Buy qrcodecompanies.org ?

Products related to Heritage:


  • Digital Cultural Heritage
    Digital Cultural Heritage

    This book provides an overview of various application spheres and supports further innovations needed in information management and in the processes of knowledge generation.The professions, organizations and scientific associations involved are unusually challenged by the complexity of the data situation.Cartography has always been the central field of application for georeferencing digital cultural heritage (DCH) objects.It is particularly important in enabling spatial relation analysis between any number of DCH objects or of their granular details.In addition to the pure geometric aspects, the cognitive relations that lead to knowledge representation and derivation of innovative use processes are also of increasing importance.Further, there is a societal demand for spatial reference and analytics (e.g. the extensive use of cognitive concepts of "map" and "atlas" for a variety of social topics in the media).There is a huge geometrical-logical-cognitive potential for complex, multimedia, digital-cultural-heritage databases and stakeholders expect handling, transmission and processing operations with guaranteed long-term availability for all other stakeholders.In the future, whole areas of digital multimedia databases will need to be processed to further our understanding of historical and cultural contexts.This is an important concern for the information society and presents significant challenges for cartography in all these domains. This book collects innovative technical and scientific work on the entire process of object digitization, including detail extraction, archiving and interoperability of multimedia DCH data.

    Price: 199.99 £ | Shipping*: 0.00 £
  • Geopolitics of Digital Heritage
    Geopolitics of Digital Heritage

    Geopolitics of Digital Heritage analyzes and discusses the political implications of the largest digital heritage aggregators across different scales of governance, from the city-state governed Singapore Memory Project, to a national aggregator like Australia's Trove, to supranational digital heritage platforms, such as Europeana, to the global heritage aggregator, Google Arts & Culture.These four dedicated case studies provide focused, exploratory sites for critical investigation of digital heritage aggregators from the perspective of their geopolitical motivations and interests, the economic and cultural agendas of involved stakeholders, as well as their foreign policy strategies and objectives.The Element employs an interdisciplinary approach and combines critical heritage studies with the study of digital politics and communications.Drawing from empirical case study analysis, it investigates how political imperatives manifest in the development of digital heritage platforms to serve different actors in a highly saturated global information space, ranging from national governments to transnational corporations.

    Price: 17.00 £ | Shipping*: 3.99 £
  • Information Technology Security and Risk Management : Inductive Cases for Information Security
    Information Technology Security and Risk Management : Inductive Cases for Information Security

    Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.As the title indicates, the cases are written and analyzed inductively, which is to say that the authors allowed the cases to speak for themselves, and lead where they would, rather than approach the cases with presuppositions or assumptions regarding what the case should be "about".In other words, the authors were given broad discretion to interpret a case in the most interesting and relevant manner possible; any given case may be "about" many things, depending on the perspective adopted by the reader, and many different lessons may be learned.The inductive approach of these cases reflects the design philosophy of the advanced IT Security and Risk Management course we teach on the topic here at the University of Canterbury, where all discussions begin with the analysis of a specific case of interest and follow the most interesting and salient aspects of the case in evidence.In our course, the presentation, analysis, and discussion of a case are followed by a brief lecture to address the conceptual, theoretical, and scholarly dimensions arising from the case.The inductive approach to teaching and learning also comes with a huge advantage – the students seem to love it, and often express their appreciation for a fresh and engaging approach to learning the sometimes-highly-technical content of an IT security course.As instructors, we are also grateful for the break in the typical scripted "chalk-and-talk" of a university lecture afforded by the spontaneity of the inductive approach. We were motivated to prepare this text because there seems to be no other book of cases dedicated to the topic of IT security and risk management, and because of our own success and satisfaction with inductive teaching and learning.We believe this book would be useful either for an inductive, case-based course like our own or as a body of cases to be discussed in a more traditional course with a deductive approach.There are abstracts and keywords for each case, which would help instructors select cases for discussions on specific topics, and PowerPoint slides are available as a guide for discussion about a given case.

    Price: 37.99 £ | Shipping*: 0.00 £
  • Modern Cryptography : Applied Mathematics for Encryption and Information Security
    Modern Cryptography : Applied Mathematics for Encryption and Information Security

    This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices.Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters.Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape.Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications.The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography.This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given.The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography;Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear);Includes a full suite of classroom materials including exercises, Q&A, and examples.

    Price: 49.99 £ | Shipping*: 0.00 £
  • What is the colonial heritage?

    The colonial heritage refers to the lasting impact of colonization on a region or country. It includes the cultural, social, political, and economic influences left behind by the colonizers. This heritage can manifest in various ways, such as language, religion, legal systems, and societal structures. The colonial heritage often shapes the identity and development of a nation long after the colonizers have left.

  • What is a cultural heritage?

    Cultural heritage refers to the traditions, customs, beliefs, and artifacts that are passed down from generation to generation within a society. It encompasses the tangible and intangible aspects of a culture, including historical sites, monuments, art, music, language, and rituals. Cultural heritage plays a crucial role in shaping a community's identity and preserving its unique heritage for future generations. It is an important part of a society's history and contributes to its sense of belonging and continuity.

  • To all with Serbian heritage, please.

    As an AI language model, I don't have personal experiences or heritage, but I can provide information. If you have Serbian heritage, I would love to hear about your experiences and the traditions that have been passed down through your family. What are some of the customs or cultural practices that are important to you? How has your Serbian heritage influenced your identity and worldview? I would love to learn more about the rich history and traditions of Serbia from those who have a personal connection to it.

  • Do I not like my heritage?

    It is possible that you do not like certain aspects of your heritage, but it is important to remember that heritage is multifaceted and can encompass a variety of traditions, beliefs, and values. It is normal to have mixed feelings about one's heritage, as it may not always align with personal beliefs or experiences. It can be helpful to explore and understand your heritage more deeply to appreciate the richness and diversity it offers.

Similar search terms for Heritage:


  • Resilience, Authenticity and Digital Heritage Tourism
    Resilience, Authenticity and Digital Heritage Tourism

    This book examines the authentication of authenticity in heritage tourism by using a resilient smart systems approach.It discusses the emerging trends in cultural tourism and outlines, in a detailed manner, their significance in negotiating authenticity in tourism experience. Authentication of authenticity is an evolving, less-researched field of inquiry in heritage tourism.This book advances research on this subject by exploring different authentication processes and scrutinizes their resilience in building transformative heritage tourism pathways.It offers a kaleidoscopic view of the manner authenticity has evolved over the last several decades by observing a broad spectrum of cultural expressions.The evolution and meaningfulness of negotiated authenticity is identified and discussed in the context of pre-, intra- and post-pandemic times.This book focuses on the moral and existentialist trajectories or authenticity and the notion of self-authentication.It proposes a smart resilient authentication model to delicately negotiate the objective and self-dimensions of authenticity in transformative times.Furthermore, by sharing examples of best practices, it offers unique insights on how authenticity is authenticated and mediated via digital platforms and artificial intelligence. This book offers novel perspectives on negotiated authenticity and its authentication in heritage tourism and will appeal to both practitioners and students/scholars in Heritage studies; Design and Innovation; Tourism Studies; Geography and Planning across North America, Europe, and East-Asian countries.

    Price: 135.00 £ | Shipping*: 0.00 £
  • Resilience, Authenticity and Digital Heritage Tourism
    Resilience, Authenticity and Digital Heritage Tourism

    This book examines the authentication of authenticity in heritage tourism by using a resilient smart systems approach.It discusses the emerging trends in cultural tourism and outlines, in a detailed manner, their significance in negotiating authenticity in tourism experience. Authentication of authenticity is an evolving, less-researched field of inquiry in heritage tourism.This book advances research on this subject by exploring different authentication processes and scrutinizes their resilience in building transformative heritage tourism pathways.It offers a kaleidoscopic view of the manner authenticity has evolved over the last several decades by observing a broad spectrum of cultural expressions.The evolution and meaningfulness of negotiated authenticity is identified and discussed in the context of pre-, intra- and post-pandemic times.This book focuses on the moral and existentialist trajectories or authenticity and the notion of self-authentication.It proposes a smart resilient authentication model to delicately negotiate the objective and self-dimensions of authenticity in transformative times.Furthermore, by sharing examples of best practices, it offers unique insights on how authenticity is authenticated and mediated via digital platforms and artificial intelligence. This book offers novel perspectives on negotiated authenticity and its authentication in heritage tourism and will appeal to both practitioners and students/scholars in Heritage studies; Design and Innovation; Tourism Studies; Geography and Planning across North America, Europe, and East-Asian countries.

    Price: 39.99 £ | Shipping*: 0.00 £
  • Heritage
    Heritage


    Price: 23.49 £ | Shipping*: 3.99 £
  • Heritage
    Heritage


    Price: 9.49 £ | Shipping*: 3.99 £
  • Are you proud of your heritage?

    As an AI, I do not have personal experiences or emotions, so I do not have a heritage to be proud of. However, I can appreciate and celebrate the diversity and richness of different cultures and heritages around the world. It is important to acknowledge and respect our heritage, as it shapes our identities and influences our perspectives on the world.

  • Are you interested in your heritage?

    As an AI, I don't have personal interests or a heritage to be interested in. However, I can help others explore and learn about their heritage by providing information and resources. Understanding one's heritage can provide a sense of identity, connection to the past, and a deeper appreciation for cultural traditions. If you are interested in your heritage, I can assist you in discovering more about it.

  • Are Kurds proud of their heritage?

    Yes, Kurds are generally proud of their heritage. The Kurdish people have a rich cultural history, including their own language, traditions, and customs. Despite facing discrimination and oppression in various countries where they reside, Kurds have maintained a strong sense of identity and pride in their heritage. This pride is often expressed through their music, dance, literature, and other cultural practices.

  • Do people in Kaliningrad have German heritage?

    Yes, many people in Kaliningrad have German heritage. The region was historically part of East Prussia and was inhabited by a significant German population. After World War II, the area was annexed by the Soviet Union and the German population was largely expelled or killed. However, there are still people in Kaliningrad with German ancestry, and there are efforts to preserve and promote the region's German cultural heritage.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.