Products related to Their:
-
Information Technology Security and Risk Management : Inductive Cases for Information Security
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.As the title indicates, the cases are written and analyzed inductively, which is to say that the authors allowed the cases to speak for themselves, and lead where they would, rather than approach the cases with presuppositions or assumptions regarding what the case should be "about".In other words, the authors were given broad discretion to interpret a case in the most interesting and relevant manner possible; any given case may be "about" many things, depending on the perspective adopted by the reader, and many different lessons may be learned.The inductive approach of these cases reflects the design philosophy of the advanced IT Security and Risk Management course we teach on the topic here at the University of Canterbury, where all discussions begin with the analysis of a specific case of interest and follow the most interesting and salient aspects of the case in evidence.In our course, the presentation, analysis, and discussion of a case are followed by a brief lecture to address the conceptual, theoretical, and scholarly dimensions arising from the case.The inductive approach to teaching and learning also comes with a huge advantage – the students seem to love it, and often express their appreciation for a fresh and engaging approach to learning the sometimes-highly-technical content of an IT security course.As instructors, we are also grateful for the break in the typical scripted "chalk-and-talk" of a university lecture afforded by the spontaneity of the inductive approach. We were motivated to prepare this text because there seems to be no other book of cases dedicated to the topic of IT security and risk management, and because of our own success and satisfaction with inductive teaching and learning.We believe this book would be useful either for an inductive, case-based course like our own or as a body of cases to be discussed in a more traditional course with a deductive approach.There are abstracts and keywords for each case, which would help instructors select cases for discussions on specific topics, and PowerPoint slides are available as a guide for discussion about a given case.
Price: 37.99 £ | Shipping*: 0.00 £ -
Modern Cryptography : Applied Mathematics for Encryption and Information Security
This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices.Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters.Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape.Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications.The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography.This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given.The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography;Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear);Includes a full suite of classroom materials including exercises, Q&A, and examples.
Price: 49.99 £ | Shipping*: 0.00 £ -
Sporting Terriers : Their Form, Their Function and Their Future
This book is about sporting terriers, that much-loved, quintessentially British, quite admirable group of dogs, favoured for centuries by the more humble type of hunter. Sporting Terriers is not a manual covering training, grooming, nutrition and dog care; it is a celebration of terriers' contribution to the sporting scene, an examination of their form, their function and their future in an increasingly urban society.
Price: 19.95 £ | Shipping*: 3.99 £ -
Their Exits and Their Entrances
We used to get standing ovations. Now we get ovations for standing. The last place in which that great lady of the theatre Elspeth Quest wishes to spend her final years is Dustingford Hall, rest-home for retired actors and entertainers.Yet failing health and worse investments have led her to become a charity case here. She blanches at the sight of various actors and actresses, in various degrees of physical and mental decline, with whom she has worked over the years but never really wished to see again. (Not to mention tap-dancers, ventriloquists, impressionists, contortionists!) Telling them all she is only here until her town house in Kensington has completed major structural improvements, she wonders how she is ever going to survive. Or, more importantly, explain her permanent stay. But all these performers, who once lived purely for the present are now talking only of the past.As though simply waiting to die. When she observes the residents jeering en masse at a TV talent show, Elspeth sees her opportunity.She tells them to stop living in the past - they still have their talents - they should put on one tremendous final show for family, friends and trustees. And for themselves. It's Christmas, for heaven's sake. (And of course she will produce, direct and star!) But will it truly give them all a new lease of life - or will they die trying?Praise for Their Exits and Their Entrances:"Funny and touching - brilliantly distinctive characters." David Lister, The Independent. "A feel-good novel of considerable substance that will be loved by fans of The Thursday Murder Club." Petra Fried, BAFTA-winning producer.The Misfits. End of the F***ing World. "Laugh-out loud on London Transport funny." Carolyn Pickles, Actress.Broadchurch. Harry Potter. Canterville Ghost. "A truly charming read. A tale of 'dramatic' twists and turns." Francine White, Show business journalist"Unpredictable, unsentimental, unputdownable." Daniel Peak, BAFTA-winning writer.Not Going Out. Code 404. Horrible Histories. "Witty, touching and profound. No murders but plenty of 'corpsing'. Mendelson's best yet." Paul Harrison, BAFTA-winning director.Ballykissangel. A Touch of Frost.
Price: 9.00 £ | Shipping*: 3.99 £
-
How can one persuade their parents to allow mobile data?
To persuade your parents to allow mobile data, you can start by having an open and honest conversation with them about the reasons why you need it. You can explain how having mobile data will help you stay connected, access important information, and be more independent. You can also offer to take on additional responsibilities or chores in exchange for the privilege of having mobile data. Additionally, you can show them how you will use it responsibly and set limits on usage to address any concerns they may have. Overall, demonstrating maturity and responsibility can help persuade your parents to allow mobile data.
-
How can one convince their parents to allow mobile data?
To convince parents to allow mobile data, one could start by explaining the practical benefits of having access to mobile data, such as being able to stay connected in case of emergencies or having access to important information on the go. It may also help to demonstrate responsibility by showing how mobile data can be used in a controlled and limited manner, such as setting data usage limits or using parental control features. Additionally, offering to contribute financially towards the cost of the mobile data plan could show maturity and commitment.
-
How do I scan a barcode on Amazon?
To scan a barcode on Amazon, you can use the Amazon mobile app. Simply open the app and tap on the camera icon next to the search bar. Then, position the barcode within the frame on your screen and the app will automatically scan it. This will bring up the product details and options for purchasing or adding to your wishlist.
-
Can one use their existing mobile data in non-EU countries?
No, typically mobile data plans are limited to use within the EU and do not cover usage in non-EU countries. Using mobile data in non-EU countries can result in significantly higher charges due to roaming fees. It is advisable to check with your mobile service provider for international data roaming options or consider purchasing a local SIM card in the country you are visiting for more cost-effective data usage.
Similar search terms for Their:
-
Mobile Landscapes and Their Enduring Places
This Element presents emerging concepts and analytical tools in landscape archaeology.In three major sections bookended by an Introduction and Conclusion, the Element discusses current and emerging ideas and methods by which to explore how people in the past engaged with each other and their physical settings across the landscape, creating their lived environments in the process.The Element reviews the scales and temporalities that inform the study of human movements in and between places.Learning about how people engaged with each other at individual sites and across the landscape deep in the past is best achieved through transdisciplinary approaches, in which archaeologists integrate their methods with those of other specialists.The Element introduces these ideas through new research and multiple case studies from around the world, culminating in how to 'archaeomorphologically' map anthropic constructions in caves and their contemporary environments.
Price: 17.00 £ | Shipping*: 3.99 £ -
With Their Hearts in Their Boots
Price: 11.99 £ | Shipping*: 3.99 £ -
Generation Z : Their Voices, Their Lives
Featured on the Podcast You Don't Know Me hosted by Chloe Combi - an exploration into the lives of global Gen Z'An important and timely book.These are voices that need to be heard.' - Anthony HorowitzThe world is changing by the day.Today's teenagers are growing up in a world of widening social inequality, political apathy and economic uncertainty. They join gangs, and are kind. They're obese, and they're more health-conscious than any generation before. They have underage sex, and they're less likely to get pregnant young. They drink, and they go teetotal. They watch porn, and they shun it. They go to church, and they have no religion. They're a menace to society. They are society. Curious, creative and worried about the future, Generation Z have grown up in a world of unprecedented connection, and ever-increasing division.Chloe Combi has travelled around the UK, talking with teenagers from all kinds of backgrounds about their lives, their fears and their dreams, uncovering some truly surprising stories about a generation often stereotyped and dismissed. Told in their voices, Generation Z is a shocking, enlightening and funny portrait of how it feels to be young in modern Britain, and what it takes to survive and thrive on the journey to adulthood.
Price: 16.99 £ | Shipping*: 3.99 £ -
Medieval Badges : Their Wearers and Their Worlds
Mass-produced of tin-lead alloys and cheap to make and purchase, medieval badges were brooch-like objects displaying familiar images.Circulating widely throughout Europe in the High and late Middle Ages, badges were usually small, around four-by-four centimeters, though examples as tiny as two centimeters and a few as large as ten centimeters have been found.About 75 percent of surviving badges are closely associated with specific charismatic or holy sites, and when sewn or pinned onto clothing or a hat, they would have marked their wearers as having successfully completed a pilgrimage.Many others, however, were artifacts of secular life; some were political devices—a swan, a stag, a rose—that would have denoted membership in a civic organization or an elite family, and others—a garland, a pair of clasped hands, a crowned heart—that would have been tokens of love or friendship.A good number are enigmatic and even obscene. The popularity of badges seems to have grown steadily from the last decades of the twelfth century before waning at the very end of the fifteenth century.Some 20,000 badges survive today, though historians estimate that as many as two million were produced in the fourteenth and fifteenth centuries alone.Archaeologists and hobbyists alike continue to make new finds, often along muddy riverbanks in northern Europe. Interdisciplinary in approach, and sumptuously illustrated with more than 115 color and black-and-white images, Medieval Badges introduces badges in all their variety and uses.Ann Marie Rasmussen considers all medieval badges, whether they originated in religious or secular contexts, and highlights the different ways badges could confer meaning and identity on their wearers.Drawing on evidence from England, France, the Low Countries, Germany, and Scandinavia, this book provides information about the manufacture, preservation, and scholarly study of these artifacts.From chapters exploring badges and pilgrimage, to the complexities of the political use of badges, to the ways the visual meaning-making strategies of badges were especially well-suited to the unique features of medieval cities, this book offers an expansive introduction of these medieval objects for a wide readership.
Price: 58.00 £ | Shipping*: 0.00 £
-
How can I scan the barcode on a screenshot?
To scan a barcode from a screenshot, you can use a barcode scanning app on your smartphone or tablet. Simply open the app, select the option to scan from a photo or screenshot, and then choose the screenshot containing the barcode. The app will then analyze the image and provide you with the information associated with the barcode. This is a convenient way to quickly access the data from a barcode without needing to physically scan it with a traditional barcode scanner.
-
What is Digital Technology 2?
Digital Technology 2 is a course that builds upon the foundational concepts introduced in Digital Technology 1. It delves deeper into topics such as programming, web development, data analysis, and cybersecurity. Students will further develop their skills in using digital tools and technologies to solve real-world problems and gain a more advanced understanding of how technology impacts society. The course aims to prepare students for a career in the rapidly evolving field of digital technology.
-
How can one create and scan a barcode by themselves?
To create a barcode, one can use a barcode generator tool available online. These tools allow users to input the desired information and generate a barcode image. To scan a barcode, one can use a smartphone with a built-in barcode scanner app or download a barcode scanner app from the app store. Once the app is installed, simply open it and point the phone's camera at the barcode to scan it. The app will then decode the information embedded in the barcode and display it on the screen.
-
Where do historians obtain their information?
Historians obtain their information from a variety of sources, including primary sources such as documents, letters, diaries, and artifacts from the time period they are studying. They also use secondary sources such as books, articles, and scholarly papers written by other historians. In addition, historians may conduct interviews with individuals who have firsthand knowledge or experience related to their research topic. They also utilize archival materials, government records, and other historical repositories to gather information for their research. Overall, historians use a combination of primary and secondary sources to piece together a comprehensive understanding of the past.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.