Kirjojen hintavertailu. Mukana 11 244 527 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Jason Edwards

African Safari

African Safari

Jason Edwards

Nelson Price Milburn
2001
nidottu
Jason Edwards, wildlife photographer, travelled 12,000 kilometres through Africa. His journey took him through thick jungles, barren desserts, wild grasslands and muddy swamps. He slept high in trees to avoid lions, and narrowly escaped an angry hippopotamus.
Bathroom Songs

Bathroom Songs

Jason Edwards

Punctum Books
2017
pokkari
Bathroom Songs: Eve Kosofsky Sedgwick as a Poet is the first book of essays to consider the poetry of one of the twentieth- and early twenty-first-century's most important literary, affect, and queer theorists. Acclaimed as one of the "truly innovative" poets of her generation by Maud Ellmann, Sedgwick's work as a poet is, perhaps, less well known, but is no less compelling than her ground-breaking trilogy of queer theoretical texts: Between Men: English Literature and Male Homosocial Desire, Epistemology of the Closet, and Tendencies. The book includes seven specially commissioned essays considering Sedgwick's published poetry and writing about poets, by Angus Brown, Meg Boulton, Mary Baine Campbell, Jason Edwards, Kathryn R. Kent, Monica Pearl, and Benjamin Westwood, that range across the complete range of Sedgwick's work, from her earliest published lyrics through her first collection of poetry, Fat Art, Thin Art, to her part-haiku, part-prose autobiography, A Dialogue on Love, and beyond. In addition, the book contains over forty of Sedgwick's previously uncollected poems, ranging from her earliest poem on T.E. Lawrence to her final poem 'Death', introduced and contextualized by Edwards.TABLE OF CONTENTS //Part I. Eve Kosofsky Sedgwick as a PoetJason Edwards - Introduction: Bathroom Songs? Eve Kosofsky Sedgwick as a PoetAngus Connell Brown - Look with Your HandsBen Westwood - The Abject Animal Poetics of 'The Warm Decembers'Kathryn R. Kent - Eve's MuseMary Baine Campbell - 'Shyly / as a big sister I would yearn / to trace its avocations', or, Who's the Muse?Monica Pearl - Queer Therapy: On the Couch with Eve Kosofsky SedgwickMeg Boulton - Waiting in the Dark: Some Musings on Sedgwick's Performative(s)Part II. The Uncollected PoemsJason Edwards - Introduction: Someday We'll Look Back with Pleasure Even on is: Sedgwick's Uncollected PoemsPoems
Adversarial Machine Learning

Adversarial Machine Learning

Jason Edwards

JOHN WILEY SONS INC
2026
sidottu
Enables readers to understand the full lifecycle of adversarial machine learning (AML) and how AI models can be compromised Adversarial Machine Learning is a definitive guide to one of the most urgent challenges in artificial intelligence today: how to secure machine learning systems against adversarial threats. This book explores the full lifecycle of adversarial machine learning (AML), providing a structured, real-world understanding of how AI models can be compromised—and what can be done about it. The book walks readers through the different phases of the machine learning pipeline, showing how attacks emerge during training, deployment, and inference. It breaks down adversarial threats into clear categories based on attacker goals—whether to disrupt system availability, tamper with outputs, or leak private information. With clarity and technical rigor, it dissects the tools, knowledge, and access attackers need to exploit AI systems. In addition to diagnosing threats, the book provides a robust overview of defense strategies—from adversarial training and certified defenses to privacy-preserving machine learning and risk-aware system design. Each defense is discussed alongside its limitations, trade-offs, and real-world applicability. In Adversarial Machine Learning, readers will gain a comprehensive view of today’s most dangerous attack methods: Evasion attacks that manipulate inputs to deceive AI predictions Poisoning attacks that corrupt training data or model updates Backdoor and trojan attacks that embed malicious triggers Privacy attacks that reveal sensitive data through model interaction and prompt injection Generative AI attacks that exploit the new wave of large language models Blending technical depth with practical insight, Adversarial Machine Learning equips developers, security engineers, and AI decision-makers with the knowledge they need to understand the adversarial landscape and defend their systems with confidence.
The Cybersecurity Guide to Governance, Risk, and Compliance

The Cybersecurity Guide to Governance, Risk, and Compliance

Jason Edwards; Griffin Weaver

JOHN WILEY SONS INC
2024
sidottu
The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more. The Cybersecurity Guide to Governance, Risk, and Compliance also covers: Over 1300 actionable recommendations found after each sectionDetailed discussion of topics including AI, cloud, and quantum computingMore than 70 ready-to-use KPIs and KRIs "This guide’s coverage of governance, leadership, legal frameworks, and regulatory nuances ensures organizations can establish resilient cybersecurity postures. Each chapter delivers actionable knowledge, making the guide thorough and practical."—GARY McALUM, CISO "This guide represents the wealth of knowledge and practical insights that Jason and Griffin possess. Designed for professionals across the board, from seasoned cybersecurity veterans to business leaders, auditors, and regulators, this guide integrates the latest technological insights with governance, risk, and compliance (GRC)".—WIL BENNETT, CISO
Building Effective Privacy Programs

Building Effective Privacy Programs

Jason Edwards; Griffin Weaver

JOHN WILEY SONS INC
2025
sidottu
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topicsPresents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implicationsOffers strategies to integrate privacy principles into business processes and IT systemsCovers industry-specific applications for healthcare, finance, and technology sectors Highlights successful privacy program implementations and lessons learned from enforcement actionsIncludes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.
IBM Cognos 8 Planning

IBM Cognos 8 Planning

Jason Edwards; Ned Riaz; Rich Babaran

Packt Publishing Limited
2009
nidottu
This is a step-by-step, practical guide to designing, building, and deploying Planning models, with plenty of advice from three of the most seasoned Cognos Planning consultants having over 25 years of real-world, in-the-trench experience. We remove the technical clutter and jump right to the heart of the subject focusing only on what is important. Written for first-time developers wanting an introduction to IBM Cognos Planning, this book gives clear, easy-to-understand instructions on how to design, build, and deploy Planning models focusing only on the essential tools that you need to know. It is for anyone who wants to understand IBM Cognos Planning and make a transition to this tool from elsewhere.
Food, Politics, and Society

Food, Politics, and Society

Alejandro Colas; Jason Edwards; Jane Levi; Sami Zubaida

University of California Press
2018
sidottu
Food and drink has been a focal point of modern social theory since the inception of agrarian capitalism and the industrial revolution. From Adam Smith to Mary Douglas, major thinkers have used key concepts such as identity, exchange, culture, and class to explain the modern food system. Food, Politics, and Society offers a historical and sociological survey of how these various ideas and the practices that accompany them have shaped our understanding and organization of the production, processing, preparation, serving, and consumption of food and drink in modern societies. Divided into twelve chapters and drawing on a wide range of historical and empirical illustrations, this book provides a concise, informed, and accessible survey of the interaction between social theory and food and drink. It is perfect for courses in a wide range of disciplines.
Food, Politics, and Society

Food, Politics, and Society

Alejandro Colas; Jason Edwards; Jane Levi; Sami Zubaida

University of California Press
2018
pokkari
Food and drink has been a focal point of modern social theory since the inception of agrarian capitalism and the industrial revolution. From Adam Smith to Mary Douglas, major thinkers have used key concepts such as identity, exchange, culture, and class to explain the modern food system. Food, Politics, and Society offers a historical and sociological survey of how these various ideas and the practices that accompany them have shaped our understanding and organization of the production, processing, preparation, serving, and consumption of food and drink in modern societies. Divided into twelve chapters and drawing on a wide range of historical and empirical illustrations, this book provides a concise, informed, and accessible survey of the interaction between social theory and food and drink. It is perfect for courses in a wide range of disciplines.
Child ADHD

Child ADHD

Edwards Jason H.

WW Norton Co
2012
sidottu
New data and fresh insights for addressing ADHD in young children. Worldly wisdom regarding attention deficit hyperactivity disorder abounds. Only now is research demonstrating which interventions are most effective for children with ADHD. Jason Edwards presents a clear model for assessing and treating ADHD in the context of the family, school, and special camp programs.
Navigating the Post-Cold War World

Navigating the Post-Cold War World

Jason A. Edwards

Lexington Books
2008
sidottu
Jason A. Edwards explores the various rhetorical choices and strategies employed by former President Bill Clinton to discuss foreign policy issues in a new, post-Cold War era. Edwards argues that each American president has situated himself within the same foreign policy paradigm, drawing upon the same set of ideas and utilizing the same basic vernacular to discuss foreign policy. He describes how former presidents-and President Clinton, in particular-made modifications to this paradigm, leaving a rhetorical signature that tells us as much about the nature of their presidency as it does about the international environment they faced. With the end of the Cold War came the end of a relatively stable international order. This end sparked intense debates about the new direction of American foreign policy. As Bill Clinton took office, he developed a new lexicon of words in order to discuss America's changing role in the world and other major international issues of the time without being able to fall into Cold War-era rhetoric. By examining the nuances and unique contributions President Clinton made to American foreign policy rhetoric, Edwards shows how his distinct rhetorical signature will influence future administrations.
Conquering Perversion

Conquering Perversion

Jason W. Edwards

Independently Published
2017
nidottu
The struggle to conquer perversion is not impossible to achieve. Through God, everyone can accomplish this seemingly large task. In prayer, fasting, and direction God will help out all those who are in need.
The Anchor of a Believer’s Hope

The Anchor of a Believer’s Hope

Jason D. Edwards

VANDENHOECK RUPRECHT GMBH CO KG
2025
sidottu
The fundamentals of every faith are exposed in their conceptualization of death. Recent studies have caricatured Post-Reformation Calvinist theology of death as cold and fatalistic. Jason D. Edwards examines the Reformed English Puritan John Flavel's (ca. 1627-1691) theology of death through close analysis of his writings on mortality, dying, and eternal destiny. The spine of his doctrine was covenant theology, or how he understood the terms and applications of divine covenants, though this aspect of his theology has been largely neglected. Inquiry into Flavel's treatment of death demonstrates how the Puritan minister emphasized union to Christ as Mediator as the only grounds for a believer's hope. Flavel applied his theology to the spiritual needs of those facing death and dying with warmth, clarity, and conviction to anchor all hope in death upon Christ.