1.

Record Nr.

UNINA9910973215203321

Autore

Krishnan M

Titolo

Contemporary African Literature in English : Global Locations, Postcolonial Identifications / / by M. Krishnan

Pubbl/distr/stampa

London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2014

ISBN

9781137378330

1137378336

Edizione

[1st ed. 2014.]

Descrizione fisica

1 online resource (231 p.)

Disciplina

820.996

Soggetti

Literature, Modern - 20th century

Literature - Philosophy

Culture - Study and teaching

African literature

Literature

Fiction

Twentieth-Century Literature

Literary Theory

Cultural Theory

African Literature

World Literature

Fiction Literature

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Cover; Contents; Acknowledgements; Introduction: Writing Africa in a Global Marketplace; 1 Ethics, Conflict and Re(-)presentation; 2 Race, Class and Performativity; 3 Gender and Representing the Unrepresentable; 4 Mythopoetics and Cultural Re-Creation; 5 Global African Literature: Strategies of Address and Cultural Constraints; Conclusion: Writing Africa's Futures?; Notes; Bibliography; Index

Sommario/riassunto

Contemporary African Literature in English explores the contours of representation in contemporary Anglophone African literature, drawing on a wide range of authors including Chimamanda Ngozi Adichie,



Aminatta Forna, Brian Chikwava, Ngug? wa Thiong'o, Nuruddin Farah and Chris Abani.

2.

Record Nr.

UNINA9910962195803321

Autore

Miller David R

Titolo

Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills

Pubbl/distr/stampa

Hoboken, : Wiley, 2011

ISBN

1-283-17720-X

9786613177209

1-118-11358-6

Edizione

[3rd ed.]

Descrizione fisica

1 online resource (625 p.)

Collana

Street smarts series

Sybex serious skills

Classificazione

COM055000

Altri autori (Persone)

GreggMichael

Disciplina

005.8

Soggetti

Computer networks --Security measures --Examinations --Study guides

Computer security --Examinations --Study guides

Electronic data processing personnel --Certification

Electronic data processing personnel - Certification

Computer security - Examinations

Computer networks - Examinations - Security measures

Engineering & Applied Sciences

Computer Science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes index.

Nota di contenuto

CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a



Physical-Security Checklist; Scenario; Scope of Task

ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task

ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion

Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion

Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure

Criteria for Completion

Sommario/riassunto

A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide,