Kirjojen hintavertailu. Mukana 11 244 527 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Seth Masek

2 Maccabees 1-7

2 Maccabees 1-7

Seth M. Ehorn

Baylor University Press
2020
nidottu
In 2 Maccabees 1-7, Seth Ehorn provides a foundational analysis of the Greek text of 2 Maccabees. The analysis is distinguished by the detailed yet comprehensive attention paid to the text. Ehorn's analysis is a convenient pedagogical and reference tool that explains the form and syntax of the biblical text, offers guidance for deciding between competing semantic analyses, engages important text-critical debates, and addresses questions relating to the Greek text that are frequently overlooked by standard commentaries. Beyond serving as a succinct and accessible analytic key, 2 Maccabees 1-7 also reflects recent advances in scholarship on Greek grammar and linguistics and is informed by current discussions within Septuagint studies. These handbooks prove themselves indispensable tools for anyone committed to a deep reading of the Greek text of the Septuagint.
2 Maccabees 8-15

2 Maccabees 8-15

Seth M. Ehorn

Baylor University Press
2022
pokkari
In 2 Maccabees 8–15, Seth Ehorn provides a foundational analysis of the Greek text of 2 Maccabees. The analysis is distinguished by the detailed yet comprehensive attention paid to the text. Ehorn's analysis is a convenient pedagogical and reference tool that explains the form and syntax of the biblical text, offers guidance for deciding between competing semantic analyses, engages important text-critical debates, and addresses questions relating to the Greek text that are frequently overlooked by standard commentaries. Beyond serving as a succinct and accessible analytic key, 2 Maccabees 8–15 also reflects recent advances in scholarship on Greek grammar and linguistics and is informed by current discussions within Septuagint studies. These handbooks prove themselves indispensable tools for anyone committed to a deep reading of the Greek text of the Septuagint.
Desperately Reassmbling Me: A Collection of Poetry

Desperately Reassmbling Me: A Collection of Poetry

Seth A. Tribble

Createspace Independent Publishing Platform
2013
nidottu
Poetry is an explosion; the end result of the critical mass built up inside a mind that can only see the world in metaphor, concept, and verse. The content is a raw, unfettered, ever expanding front of emotional, philosophical, and psychological ore. The poet does not seek to mine or refine the things that result from this type of release. That is for the reader. The poetry contained within this book falls in line with that attitude. It is unrefined, explosive and impossible to ignore. From the outcries against war from a man who's seen it first-hand, and the simple mewlings of a brokenhearted boy, to the triumphant roar of sinful joys, and the gentle lilting whispers of new loves, these poems find focus in the frenetic mania of life. Thoughtful and thought-provoking, this book is a young mans attempt to make sense of the painful, wonderful world around him. Praise for Seth Tribble and Desperately Reassembling Me: "...it gave me hope for the future of poetry. Here is a young poet who thinks deeply. Not like so many young poets we've read who are so deeply self-absorbed, here is a young poet concerned with the broader concepts of the world." -J. Glenn Evans (Founder, PoetsWest)
What Is the Presidential Line of Succession?

What Is the Presidential Line of Succession?

Seth Lynch

Gareth Stevens Publishing
2025
nidottu
What would happen if the president were to become incapacitated or unable to perform their duties? In this educational book, readers will learn about how the presidential line of succession works. They'll discover the unique roles of the vice president, secretary of state, attorney general and more. They'll also understand how the line of succession was established, and when it has been used historically. The chapters are filled with vibrant photographs and relevant quotes from influential people, which enhance the main text. This enlightening book offers readers insight into our government system while inviting them to think critically about it.
What Is the Presidential Line of Succession?

What Is the Presidential Line of Succession?

Seth Lynch

Gareth Stevens Publishing
2025
sidottu
What would happen if the president were to become incapacitated or unable to perform their duties? In this educational book, readers will learn about how the presidential line of succession works. They'll discover the unique roles of the vice president, secretary of state, attorney general and more. They'll also understand how the line of succession was established, and when it has been used historically. The chapters are filled with vibrant photographs and relevant quotes from influential people, which enhance the main text. This enlightening book offers readers insight into our government system while inviting them to think critically about it.
Sold! Overthrowing the Status Quo in the Car Business
How would you like to Sell more Cars, and Make more Money...without having to take any more Fresh Customers than you already do? Imagine how many more Cars you would Sell, and how much more Money you would Make with a 50%% Closing Ratio. The Full Circle Sales Approach is a Simple, Systematic, Outside The Box Approach To The Sale that will help you dramatically increase your Closing Ratio. You will Sell more Cars, Make more Money, get better CSI Scores, and put your Sales on Autopilot. This Approach is perfectly suited to work with the way that Consumers shop for Vehicles in The Information Age. Your Sales and your Checking Account will never be the same again. Increase Your Closing Ratio. Increase Your Income.
Developing Games on the Raspberry Pi
Learn to set up a Pi-based game development environment, and then develop a game with Lua, a popular scripting language used in major game frameworks like Unreal Engine (BioShock Infinite), CryEngine (Far Cry series), Diesel (Payday: The Heist), Silent Storm Engine (Heroes of Might and Magic V) and many others. More importantly, learn how to dig deeper into programming languages to find and understand new functions, frameworks, and languages to utilize in your games.You’ll start by learning your way around the Raspberry Pi. Then you’ll quickly dive into learning game development with an industry-standard and scalable language. After reading this book, you'll have the ability to write your own games on a Raspberry Pi, and deliver those games to Linux, Mac, Windows, iOS, and Android. And you’ll learn how to publish your games to popular marketplaces for those desktop and mobile platforms.Whether you're new to programming or whether you've already published to marketslike Itch.io or Steam, this book showcases compelling reasons to use the Raspberry Pi for game development. Use Developing Games on the Raspberry Pi as your guide to ensure that your game plays on computers both old and new, desktop or mobile.What You'll Learn Confidently write programs in Lua and the LOVE game engine on the Raspberry PiResearch and learn new libraries, methods, and frameworks for more advanced programmingWrite, package, and sell apps for mobile platformsDeliver your games on multiple platformsWho This Book Is ForSoftware engineers, teachers, hobbyists, and development professionals looking to up-skill and develop games for mobile platforms, this book eases them into a parallel universe of lightweight, POSIX, ARM-based development.
Practical Cryptography in Python

Practical Cryptography in Python

Seth James Nielson; Christopher K. Monson

APress
2019
nidottu
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood of the digital world’s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand.Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You’ll LearnUnderstand where cryptography is used, why, and how it gets misusedKnow what secure hashing is used for and its basic propertiesGet up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations breakUse message integrity and/or digital signatures to protect messagesUtilize modern symmetric ciphers such as AES-GCM and CHACHAPractice the basics of public key cryptography, including ECDSA signaturesDiscover how RSA encryption can be broken if insecure padding is usedEmploy TLS connections for secure communicationsFind out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs Who This Book Is For IT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.
Discovering Cybersecurity

Discovering Cybersecurity

Seth James Nielson

APRESS
2023
nidottu
The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization’s mission.This book introduces major technologies that are employed in today’s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers “crack” password listsAccess control technology, such as BLP, BIBA, and more recent models such as RBAC and ABACCore cryptography technology, including AES encryption and public key signaturesClassical host security technologies that protect against malware (viruses, trojans, ransomware)Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systemsWeb security technologies, including cookies, state, and session defenses, and threats that try to subvert themEmail and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is ForProfessionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
Denying AIDS

Denying AIDS

Seth C. Kalichman; Nicoli Nattrass

Copernicus Books
2014
nidottu
Paralleling the discovery of HIV and the rise of the AIDS pandemic, a flock of naysayers has dedicated itself to replacing genuine knowledge with destructive misinformation—and spreading from the fringe to the mainstream media and the think tank. Now from the editor of the journal AIDS and Behavior comes a bold exposé of the scientific and sociopolitical forces involved in this toxic evasion. Denying AIDS traces the origins of AIDS dissidents disclaimers during the earliest days of the epidemic and delves into the psychology and politics of the current denial movement in its various incarnations. Seth Kalichman focuses not on the “difficult” or doubting patient, but on organized, widespread forms of denial (including the idea that HIV itself is a myth and HIV treatments are poison) and the junk science, faulty logic, conspiracy theories, and larger forces of homophobia and racism that fuel them. The malignant results of AIDS denial can be seen in those individuals who refuse to be tested, ignore their diagnoses, or reject the treatments that could save their lives. Instead of ignoring these currents, asserts Kalichman, science has a duty to counter them. Among the topics covered: Why AIDS denialism endures, and why science must understand it. Pioneer virus HIV researcher Peter Duesberg’s role in AIDS denialism. Flawed immunological, virological, and pharmacological pseudoscience studies that are central to texts of denialism. The social conservative agenda and the politics of AIDS denial, from the courts to the White House. The impact of HIV misinformation on public health in South Africa. Fighting fiction with reality: anti-denialism and the scientific community. For anyone affected by, interested in, or working with researchers in HIV/AIDS, and public health professionals in general, the insight and vision of Denying AIDS will inspire outrage, discussion, and ultimately action. See http://denyingaids.blogspot.com/ for more information.