Kirjojen hintavertailu. Mukana 11 232 919 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Rodney Simpson

Fraud Prevention and Detection

Fraud Prevention and Detection

Rodney T. Stamler; Hans J. Marschdorf; Mario Possamai

Routledge Member of the Taylor and Francis Group
2014
sidottu
Lessons can be learned from major fraud cases. Whether the victim is a company, public agency, nonprofit, foundation, or charity, there is a high likelihood that many of these frauds could have been prevented or detected sooner if early Red Flag warning signs had been identified and acted upon. Fraud Prevention and Detection: Warning Signs and the Red Flag System will enable officers and directors, internal and external stakeholders, as well as outside analysts to protect themselves and their organizations against fraud by effectively detecting, analyzing, and acting on early Red Flag warning signs. Based on an empirically tested strategy, the Red Flag System reflects the authors’ more than 100 years combined experience in the investigation of fraud in high-profile, global cases in North America, Africa, Europe, and the Far East.Readers of this book will:Acquire a general awareness of the nature, characteristics, and dynamics of fraudUnderstand the process for determining whether a fraud has been committedDevelop an understanding of enterprise risk management approaches for fraud risk management, compliance risk management, and managing the risk of fraudulent financial reporting—including an understanding of the limitations inherent in these approachesLearn how to find Red Flag indicators of fraud or suspicious transactions in financial statements, budgets, and contractsKnow how to ensure that, once a Red Flag has been identified, appropriate action is takenFraud can lead to significant financial loss as well as bad press and publicity with significant reputational impact for officers, directors, corporations, and their stakeholders. This book’s no-nonsense approach empowers those charged with protecting organizations to stop these frauds before the organization’s livelihood is jeopardized or to mitigate damage when fraud has occurred.
Minimal Weak Truth Table Degrees and Computably Enumerable Turing Degrees

Minimal Weak Truth Table Degrees and Computably Enumerable Turing Degrees

Rodney G. Downey; Keng Meng Ng; Reed Solomon

American Mathematical Society
2020
nidottu
Two of the central concepts for the study of degree structures in computability theory are computably enumerable degrees and minimal degrees. For strong notions of reducibility, such as $m$-deducibility or truth table reducibility, it is possible for computably enumerable degrees to be minimal. For weaker notions of reducibility, such as weak truth table reducibility or Turing reducibility, it is not possible to combine these properties in a single degree. This book considers how minimal weak truth table degrees interact with computably enumerable Turing degrees and obtain three main results. First, there are sets with minimal weak truth table degree which bound noncomputable computably enumerable sets under Turing reducibility. Second, no set with computable enumerable Turing degree can have minimal weak truth table degree. Third, no $\Delta^0_2$ set which Turing bounds a promptly simple set can have minimal weak truth table degree.
Garden of Memory

Garden of Memory

Rodney Castleden

Lulu Press Inc
2023
pokkari
A complete record of all the inscriptions in the church and churchyard at Wilmington in Sussex. Wilmington is steeped in history and folklore. Stories of the church, the priory next to it and the figure of the Long Man looming over them on Windover Hill seem to intertwine. The yew tree presiding over the churchyard may be more ancient than any of them. A detailed historical introduction narrates the stories of all of these features and shows how they link together. The full record of monumental inscriptions includes photos, plans and indexes, making this book an invaluable resource for local and family history. 247 pages.
The Wilmington Giant

The Wilmington Giant

Rodney Castleden

Lulu.com
2012
nidottu
This is the first book to have been written about the Long Man of Wilmington. Many different theories about the Long Man's origins are discussed and evaluated. The book is a guide to the history and archaeology of the Giant's Downland setting, and will appeal to everyone who loves the landscape, heritage, history and lore of the South Downs. An expanded version of the 1983 edition, which has been described in a review as 'a modern antiquarian classic'. 258 pages, 96 black and white illustrations.
Spoken Discourse

Spoken Discourse

Rodney Jones

Bloomsbury Academic
2016
nidottu
This book provides an overview of current theories of and methods for analysing spoken discourse. It includes discussions of both the more traditional approaches of pragmatics, conversation analysis, interactional sociolinguistics, linguistic anthropology and critical discourse analysis, and more recently developed approaches such as multimodal discourse analysis and critical sociolinguistics. Rather than treating these perspectives as mutually exclusive, the book introduces a framework based on principles from mediated discourse analysis in which different approaches to spoken discourse are seen as complementing and informing one another. In this framework, spoken discourse is seen as mediated through a complex collection of technological, semiotic and cultural tools which enable and constrain people’s ability to engage in different kinds of social actions, enact different kinds of social identities and form different kinds of social relationships. A major focus of the volume is on the way technological tools like telephones, broadcast media, digital technologies are changing the way people communicate with spoken language. The book is suitable for use as a textbook in advanced courses in discourse analysis and language in social interaction, and will also be of interest to scholars in a variety of fields including linguistics, sociology, media studies and anthropology.
Spoken Discourse

Spoken Discourse

Rodney Jones

Bloomsbury Academic
2016
sidottu
This book provides an overview of current theories of and methods for analysing spoken discourse. It includes discussions of both the more traditional approaches of pragmatics, conversation analysis, interactional sociolinguistics, linguistic anthropology and critical discourse analysis, and more recently developed approaches such as multimodal discourse analysis and critical sociolinguistics. Rather than treating these perspectives as mutually exclusive, the book introduces a framework based on principles from mediated discourse analysis in which different approaches to spoken discourse are seen as complementing and informing one another. In this framework, spoken discourse is seen as mediated through a complex collection of technological, semiotic and cultural tools which enable and constrain people’s ability to engage in different kinds of social actions, enact different kinds of social identities and form different kinds of social relationships. A major focus of the volume is on the way technological tools like telephones, broadcast media, digital technologies are changing the way people communicate with spoken language. The book is suitable for use as a textbook in advanced courses in discourse analysis and language in social interaction, and will also be of interest to scholars in a variety of fields including linguistics, sociology, media studies and anthropology.
General Lord Rawlinson

General Lord Rawlinson

Rodney Atwood

Bloomsbury Academic
2018
sidottu
In this biography Rodney Atwood details the life of General Lord Rawlinson of Trent (1864-1925), a distinguished British soldier whose career culminated in decisive victories on the Western Front in 1918 and command of the Indian Army in the early 1920s. He served his soldier’s apprenticeship in the Victorian colonial wars in Burma, the Sudan and South Africa. His career provides a lens through which to examine the British Army in the late-19th and early-20th century. In the South African War (1899-1902) Rawlinson’s ideas aided the defence of Ladysmith, and he distinguished himself leading a mobile column in the guerrilla war. In the First World War he held an important command in most of the British Expeditionary Force’s battles on the Western Front. He bears a heavy part-responsibility for the disastrous first day of the Somme, but later in the battle his successful tactics inflicted heavy losses on the enemy. His Western Front career culminated in a series of victories beginning at Amiens. He commanded the Indian Army between 1920 and 1925 at a time of military and political tension following the 3rd Afghan War and the Amritsar Massacre. He introduced necessary reforms, cut expenditure at a time of postwar retrenchment and began commissioning Indians to replace British officers. He would have taken up the post of CIGS (Chief of the Imperial General Staff), thus being the only British soldier to hold these two top posts. He died, however, four days after his sixty-first birthday. Drawing extensively on archival material including Rawlinson’s own engagingly-written letters and diaries, this thorough examination of his life will be of great interest to those studying British military history, imperial history and the First World War.
How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone

How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone

Rodney D. Cambridge

Createspace Independent Publishing Platform
2012
nidottu
If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hackers and bad guys are everywhere. They're after your data so they can steal from you and make you a victim of ID theft, credit card fraud, utilities fraud, or worse. But not only can they do this through your PC or laptop, now they can do it all through your iPhone, Android, or Blackberry. Don't let them Many ID theft attempts occur when you're away from home and in unfamiliar surroundings. So when you're visiting that coffee shop with friends, making a trip up town to do some shopping, traveling to London for the 2012 Olympic Games, or vacationing elsewhere this summer, think before you connect to that Wi-Fi network to grab your email. How safe and secure is it? In "How NOT To Use Your Smartphone", computer security expert Rod Cambridge exposes the dangers of smartphone and tablet usage and provides solutions, tips, and advice to keep you one step ahead of the bad guys and help you avoid being hacked through your mobile device.