|
|
Showing 1 - 25 of
229 matches in All Departments
On the 18th of March 2013 David Littlejohn Beveridge set out, in
fulfillment of childhood dreams, to walk the ancient pilgrim route
called the Way of St.James or Camino de Santiago from Roncesvalles
to Santiago de Compostela. Earth Under My Heel is his journal.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
Hailed as one of America's original art forms, film has the
distinctive character of crossing high and low art. But film has
done more than this. According to American philosopher Stanley
Cavell, film was also a place where America in the 1930s and 1940s
did its thinking, a tradition that was taken up and enriched
throughout world cinema. Can film indeed think? That is, can film
do the work of philosophy? Following Cavell's lead to think along
the tear of the analytic-continental traditions, this book draws
from both sides of the philosophical divide to reflect on this
question. Spanning generations and disciplines, pondering
everything from art house classics to mainstream blockbusters,
Thinking Film: Philosophy at the Movies aims to fling open the
doors to this conversation on all sides. Inquiring into both
philosophy's word on film and film's word to philosophy, the
interdisciplinary dialogue of this book traverses the conceptual
and the particular as it considers how film catalyzes our thinking
and sets us talking. After viewing the world through film, we find
our world--and ourselves--transformed by deeper understanding and
new possibilities. This book aims to provide a novel and engaging
way in to thinking with and about this enduringly popular art form.
|
World Geographies (Hardcover)
Ralph Stockman Tarr, Elbridge Gerry Littlejohn, Frank Morton McMurry
|
R1,080
Discovery Miles 10 800
|
Ships in 18 - 22 working days
|
FROM THE BESTSELLING CHEESEMONGER-HISTORIAN A Cheesemonger's
Compendium is a fully-illustrated standalone guide to the artisanal
and farmhouse cheeses of the British Isles. A must-have for cheese
lovers everywhere, it also serves as a handy pocket or shopping
bag-sized companion to A Cheesemonger's History of The British
Isles. Containing 168 deliciously readable flavour profiles, a
morsel of history and a dash of folklore, there's sure to be
something to take your fancy in here. This is the ultimate guide
for expert fromagers and enthusiastic novices alike.
For anyone looking to understand Chinese philosophy, here is the
place to start. Introducing this vast and far-reaching tradition,
Ronnie L. Littlejohn tells you everything you need to know about
the Chinese thinkers who have made the biggest contributions to the
conversation of philosophy, from the Han dynasty to the present. He
covers: * The six classical schools of Chinese philosophy
(Yin-Yang, Ru, Mo, Ming, Fa, and Dao-De) * The arrival of Buddhism
in China and its distinctive development * The central figures and
movements from the end of the Tang dynasty to the introduction into
China of Western thought * The impact of Chinese philosophers
ranging from Confucius and Laozi to Tu Weiming and some of the
Western counterparts who addressed similar issues. Weaving together
key subjects, thinkers, and texts, we see how Chinese traditions
have profoundly shaped the institutions, social practices, and
psychological character of not only East and Southeast Asia, but
the world we are living in. Praised for its completely original and
illuminating thematic approach, this new edition includes updated
reading lists, a comparative chronology of Western and Chinese
philosophers, and additional translated extracts.
"Windows Server 2012 Security from End to Edge and Beyond" shows
you how to architect, design, plan, and deploy Microsoft security
technologies for Windows 8/Server 2012 in the enterprise. The book
covers security technologies that apply to both client and server
and enables you to identify and deploy Windows 8 security features
in your systems based on different business and deployment
scenarios. The book is a single source for learning how to secure
Windows 8 in many systems, including core, endpoint, and anywhere
access.
Authors Tom Shinder and Yuri Diogenes, both Microsoft employees,
bring you insider knowledge of the Windows 8 platform, discussing
how to deploy Windows security technologies effectively in both the
traditional datacenter and in new cloud-based solutions. With this
book, you will understand the conceptual underpinnings of Windows 8
security and how to deploy these features in a test lab and in
pilot and production environments.
The book's revolutionary "Test Lab Guide" approach lets you test
every subject in a predefined test lab environment. This, combined
with conceptual and deployment guidance, enables you to understand
the technologies and move from lab to production faster than ever
before. Critical material is also presented in key concepts and
scenario-based approaches to evaluation, planning, deployment, and
management. Videos illustrating the functionality in the Test Lab
can be downloaded from the authors blog http:
//blogs.technet.com.b.security_talk/. Each chapter wraps up with a
bullet list summary of key concepts discussed in the chapter.
Provides practical examples of how to design and deploy a
world-class security infrastructure to protect both Windows 8 and
non-Microsoft assets on your systemWritten by two Microsoft
employees who provide an inside look at the security features of
Windows 8 Test Lab Guides enable you to test everything before
deploying live to your system"
The philosophical traditions of China have arguably influenced more
human beings than any other. China has been the home not only of
its indigenous philosophical traditions of Confucianism and Daoism,
but also of uniquely modified forms of Buddhism. As Ronnie L
Littlejohn shows, these traditions have for thousands of years
formed the bedrock of the longest continuing civilization on the
planet; and Chinese philosophy has profoundly shaped the
institutions, social practices and psychological character of East
and Southeast Asia. The author here surveys the key texts and
philosophical systems of Chinese thinkers in a completely original
and illuminating way. Ranging from the Han dynasty to the present,
he discusses the six classical schools of Chinese philosophy
(Yin-Yang, Ru, Mo, Ming, Fa and Dao-De); the arrival of Buddhism in
China and its distinctive development; the central figures and
movements from the end of the Tang dynasty to the introduction into
China of Western thought; and the impact of Chinese philosophers
ranging from Confucius and Laozi to Tu Weiming on their equivalents
in the West."
|
Huntsville (Hardcover)
Jeff Littlejohn, Walker County Historical Commission
|
R719
R638
Discovery Miles 6 380
Save R81 (11%)
|
Ships in 18 - 22 working days
|
How to Cheat at Configuring ISA (Internet Security and
Acceleration) Server 2004 meets the needs of system administrators
for a concise, step-by-step guide to getting one of Microsoft's
most complex server products up and running. While books twice its
size may be perfect for network designers and security specialists,
this is written for the person in the trenches actually running the
network day to day.
How to Cheat at Configuring ISA Server 2004 is written for the vast
majority of Windows System Administrators with too much to do and
too little time in which to do it. Unlike books twice its size,
this is a concise, to-the-point guide.
* Administrators daily jobs - too many mission critical tasks in
too little time. A quick reference to ISA Server
* Written by Dr. Tom Shinder, the undisputed authority on
Installing, Configuring, Managing and Troubleshooting ISA Server
* Includes independent advice on when the "Microsoft Way" works,
and when another approach might be more appropriate to your
situation
|
The Mystical Presence (Hardcover)
John Williamson Nevin; Edited by Linden J. Debie, W. Bradford Littlejohn
|
R1,669
R1,372
Discovery Miles 13 720
Save R297 (18%)
|
Ships in 18 - 22 working days
|
When it comes to computer crimes, the criminals got a big head
start. But the law enforcement and IT security communities are now
working diligently to develop the knowledge, skills, and tools to
successfully investigate and prosecute Cybercrime cases. When the
first edition of "Scene of the Cybercrime" published in 2002, it
was one of the first books that educated IT security professionals
and law enforcement how to fight Cybercrime. Over the past 5 years
a great deal has changed in how computer crimes are perpetrated and
subsequently investigated. Also, the IT security and law
enforcement communities have dramatically improved their ability to
deal with Cybercrime, largely as a result of increased spending and
training. According to the 2006 Computer Security Institute's and
FBI's joint Cybercrime report: 52% of companies reported
unauthorized use of computer systems in the prior 12 months. Each
of these incidents is a Cybecrime requiring a certain level of
investigation and remediation. And in many cases, an investigation
is mandates by federal compliance regulations such as
Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data
Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and
updated book which covers all of the technological, legal, and
regulatory changes, which have occurred since the first edition.
The book is written for dual audience; IT security professionals
and members of law enforcement. It gives the technical experts a
little peek into the law enforcement world, a highly structured
environment where the "letter of the law" is paramount and
procedures must be followed closely lest an investigation be
contaminated and all the evidence collected rendered useless. It
also provides law enforcement officers with an idea of some of the
technical aspects of how cyber crimes are committed, and how
technology can be used to track down and build a case against the
criminals who commit them. Scene of the Cybercrime, Second Editions
provides a roadmap that those on both sides of the table can use to
navigate the legal and technical landscape to understand, prevent,
detect, and successfully prosecute the criminal behavior that is as
much a threat to the online community as "traditional" crime is to
the neighborhoods in which we live. Also included is an all new
chapter on Worldwide Forensics Acts and Laws.
* Companion Web site provides custom tools and scripts, which
readers can download for conducting digital, forensic
investigations.
* Special chapters outline how Cybercrime investigations must be
reported and investigated by corporate IT staff to meet federal
mandates from Sarbanes Oxley, and the Payment Card Industry (PCI)
Data Security Standard
* Details forensic investigative techniques for the most common
operating systems (Windows, Linux and UNIX) as well as cutting edge
devices including iPods, Blackberries, and cell phones.
"Myths of Europe" focuses on the identity of Europe, seeking to
re-assess its cultural, literary and political traditions in the
context of the 21st century. Over 20 authors - historians,
political scientists, literary scholars, art and cultural
historians - from five countries here enter into a debate. How far
are the myths by which Europe has defined itself for centuries
relevant to its role in global politics after 9/11? Can 'Old
Europe' maintain its traditional identity now that the European
Union includes countries previously supposed to be on its
periphery? How has Europe handled relations with the non-European
Other in the past and how is it reacting now to an influx of
immigrants and asylum seekers? It becomes clear that founding myths
such as Hamlet and St Nicholas have helped construct the European
consciousness but also that these and other European myths have
disturbing Eurocentric implications. Are these myths still viable
today and, if so, to what extent and for what purpose? This volume
sits on the interface between culture and politics and is important
reading for all those interested in the transmission of myth and in
both the past and the future of Europe.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Ab Wheel
R209
R149
Discovery Miles 1 490
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|