 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

The Tower (Paperback): Michael Cross The Tower (Paperback)
Michael Cross
R257 Discovery Miles 2 570 Ships in 10 - 15 working days
Mission Mayhem (Paperback): Michael Cross Mission Mayhem (Paperback)
Michael Cross
R255 Discovery Miles 2 550 Ships in 10 - 15 working days
The Last Inferno (Paperback): Michael Cross The Last Inferno (Paperback)
Michael Cross
R260 Discovery Miles 2 600 Ships in 10 - 15 working days
Web of Lies (Paperback): Michael Cross Web of Lies (Paperback)
Michael Cross
R264 Discovery Miles 2 640 Ships in 10 - 15 working days
Amnesia (Paperback): Michael Cross Amnesia (Paperback)
Michael Cross
R261 Discovery Miles 2 610 Ships in 10 - 15 working days
The Importance of Communication - Four Primary Principles for Procuring Your Church's Next Pastor (Paperback): Michael... The Importance of Communication - Four Primary Principles for Procuring Your Church's Next Pastor (Paperback)
Michael Cross
R159 Discovery Miles 1 590 Ships in 10 - 15 working days
The Geocache Passport Jr. - Ammo Can Edition (Paperback): Michelle Cross-Frase The Geocache Passport Jr. - Ammo Can Edition (Paperback)
Michelle Cross-Frase
R251 Discovery Miles 2 510 Ships in 10 - 15 working days
10 Reasons Girls Never Poop At School (Paperback): Michelle Cross-Frase 10 Reasons Girls Never Poop At School (Paperback)
Michelle Cross-Frase; Mercy N Frase
R306 Discovery Miles 3 060 Ships in 10 - 15 working days
The Official Roller Coaster Enthusiast's Ride Log (Paperback): Michelle Cross-Frase The Official Roller Coaster Enthusiast's Ride Log (Paperback)
Michelle Cross-Frase
R288 Discovery Miles 2 880 Ships in 10 - 15 working days
Open Hearts, Waiting Homes - An Adoption Devotional for Families Preparing to Adopt (Paperback): Michelle Cross-Frase Open Hearts, Waiting Homes - An Adoption Devotional for Families Preparing to Adopt (Paperback)
Michelle Cross-Frase
R288 Discovery Miles 2 880 Ships in 10 - 15 working days
Botnets - The Killer Web Applications (Paperback): Craig Schiller, James R Binkley Botnets - The Killer Web Applications (Paperback)
Craig Schiller, James R Binkley; Contributions by Anthony Bradley, Michael Cross, Gadi Evron, …
R1,649 Discovery Miles 16 490 Ships in 10 - 15 working days

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
* This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
* Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself

Developer's Guide to Web Application Security (Paperback): Michael Cross Developer's Guide to Web Application Security (Paperback)
Michael Cross
R1,437 Discovery Miles 14 370 Ships in 9 - 15 working days

Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential.

* The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book (http: //www.elsevierdirect.com/v2/companion.jsp?ISBN=9781597490610)

Rock Grave (Paperback): Michelle Crosse Rock Grave (Paperback)
Michelle Crosse
R438 Discovery Miles 4 380 Ships in 10 - 15 working days

Enter the other night life of Las Vegas. Away form the bright lights of the Strip are the subdued spot lights that cast onto stages for the exotic dancers. It is a reality for the women who work it and men seeking pleasure. There is one man who does not agree with the lifestyle the women are leading. The game of tease and sex can lead to sudden death. It is Byron who is more than happy to take them to their grave. Tom Beckley, twenty year veteran of Metro, finds himself involved in the case and stumbles onto something no one has ever seen before.

Jay Dee - Yancey Boys Instrumentals CD (2014) (CD): Jay Dee Jay Dee - Yancey Boys Instrumentals CD (2014) (CD)
Jay Dee; Contributions by Geoff Schroer; Produced by J Dilla, Illa J, Michael Cross; Performed by …
R239 Discovery Miles 2 390 Out of stock
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Moonage Daydream
David Bowie DVD R143 Discovery Miles 1 430
Percy Jackson And The Olympians - 5-Book…
Rick Riordan Paperback R622 Discovery Miles 6 220
Home Classix Trusty Traveller Mug…
R99 R81 Discovery Miles 810
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
She Said
Carey Mulligan, Zoe Kazan, … DVD R93 Discovery Miles 930
Alcolin Cold Glue (500ml)
R101 Discovery Miles 1 010
Wagworld Pet Blankie (Blue) - X Large…
R309 R159 Discovery Miles 1 590
LocknLock Pet Dry Food Container (1.6L)
R109 R91 Discovery Miles 910
Demeter Demeter Waffles Cologne Spray…
R668 Discovery Miles 6 680
Fleshlight Quickshot Vantage Male…
R1,049 R799 Discovery Miles 7 990

 

Partners