LOOKING FOR: YA, ADULT FICTION, NON-FICTION Laura Williams is literary agent at the Greene and Heaton Literary Agency. She is seeking literary fiction, commercial fiction, psychological thrillers and high concept Young Adult. Laura is actively building a fiction list and a small non-fiction list. She is currently looking for literary fiction, edgy commercial fiction, psychological thrillers and high-concept contemporary young adult, as well as narrative non-fiction of all types. Her taste is quite dark, and she loves gothic, ghost stories, horror and anything sinister. She also loves books that make her cry, from big love stories to intense family dramas. She is open to historical or horror YA, but not magical or fantasy. Meditative or moving novels about modern life, appeal to Laura, sad stories with love and the importance of caring for each other shining through. She also loves stories about female friendships or conversely groups of women who don't get on, such as the hugely fun BAD SUMMER PEOPLE by Emma Rosenblum. She is always on the lookout for a big tragic love story to make her cry happy or sad tears. At the more commercial end of fiction, think funny novels with warmth and romantic comedies with a bit of depth – think Marian Keyes. Most of all Laura is looking for novels she hasn’t read before – something unusual structurally or thematically, something that shines a light on a subject the author is passionate about, something that’ll break her heart or raise her blood in an entirely new way. Laura is always looking to promote diverse voices from across the globe, and is particularly keen on LGBTQI+ stories. Laura would like you to submit a covering letter, a 1-2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Laura is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 6th January 2025
LOOKING FOR: ADULT FICTION / NON-FICTION Ciara McEllin is building her list as a Junior Agent at Watson Little. She reads widely across book club, upmarket and literary fiction. Within these areas, she is drawn to novels that examine family and relationship dynamics, sexuality, identity, and vulnerability. Ciara is keen to hear from writers who take a fresh approach to these themes, whether that be a new perspective on a traditional narrative or a focus on characters and voices that remain underrepresented: think Kairos by Jenny Erpenbeck, Asymmetry by Lisa Halliday or Monkey Grip by Helen Garner. She will always want to read beautifully written novels with a strong sense of place, tangible characters and an essence that stays with you – living deep in your bones – long after you’ve finished reading. Recent reads Ciara has enjoyed include: Lonesome Dove by Larry McMurtry, Enter Ghost by Isabella Hammad, Close to Home by Michael Magee, Siblings by Brigitte Reimann, Trespasses by Louise Kennedy, The Idiot by Elif Batuman, Highway Blue by Ailsa McFarlane and My Phantoms by Gwendoline Riley. At the moment Ciara is particularly eager to see: - Sexy, sensual and seductive stories that explore desire and sexual boundaries not often represented in literature such as Little Rabbit by Alyssa Songsiridej, Cleanness by Garth Greenwell and Mrs. S by K Patrick - An atmospheric and existential thriller in the vein of Intimacies by Katie Kitamura, In The Cut by Susanna Moore and Drive Your Plow Over the Bones of the Dead by Olga Tokarczuk - An intoxicating coming of-age-tale that captures the aliveness, intelligence and wildness of girlhood like Brutes by Dizz Tate, The Virgin Suicides by Jeffrey Eugenides and The Girls by Emma Cline - Books that are joyful or brutal, particularly those that are both, similar to Headshot by Rita Bullwinkel, Kick the Latch by Kathryn Scanlan and Small Things Like These by Claire Keegan - Stories exploring an Australia or Ireland that is rarely seen in literature for example A Loving, Faithful Animal by Josephine Rowe and Wild Houses by Colin Barrett In non-fiction, Ciara enjoys narrative, memoir and essay collections. She is interested in hearing from experts, academics, critics and journalists writing about society, culture and food, and excited by writers seeking to revise, reshape or revolutionise the conversation in their area of expertise. Some of her favourite non-fiction titles include How To Survive A Plague by David France, The Transgender Issue by Shon Faye, the Living Autobiography Series by Deborah Levy, Last Witnesses: Unchildlike Stories by Svetlana Alexievich, King Kong Theory by Virginie Despentes; and she particularly enjoys the work of M.F.K Fisher, Annie Ernaux, Natalia Ginsburg and Helen Garner. Ciara is not looking for Children’s, YA or Fantasy. Ciara would like you to submit a covering letter, 1 -2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Ciara is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 6th January 2025
The ‘Level 2 NVQ Diploma in Associated Industrial Services Occupations (Construction) Passive Fire Protection’ is appropriate for individuals aged 16 and over working in the construction sector who specialise in passive fire protection activity within their job role and are looking to become eligible for the Blue CSCS Card. Upon completion of the qualification, you will be awarded the Level 2 NVQ Diploma in Associated Industrial Services Occupations (Construction) Passive Fire Protection . CSCS Cards We can provide CSCS tests and CSCS Cards alongside the qualifications without the need to attend the test centre. Speak with our friendly and helpful team for more information.
Automatic driving lessons with friendly, patient, experienced and fully qualified male and female driving instructors. Our current Automatic teaching vehicle is a Nissan Micra, which our students have again found has a simple logical layout and is easy to control with good all round visibility when driving, that is why we feel it is ideal as a learning car.
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Overview This course shows participants how to deal with documents in an electronic way to get rid of the paper's hard copy which takes a lot of space and time. It will also update you with the Digital Asset management or EDRMS system and changes that happen to take place with the passage of time. The advanced technology leads to Advance EDRMS systems with enhances features.