Exercises presented in this book are designed for advanced students studying computer science, information technology, or similar degrees with a concentration on information and network security and information assurance. The exercises do not list step-by-step instructions with commands to use; instead they assume that students will have some level of prerequisite knowledge on networks, Python programming, Linux operating system, Cisco command line interface (CLI), and Scapy. A moderate level of research is needed to complete each exercise. Time to complete each exercise is assumed to be...
Exercises presented in this book are designed for advanced students studying computer science, information technology, or similar degrees with a conce...
This book examines instances of transformative dissent, turning points or shifts in popular mobilisation patterns in contemporary India, while adopting a historical approach and analysing past events. Exploring the different continuities and discontinuities in mobilising patterns and dissident agency in India, the authors present a heterogeneous insurrectional pattern that pivoted around issues of caste, class, religion, land reform, labour, taxation and territorial control, with anti-colonialism movements becoming prominent in the first half of the twentieth century. The authors move...
This book examines instances of transformative dissent, turning points or shifts in popular mobilisation patterns in contemporary India, while adopti...