00881nam0-22002891i-450-99000160443040332120060927104219.0000160443FED01000160443(Aleph)000160443FED0100016044320030910d1959----km-y0itay50------baitaAspetti economici e sociali nel processo evolutivo dell'agricoltura livorneseFederico TornarLivornoSocieta Ed. Italiana Demetra195974 p.23 cmEconomia agrariaLivorno333Tornar,Federico68149ITUNINARICAUNIMARCBK99000160443040332160 333 B 3736928FAGBCFAGBCAspetti economici e sociali nel processo evolutivo dell'agricoltura livornese368512UNINA03295nam 22008535 450 991097321520332120240508205449.09781137378330113737833610.1057/9781137378330(CKB)2670000000567208(EBL)4082211(SSID)ssj0001657602(PQKBManifestationID)16440875(PQKBTitleCode)TC0001657602(PQKBWorkID)14987283(PQKB)10633771(SSID)ssj0001196672(PQKBManifestationID)12523825(PQKBTitleCode)TC0001196672(PQKBWorkID)11165695(PQKB)10875026(MiAaPQ)EBC4082211(DE-He213)978-1-137-37833-0(Perlego)3488414(EXLCZ)99267000000056720820151120d2014 u| 0engur|n|---|||||txtccrContemporary African Literature in English Global Locations, Postcolonial Identifications /by M. Krishnan1st ed. 2014.London :Palgrave Macmillan UK :Imprint: Palgrave Macmillan,2014.1 online resource (231 p.)Description based upon print version of record.9781349478286 1349478288 9781137378323 1137378328 Includes bibliographical references and index.Cover; Contents; Acknowledgements; Introduction: Writing Africa in a Global Marketplace; 1 Ethics, Conflict and Re(-)presentation; 2 Race, Class and Performativity; 3 Gender and Representing the Unrepresentable; 4 Mythopoetics and Cultural Re-Creation; 5 Global African Literature: Strategies of Address and Cultural Constraints; Conclusion: Writing Africa's Futures?; Notes; Bibliography; IndexContemporary African Literature in English explores the contours of representation in contemporary Anglophone African literature, drawing on a wide range of authors including Chimamanda Ngozi Adichie, Aminatta Forna, Brian Chikwava, Ngug? wa Thiong'o, Nuruddin Farah and Chris Abani.Literature, Modern20th centuryLiteraturePhilosophyCultureStudy and teachingAfrican literatureLiteratureFictionTwentieth-Century LiteratureLiterary TheoryCultural TheoryAfrican LiteratureWorld LiteratureFiction LiteratureLiterature, ModernLiteraturePhilosophy.CultureStudy and teaching.African literature.Literature.Fiction.Twentieth-Century Literature.Literary Theory.Cultural Theory.African Literature.World Literature.Fiction Literature.820.996Krishnan Mauthttp://id.loc.gov/vocabulary/relators/aut92356BOOK9910973215203321Contemporary African Literature in English4327567UNINA06184nam 22008173u 450 991096219580332120251117090548.01-283-17720-X97866131772091-118-11358-6(CKB)2550000000040607(EBL)693686(OCoLC)747412540(SSID)ssj0000541133(PQKBManifestationID)11391003(PQKBTitleCode)TC0000541133(PQKBWorkID)10498608(PQKB)10670831(WaSeSS)Ind00025751(MiAaPQ)EBC693686(EXLCZ)99255000000004060720130418d2011|||| u|| |engur|n|---|||||txtccrSecurity Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills3rd ed.Hoboken Wiley20111 online resource (625 p.)Street smarts seriesSybex serious skillsDescription based upon print version of record.1-118-06116-0 Includes index.CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of TaskProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of TaskProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for CompletionTask 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for CompletionPhase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; ProcedureCriteria for CompletionA step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide,Serious skills.Computer networks --Security measures --Examinations --Study guidesComputer security --Examinations --Study guidesElectronic data processing personnel --CertificationElectronic data processing personnelCertificationStudy guidesComputer securityExaminationsStudy guidesComputer networksExaminationsSecurity measuresEngineering & Applied SciencesHILCCComputer ScienceHILCCComputer networks --Security measures --Examinations --Study guides.Computer security --Examinations --Study guides.Electronic data processing personnel --Certification.Electronic data processing personnelCertificationComputer securityExaminationsComputer networksExaminationsSecurity measures.Engineering & Applied SciencesComputer Science005.8COM055000bisacshMiller David R1856645Gregg Michael884346AU-PeELAU-PeELAU-PeELBOOK9910962195803321Security Administrator Street Smarts4456276UNINA