|
Showing 1 - 25 of
29 matches in All Departments
It's a bright, sunny morning down on the farm. Mac and Bob have a
busy day ahead - feeding the animals, pulling up carrots and
ploughing the field on Mac's big red tractor. Suddenly, a wonderful
sight comes into view. Marching bands, acrobats and lots of
colourful clowns...It looks like the circus is in town! Mac and Bob
love the circus. First, there are jobs to be done. But what's this?
All the animals are excited, running around with amazing tales to
tell. There's something unusual going on at the farm today and Mac
and Bob are about to find out what it is.
His first collection since the well-received New and Selected Poems
1965-2005, No Through Road sees the poet returning to his chosen
territory of the quotidian where real things - love, loss, regret,
age, sickness and death - happen. A poet of landscape, Sutton's
lyricism also embraces passionately the modern world as we know it.
The poems of No Through Road are instantly recognisable as being of
the living tradition of Thomas Hardy, Edward Thomas and Philp
Larkin. Immensely readable, they show a poet still very much in his
prime.
Why do 'Jaws', 'Field of Dreams', 'The Big Lebowski', and 'The
Godfather' remain strikingly popular in this age of fragmented
audiences and ever-faster spin cycles? "Hollywood Blockbusters: The
Anthropology of Popular Movies" argues that these films continue to
captivate audiences because they play upon underlying tensions and
problems in American culture, much like the myths that
anthropologists study in non-Western contexts. In making this
argument, the authors employ and extend anthropological theories
about ritual, kinship, gift giving, power, egalitarianism,
literacy, metalinguistics, stereotypes, and the mysteries of the
Other. The results - original insights into modern film classics,
American culture, and anthropological theory - will appeal to
students of Film, Media, Anthropology, Sociology, and Cultural
Studies.
Information risk management (IRM) is about identifying, assessing,
prioritising and treating risks to keep information secure and
available. This accessible book is a practical guide to
understanding the principles of IRM and developing a strategic
approach to an IRM programme. It is the only textbook for the BCS
Practitioner Certificate in Information Risk Management and this
new edition reflects recent changes to the syllabus and to the
wider discipline.
In today's technology-driven environment there is an
ever-increasing demand for information delivery. A compromise has
to be struck between security and availability. This book is a
pragmatic guide to information assurance for both business
professionals and technical experts. The third edition has been
updated to reflect changes in the IT security landscape and updates
to the BCS Certification in Information Security Management
Principles, which the book supports.
A detailed study of the Syrian and Lebanon campaign of World War
II. In June 1941, Australian, British, Indian and Free French
forces invaded the Vichy French-controlled mandate of Syria and
Lebanon. They faced an enemy that had more artillery, tanks and
aircraft. They fought in rocky, mountainous terrain, through barren
valleys and across swollen rivers, and soon after the initial
advance faced a powerful Vichy French counter-attack on key
strategic positions. Despite these difficulties, the Allies
prevailed, and in doing so ensured that the territory did not fall
into German or pro-German hands, and thus provide a springboard
from which Axis forces could attack British oil interests in Iraq,
the key territory of Palestine or the Suez Canal. This book
examines the high military and political strategy that lay behind
the campaign, as well as the experiences and hardships as endured
by the men on the ground. The battles in Syria and Lebanon were
complex actions, often at the battalion level or below, and this
work uses extensive war diaries and available records to make sense
of the actions and examine how they affected the wider campaign.
Why do 'Jaws', 'Field of Dreams', 'The Big Lebowski', and 'The
Godfather' remain strikingly popular in this age of fragmented
audiences and ever-faster spin cycles? "Hollywood Blockbusters: The
Anthropology of Popular Movies" argues that these films continue to
captivate audiences because they play upon underlying tensions and
problems in American culture, much like the myths that
anthropologists study in non-Western contexts. In making this
argument, the authors employ and extend anthropological theories
about ritual, kinship, gift giving, power, egalitarianism,
literacy, metalinguistics, stereotypes, and the mysteries of the
Other. The results - original insights into modern film classics,
American culture, and anthropological theory - will appeal to
students of Film, Media, Anthropology, Sociology, and Cultural
Studies.
Data is fundamentally changing the nature of businesses and
organisations and the mechanisms for delivering products and
services. This book is a practical guide to developing strategy and
policy for data governance, in line with the developing ISO 38505
governance of data standards. It will assist an organisation
wanting to become more of a data driven business by explaining how
to assess the value, risks and constraints associated with
collecting, using and distributing data.
The author of Cigar Box Guitars shares his amazing photo gallery of
handmade musical greatness. This new edition includes a new
step-bystep project for building your own tenor ukulele, and
instructions for playing homemade guitars using both innovative and
traditional techniques. In a modern revival of a great American
tradition, sliders, pickers, strummers and makers are coming
together in what they call the Cigar Box Guitar Revolution.
Musicians and hobbyists are finding new creative freedom by making
their own musical instruments out of unconventional materials.
Their ingenious creations range from simple cardboard diddley bows
to an electrified washtub bass. Cigar Box Guitars celebrates the
modern craft of these irresistibly alluring instruments. In this
new edition, professional photographer and woodworking enthusiast
David Sutton shares his obsession with the genre in an expanded
photo gallery that profiles inspiring examples of handmade musical
greatness. Sutton details multiple techniques for playing the
fretted, three-string cigar box guitar, with easy-to-follow chord
diagrams and instructions for a selection of classic tunes.
Authentic stories of legendary American roots music personalities.
I thought I had it all: a successful family business, money, fast
cars, friends and a loving family. Well, life is full of surprises,
isn't it? Shit happens as they say, and when trouble comes knocking
on your door, you fight or flee. In my case battles came and went,
I would never yield, always compromise, but when a couple of
unforeseen incidents came my way, I needed help. I needed a
miracle. Or two. Unbeknown to me, I was preparing my mind and body
for a catastrophic event which would change my life forever. But by
the Grace of God and the help and support of family, I found myself
on a tough journey of self-discovery, and I gained the belief that
things always happen for a reason. Through adversity and a whole
string of miracles, I have found true happiness, fulfilment and
contentment. I feel blessed and privileged to share my story with
you...
Ever since 1997, 'Alien Zoo', Dr Karl Shuker's cryptozoology news
column has been a regular feature in Fortean Times - the world's
premier magazine devoted to unexplained phenomena of every kind,
and inspired by the writings and researches of scientific
iconoclast Charles Fort. Dr Shuker has also penned many longer,
more detailed 'Lost Ark' articles for Fortean Times, surveying an
immense diversity of controversial and newly-revealed creatures
worldwide. Today, not only are both of these long-running FT series
hailed as cryptozoological classics but now, for the very first
time, an extensive compilation of each of them has been
meticulously prepared by Dr Shuker, incorporating numerous
remarkable illustrations (including many rare or
previously-unpublished examples), and presented here in book form.
Until recently, if it has been considered at all in the context of
business continuity, cyber security may have been thought of in
terms of disaster recovery and little else. Recent events have
shown that cyberattacks are now an everyday occurrence, and it is
becoming clear that the impact of these can have devastating
effects on organizations whether large or small, public or private
sector. Cyber security is one aspect of information security, since
the impacts or consequences of a cyberattack will inevitably damage
one or more of the three pillars of information security: the
confidentiality, integrity or availability of an organization's
information assets. The main difference between information
security and cyber security is that while information security
deals with all types of information assets, cyber security deals
purely with those which are accessible by means of interconnected
electronic net- works, including the Internet. Many responsible
organizations now have robust information security, business
continuity and disaster recovery programs in place, and it is not
the intention of this book to re-write those, but to inform
organizations about the kind of precautions they should take to
stave off successful cyberattacks and how they should deal with
them when they arise in order to protect the day-to-day businesses.
|
You may like...
Hot Water
Nadine Dirks
Paperback
R265
R207
Discovery Miles 2 070
|