321 results (0,20826 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Pesticide Regulation Handbook A Guide for Users

Clinical Cases for the FRCA Key Topics Mapped to the RCoA Curriculum

Trauma Care Pre-Hospital Manual

Building a Game Pitch How to Bottle Lightning

Building a Game Pitch How to Bottle Lightning

Based on the PocketGamer MasterClass Building a Pitch: From Concept to Document (2021) a decade’s worth of industry experience and numerous industry-level pitches for a variety of organisations including Mediatonic Epic Games and GDC this book will equip you with methodologies best practices and insights around video game pitch design. It will guide you through a step-by-step process from initial conceptualisation and idea validation to communicating your pitches on paper clearly and effectively –as well as illustrating why such a process can be highly valuable. In a day and age where video game development is more competitive than ever the value and importance of lightning in a bottle pitches has never been higher: foundational visions capable of delivering video games that stand apart from the crowd as industry-renowned titles generating immense critical or commercial success which (after the awe has abated) usually triggers the same internal question –why didn’t I think of that!? As such this book will cover: How video game pitches can determine the success potential of a video game How to conceptualise unique and compelling ideas for a video game How to validate your ideas to better determine whether they are capable of becoming lightning in a bottle experiences –or even worth prototyping How to structure format and write a video game pitch in a manner that not only helps you better expand upon and understand your own pitch but also makes it easier for others to understand and buy into This book will be of great interest to both seasoned and early-career game designers students studying game design courses and start-up founders seeking investment. | Building a Game Pitch How to Bottle Lightning

GBP 32.99
1

The Security Hippie

The Security Hippie

The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept he has served as security leader in dozens of notable organizations such as Mulesoft Stubhub Amplitude Analytics and many others. The Security Hippie follows his previous book Why CISOs Fail which became a sleeper hit earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book Barak looks at security purely through the lens of story-telling sharing many and varied experiences from his long and accomplished career as organizational and thought leader and visionary in the information security field. Instead of instructing this book teaches by example sharing many real situations in the field and actual events from real companies as well as Barak’s related takes and thought processes. An out-of-the-mainstream counterculture thinker – Hippie – in the world of information security Barak’s rich background and unusual approach to the field come forth in this book in vivid color and detail allowing the reader to sit back and enjoy these experiences and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible and instead focus on the human and behavioral side of security finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly these are not the stories that made the news; yet they are the ones that happen all the time. If you’ve ever wondered about the field of information security but have been intimidated by it or simply wished for more shared experiences then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

GBP 34.99
1

The Toxicologist's Pocket Handbook

The Toxicologist's Pocket Handbook

The third edition of the Toxicologist’s Pocket Handbook like the first two editions is a scaled-down version of the best-selling Handbook of Toxicology. It provides the most frequently used toxicology reference information in a convenient pocket-sized book. The format remains the same as the earlier editions to allow basic reference information to be located quickly with the information placed in sections specific to subspecialties of toxicology. A detailed table of contents lists all tables and figures contained in the book by section. This expanded edition contains a number of tables not found in the second edition added to sections on lab animals general toxicology dermal and ocular toxicology genetic toxicology/carcinogenesis neurotoxicology immunotoxicology reproductive/developmental toxicology industrial chemical and pharmaceutical toxicology. New information is presented for additional laboratory animals such as swine and primates infusion recommendations newer methods such as the local lymph node assay and reference safety pharmacology values for standard species. Additional information on typical genetic toxicology and immunotoxicology assays as well as in vitro assays for eye irritation are provided. Some tables from the second edition have been updated to include new information that has arisen since the earlier edition went to press. Information from the second edition such as regulatory requirements that are no longer applicable has been deleted. | The Toxicologist's Pocket Handbook

GBP 42.99
1

Climate Actions Local Applications and Practical Solutions

PKI Implementation and Infrastructures

PKI Implementation and Infrastructures

The concept of a PKI (public key infrastructure) has been around for decades but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream. This is mostly because implementing a PKI is time consuming and difficult. Maintaining a PKI is equally time consuming and even more difficult within the real world of mergers and acquisitions against a backdrop of ever-changing technology. Many organisations simply give up and hand everything over to a third party who promises to manage everything on their behalf. This is generally not a good idea and simply delays the inevitability of failures and misunderstood complexity. This book explores all the aspects of implementing and maintaining a PKI that the other books on the subject seem to miss. It reflects decades of hard-won experience not only in PKI not only in IT not only in electronics but in business government agencies and academia alike. The book also explores the existence of a PKI alongside other technologies such as biometrics and against an ever-changing world of development methodologies. This last point is particularly relevant at this time as we are in the middle of a quiet but all encompassing revolution in this respect. Consequently this is the one book on PKI that you have to have on your shelf whether you be a company director IT manager government minister or teacher of IT. It is the book which fills in all the gaps left in the literature and treads paths which others fear to tread. You will enjoy it enormously if you are from an IT background. | PKI Implementation and Infrastructures

GBP 34.99
1

Privacy in Practice Establish and Operationalize a Holistic Data Privacy Program

Privacy in Practice Establish and Operationalize a Holistic Data Privacy Program

Privacy is not just the right to be left alone but also the right to autonomy control and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies societies and everyday lives. Personal information has become an increasingly valuable commodity in the digital age. At the same time the abundance and persistence of personal data have elevated the risks to individuals’ privacy. In the age of Big Data the Internet of Things Biometrics and Artificial Intelligence it is becoming increasingly difficult for individuals to fully comprehend let alone control how and for what purposes organizations collect use and disclose their personal information. Consumers are growing increasingly concerned about their privacy making the need for strong privacy champions ever more acute. With a veritable explosion of data breaches highlighted almost daily across the globe and the introduction of heavy-handed privacy laws and regulatory frameworks privacy has taken center stage for businesses. Businesses today are faced with increasing demands for privacy protections ever-more complex regulations and ongoing cybersecurity challenges that place heavy demands on scarce resources. Senior management and executives now acknowledge privacy as some of the biggest risks to the business. Privacy traditionally has existed in a separate realm resulting in an unintentional and problematic barrier drawn between the privacy team and the rest of the organization. With many regulatory frameworks to consider building an all-encompassing data privacy program becomes increasingly challenging. Effective privacy protection is essential to maintaining consumer trust and enabling a robust and innovative digital economy in which individuals feel they may participate with confidence. This book aims at helping organizations in establishing a unified integrated enterprise-wide privacy program. This book is aiming to help privacy leaders and professionals to bridge the privacy program and business strategies transform legal terms and dead text to live and easy-to-understand essential requirements which organizations can easily implement identify and prioritize privacy program gap initiatives and promote awareness and embed privacy into the everyday work of the agency and its staff. | Privacy in Practice Establish and Operationalize a Holistic Data Privacy Program

GBP 42.99
1

Development in Nigeria Promise on Hold?

Development in Nigeria Promise on Hold?

This book unravels the trajectories and dilemmas of development in Nigeria since its independence in 1960. Despite enormous human and material resources development progress in Nigeria has not met expectations. By delving into the various factors that have influenced development efforts and initiatives Development in Nigeria: Promise on Hold? aims to draw out lessons to help the country to achieve its potential. In many ways Nigeria typifies the African puzzle of near-misses a never-ending drive towards development with enormous promise but no real practical output. As in many states within Africa these failures can be traced to structural inadequacies and the perennial weakness of public institutions. Problems which collectively undermine sustainable development and growth include political corruption ethnicity failure of public institutions distributional injustice fiscal centralism in a purported federal state faulty democratic traditions malevolent elite class religious and social conflicts among others. By taking a comprehensive panoramic overview of the country’s historical experience as both a military dictatorship and democracy Edlyne Eze Anugwom presents a nuanced comprehensive and contemporary interrogation of the ever-dynamic forces and factors in Nigeria’s development project. This book’s incisive examination of Nigeria’s development aspirations over time will be of interest to students of Development and African Studies as well as to practitioners and multilateral agencies involved in development planning and intervention in Nigeria who are looking for strategies for overcoming the challenges facing the country. | Development in Nigeria Promise on Hold?

GBP 38.99
1

Unmanned Aerial Remote Sensing UAS for Environmental Applications

Unmanned Aerial Remote Sensing UAS for Environmental Applications

Unmanned Aircraft Systems (UASs) are a rapidly evolving technology with an expanding array of diverse applications. In response to the continuing evolution of this technology this book discusses UAVs and similar systems platforms and sensors as well as exploring some of their environmental applications. It explains how they can be used for mapping monitoring and modelling a wide variety of different environmental aspects and at the same time addresses some of the current constraints placed on realising the potential use of the technology such as flight duration and distance safety and the invasion of privacy. Unmanned Aerial Remote Sensing: UAS for Environmental Applications is an excellent resource for any practitioner utilising remote sensing and other geospatial technologies for environmental applications such as conservation research and planning. Students and academics in information science environment and natural resources geosciences and geography will likewise find this comprehensive book a useful and informative resource. FeaturesProvides necessary theoretical foundations for pertinent subject matter areasIntroduces the role and value of UAVs for geographical data acquisition and the ways to acquire and process the dataProvides a synthesis of ongoing research and a focus on the use of technology for small-scale image and spatial data acquisition in an environmental contextWritten by experts of the technology who bring together UAS tools and resources for environmental specialists. | Unmanned Aerial Remote Sensing UAS for Environmental Applications

GBP 42.99
1

Surviving the Climate Crisis Australian Perspectives and Solutions

Hunting the Faster than Light Tachyon and Finding Three Unicorns and a Herd of Elephants

Cryptology Classical and Modern

Cryptology Classical and Modern

Cryptology: Classical and Modern Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution transposition Alberti Vigenère and Hill ciphers. It also includes coverage of the Enigma machine Turing bombe and Navajo code. Additionally the book presents modern methods like RSA ElGamal and stream ciphers as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time the second edition supplements this material with new content that serves students in more technical fields as well. Thus the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features:Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts including the Enigma machine Turing bombe and Navajo codeGives straightforward explanations of the Advanced Encryption Standard public-key ciphers and message authenticationDescribes the implementation and cryptanalysis of classical ciphers such as substitution transposition shift affine Alberti Vigenère and Hill | Cryptology Classical and Modern

GBP 42.99
1

Robot Souls Programming in Humanity

Handbook of Univariate and Multivariate Data Analysis with IBM SPSS

Handbook of Univariate and Multivariate Data Analysis with IBM SPSS

Using the same accessible hands-on approach as its best-selling predecessor the Handbook of Univariate and Multivariate Data Analysis with IBM SPSS Second Edition explains how to apply statistical tests to experimental findings identify the assumptions underlying the tests and interpret the findings. This second edition now covers more topics and has been updated with the SPSS statistical package for Windows. New to the Second EditionThree new chapters on multiple discriminant analysis logistic regression and canonical correlationNew section on how to deal with missing dataCoverage of tests of assumptions such as linearity outliers normality homogeneity of variance-covariance matrices and multicollinearityDiscussions of the calculation of Type I error and the procedure for testing statistical significance between two correlation coefficients obtained from two samples Expanded coverage of factor analysis path analysis (test of the mediation hypothesis) and structural equation modelingSuitable for both newcomers and seasoned researchers in the social sciences the handbook offers a clear guide to selecting the right statistical test executing a wide range of univariate and multivariate statistical tests via the Windows and syntax methods and interpreting the output results. The SPSS syntax files used for executing the statistical tests can be found in the appendix. Data sets employed in the examples are available on the book’s CRC Press web page.

GBP 42.99
1

The Multiplayer Classroom Game Plans

The Multiplayer Classroom Game Plans

The Multiplayer Classroom: Game Plans is a companion to The Multiplayer Classroom: Designing Coursework as a Game now in its second edition from CRC Press. This book covers four multiplayer classroom projects played in the real world in real time to teach and entertain. They were funded by grants or institutions collaborations between Lee Sheldon as writer/designer and subject matter experts in various fields. They are written to be accessible to anyone-designer educator or layperson-interested in game-based learning. The subjects are increasingly relevant in this day and age: physical fitness Mandarin cybersecurity and especially an online class exploring culture and identity on the internet that is unlike any online class you have ever seen. Read the annotated often-suspenseful stories of how each game with its unique challenges thrills and spills was built. Lee Sheldon began his writing career in television as a writer-producer eventually writing more than 200 shows ranging from Charlie’s Angels (writer) to Edge of Night (head writer) to Star Trek: The Next Generation (writer-producer). Having written and designed more than forty commercial and applied video games Lee spearheaded the first full writing for games concentration in North America at Rensselaer Polytechnic Institute and the second writing concentration at Worcester Polytechnic Institute. He is a regular lecturer and consultant on game design and writing in the United States and abroad. His most recent commercial game the award-winning The Lion’s Song is currently on Steam. For the past two years he consulted on an escape room in a box funded by NASA that gives visitors to hundreds of science museums and planetariums the opportunity to play colonizers on the moon. He is currently writing his second mystery novel. | The Multiplayer Classroom Game Plans

GBP 39.99
1

Infection Prevention and Control A Social Science Perspective

Introduction to Mechanics

Pre-Clinical Medicine SAQs MCQs and EMQs

Emergency Medicine Diagnosis and Management

Computational Topology for Biomedical Image and Data Analysis Theory and Applications

Control Basics for Mechatronics

Discrete Encounters

Discrete Encounters

Eschewing the often standard dry and static writing style of traditional textbooks Discrete Encounters provides a refreshing approach to discrete mathematics. The author blends traditional course topics and applications with historical context pop culture references and open problems. This book focuses on the historical development of the subject and provides fascinating details of the people behind the mathematics along with their motivations deepening readers’ appreciation of mathematics. This unique book covers many of the same topics found in traditional textbooks but does so in an alternative entertaining style that better captures readers’ attention. In addition to standard discrete mathematics material the author shows the interplay between the discrete and the continuous and includes high-interest topics such as fractals chaos theory cellular automata money-saving financial mathematics and much more. Not only will readers gain a greater understanding of mathematics and its culture they will also be encouraged to further explore the subject. Long lists of references at the end of each chapter make this easy. Highlights:Features fascinating historical context to motivate readersText includes numerous pop culture references throughout to provide a more engaging reading experienceIts unique topic structure presents a fresh approachThe text’s narrative style is that of a popular book not a dry textbookIncludes the work of many living mathematiciansIts multidisciplinary approach makes it ideal for liberal arts mathematics classes leisure reading or as a reference for professors looking to supplement traditional coursesContains many open problemsProfusely illustrated

GBP 42.99
1

Case Studies in Diabetes