|
Showing 1 - 25 of
25 matches in All Departments
It's a bright, sunny morning down on the farm. Mac and Bob have a
busy day ahead - feeding the animals, pulling up carrots and
ploughing the field on Mac's big red tractor. Suddenly, a wonderful
sight comes into view. Marching bands, acrobats and lots of
colourful clowns...It looks like the circus is in town! Mac and Bob
love the circus. First, there are jobs to be done. But what's this?
All the animals are excited, running around with amazing tales to
tell. There's something unusual going on at the farm today and Mac
and Bob are about to find out what it is.
His first collection since the well-received New and Selected Poems
1965-2005, No Through Road sees the poet returning to his chosen
territory of the quotidian where real things - love, loss, regret,
age, sickness and death - happen. A poet of landscape, Sutton's
lyricism also embraces passionately the modern world as we know it.
The poems of No Through Road are instantly recognisable as being of
the living tradition of Thomas Hardy, Edward Thomas and Philp
Larkin. Immensely readable, they show a poet still very much in his
prime.
Why do 'Jaws', 'Field of Dreams', 'The Big Lebowski', and 'The
Godfather' remain strikingly popular in this age of fragmented
audiences and ever-faster spin cycles? "Hollywood Blockbusters: The
Anthropology of Popular Movies" argues that these films continue to
captivate audiences because they play upon underlying tensions and
problems in American culture, much like the myths that
anthropologists study in non-Western contexts. In making this
argument, the authors employ and extend anthropological theories
about ritual, kinship, gift giving, power, egalitarianism,
literacy, metalinguistics, stereotypes, and the mysteries of the
Other. The results - original insights into modern film classics,
American culture, and anthropological theory - will appeal to
students of Film, Media, Anthropology, Sociology, and Cultural
Studies.
A detailed study of the Syrian and Lebanon campaign of World War
II. In June 1941, Australian, British, Indian and Free French
forces invaded the Vichy French-controlled mandate of Syria and
Lebanon. They faced an enemy that had more artillery, tanks and
aircraft. They fought in rocky, mountainous terrain, through barren
valleys and across swollen rivers, and soon after the initial
advance faced a powerful Vichy French counter-attack on key
strategic positions. Despite these difficulties, the Allies
prevailed, and in doing so ensured that the territory did not fall
into German or pro-German hands, and thus provide a springboard
from which Axis forces could attack British oil interests in Iraq,
the key territory of Palestine or the Suez Canal. This book
examines the high military and political strategy that lay behind
the campaign, as well as the experiences and hardships as endured
by the men on the ground. The battles in Syria and Lebanon were
complex actions, often at the battalion level or below, and this
work uses extensive war diaries and available records to make sense
of the actions and examine how they affected the wider campaign.
Information risk management (IRM) is about identifying, assessing,
prioritising and treating risks to keep information secure and
available. This accessible book is a practical guide to
understanding the principles of IRM and developing a strategic
approach to an IRM programme. It is the only textbook for the BCS
Practitioner Certificate in Information Risk Management and this
new edition reflects recent changes to the syllabus and to the
wider discipline.
In recent decades imaging has proved one of the most rapidly
expanding areas of medicine. The present day trainees entering
radiology are no longer trained by radiologists who cover and are
well informed on most aspects of their specialty as was the case
with previous generations. Instead they encounter a confusing array
of subspecialists divided both by systems and by techniques. The
system specialists include neuroradiologists. vascular
radiologists. gastrointestinal radiologists. chest radiologists.
and skeletal radiologists. Technique specialists include experts in
nuclear medicine. ultrasound. computed tomography and magnetic
resonance. and there are subspecialists in both groups. not to
mention others like pediatric radiologists who fit into neither
classification. It is our experience that this plethora of experts
each with his own individual approach is bewildering and
intimidating to the novice radiologist. The numerous monographs on
individual subjects and tech niques and the large textbooks so
valuable to the more advanced radiologist are also confusing and
unhelp ful to the new recruit. It was for these reasons that we
decided to embark on this new Short Textbook. The aim was to
produce a concise and integrated volume which could provide the
beginner with a balanced and realistic view of the true place of
different imaging techniques in current practice. Details of
technique are generally excluded; most will be inevitably absorbed
with increasing practical experience. The emphasis throughout is on
clinical usage. and the relative and often changing importance of
different methods in specific clinical contexts.
Data is fundamentally changing the nature of businesses and
organisations and the mechanisms for delivering products and
services. This book is a practical guide to developing strategy and
policy for data governance, in line with the developing ISO 38505
governance of data standards. It will assist an organisation
wanting to become more of a data driven business by explaining how
to assess the value, risks and constraints associated with
collecting, using and distributing data.
In today's technology-driven environment there is an
ever-increasing demand for information delivery. A compromise has
to be struck between security and availability. This book is a
pragmatic guide to information assurance for both business
professionals and technical experts. The third edition has been
updated to reflect changes in the IT security landscape and updates
to the BCS Certification in Information Security Management
Principles, which the book supports.
Figs, fresh and dried, have become the fruit of celebrations and
festivities throughout the Western world, and have been typically
associated with Christmastime since the nineteenth century. In
Figs: A Global History, David Sutton examines the festive and
celebratory importance of figs in many countries by placing this
luscious and festive fruit in its historical context. Beginning
with an account of the strange biology of the fig - which is
botanically not a fruit at all, but rather a cluster of ingrowing
flowers - Sutton moves on to consider the Arabian origins of figs,
including the possibility that the earliest fig seeds were
transported from Yemen to Mesopotamia in the dung of donkeys.
Proposing that the 'forbidden fruit' eaten by Adam and Eve was in
fact a fig rather than an apple, this book explores the history of
the fruit in fascinating detail, from the Crusaders to the
wonderful fig festivals of the modern world. Including numerous
recipes both sweet and savoury, and countless facts, myths and
stories about the fig, such as the bizarre tale of the American
fig-wasp, Figs is a fascinating account of this unique and
delicious food.
Why do 'Jaws', 'Field of Dreams', 'The Big Lebowski', and 'The
Godfather' remain strikingly popular in this age of fragmented
audiences and ever-faster spin cycles? "Hollywood Blockbusters: The
Anthropology of Popular Movies" argues that these films continue to
captivate audiences because they play upon underlying tensions and
problems in American culture, much like the myths that
anthropologists study in non-Western contexts. In making this
argument, the authors employ and extend anthropological theories
about ritual, kinship, gift giving, power, egalitarianism,
literacy, metalinguistics, stereotypes, and the mysteries of the
Other. The results - original insights into modern film classics,
American culture, and anthropological theory - will appeal to
students of Film, Media, Anthropology, Sociology, and Cultural
Studies.
Ever since 1997, 'Alien Zoo', Dr Karl Shuker's cryptozoology news
column has been a regular feature in Fortean Times - the world's
premier magazine devoted to unexplained phenomena of every kind,
and inspired by the writings and researches of scientific
iconoclast Charles Fort. Dr Shuker has also penned many longer,
more detailed 'Lost Ark' articles for Fortean Times, surveying an
immense diversity of controversial and newly-revealed creatures
worldwide. Today, not only are both of these long-running FT series
hailed as cryptozoological classics but now, for the very first
time, an extensive compilation of each of them has been
meticulously prepared by Dr Shuker, incorporating numerous
remarkable illustrations (including many rare or
previously-unpublished examples), and presented here in book form.
Until recently, if it has been considered at all in the context of
business continuity, cyber security may have been thought of in
terms of disaster recovery and little else. Recent events have
shown that cyberattacks are now an everyday occurrence, and it is
becoming clear that the impact of these can have devastating
effects on organizations whether large or small, public or private
sector. Cyber security is one aspect of information security, since
the impacts or consequences of a cyberattack will inevitably damage
one or more of the three pillars of information security: the
confidentiality, integrity or availability of an organization's
information assets. The main difference between information
security and cyber security is that while information security
deals with all types of information assets, cyber security deals
purely with those which are accessible by means of interconnected
electronic net- works, including the Internet. Many responsible
organizations now have robust information security, business
continuity and disaster recovery programs in place, and it is not
the intention of this book to re-write those, but to inform
organizations about the kind of precautions they should take to
stave off successful cyberattacks and how they should deal with
them when they arise in order to protect the day-to-day businesses.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R346
Discovery Miles 3 460
|