Kirjojen hintavertailu. Mukana 11 447 857 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Seth Ward

Evaluating Police Uses of Force

Evaluating Police Uses of Force

Seth W. Stoughton; Jeffrey J. Noble; Geoffrey P. Alpert

New York University Press
2021
pokkari
Provides a critical understanding and evaluation of police tactics and the use of force Police violence has historically played an important role in shaping public attitudes toward the government. Community trust and confidence in policing have been undermined by the perception that officers are using force unnecessarily, too frequently, or in problematic ways. The use of force, or harm suffered by a community as a result of such force, can also serve as a flashpoint, a spark that ignites long-simmering community hostility. In Evaluating Police Uses of Force, legal scholar Seth W. Stoughton, former deputy chief of police Jeffrey J. Noble, and distinguished criminologist Geoffrey P. Alpert explore a critical but largely overlooked facet of the difficult and controversial issues of police violence and accountability: how does society evaluate use-of-force incidents? By leading readers through answers to this question from four different perspectives—constitutional law, state law, administrative regulation, and community expectations—and by providing critical information about police tactics and force options that are implicated within those frameworks, Evaluating Police Uses of Force helps situate readers within broader conversations about governmental accountability, the role that police play in modern society, and how officers should go about fulfilling their duties.
Evaluating Police Uses of Force

Evaluating Police Uses of Force

Seth W. Stoughton; Jeffrey J. Noble; Geoffrey P. Alpert

New York University Press
2020
sidottu
Provides a critical understanding and evaluation of police tactics and the use of force Police violence has historically played an important role in shaping public attitudes toward the government. Community trust and confidence in policing have been undermined by the perception that officers are using force unnecessarily, too frequently, or in problematic ways. The use of force, or harm suffered by a community as a result of such force, can also serve as a flashpoint, a spark that ignites long-simmering community hostility. In Evaluating Police Uses of Force, legal scholar Seth W. Stoughton, former deputy chief of police Jeffrey J. Noble, and distinguished criminologist Geoffrey P. Alpert explore a critical but largely overlooked facet of the difficult and controversial issues of police violence and accountability: how does society evaluate use-of-force incidents? By leading readers through answers to this question from four different perspectives—constitutional law, state law, administrative regulation, and community expectations—and by providing critical information about police tactics and force options that are implicated within those frameworks, Evaluating Police Uses of Force helps situate readers within broader conversations about governmental accountability, the role that police play in modern society, and how officers should go about fulfilling their duties.
Ancient Jewish Sciences and the History of Knowledge in Second Temple Literature
Until very recently, the idea of ancient Jewish sciences would have been considered unacceptable. Since the 1990s, Early Modern and Medieval Science in Jewish sources has been actively studied, but the consensus was that no real scientific themes could be found in earlier Judaism. This work points them out in detail and posits a new field of research: the scientific activity evident in the Dead Sea Scrolls and early Jewish pseudepigrapha. The publication of new texts and new analyses of older ones reveals crucial elements that are best illuminated by the history of science, and may have interesting consequences for it. The contributors evaluate these texts in relation to astronomy, astrology, and physiognomy, marking the first comprehensive attempt to account for scientific themes in Second Temple Judaism. They investigate the meaning and purpose of scientific explorations in an apocalyptic setting. An appreciation of these topics paves the way to a renewed understanding of the scientific fragments scattered throughout rabbinic literature. The book first places the Jewish material in the ancient context of the Near Eastern and Hellenistic worlds. While the Jewish texts were not on the cutting edge of scientific discovery, they find a meaningful place in the history of science, between Babylonia and Egypt, in the time period between Hipparchus and Ptolemy. The book uses recent advances in method to examine the contacts and networks of Jewish scholars in their ancient setting. Second, the essays here tackle the problematic concept of a national scientific tradition. Although science is nowadays often conceived as universal, the historiography of ancient Jewish sciences demonstrates the importance of seeing the development of science in a local context. The book explores the tension between the hegemony of central scientific traditions and local scientific enterprises, showing the relevance of ancient data to contemporary postcolonial historiography of science. Finally, philosophical questions of the demarcation of science are addressed in a way that can advance the discussion of related ancient materials. Online edition available as part of the NYU Library's Ancient World Digital Library and in partnership with the Institute for the Study of the Ancient World (ISAW).
2 Maccabees 1-7

2 Maccabees 1-7

Seth M. Ehorn

Baylor University Press
2020
nidottu
In 2 Maccabees 1-7, Seth Ehorn provides a foundational analysis of the Greek text of 2 Maccabees. The analysis is distinguished by the detailed yet comprehensive attention paid to the text. Ehorn's analysis is a convenient pedagogical and reference tool that explains the form and syntax of the biblical text, offers guidance for deciding between competing semantic analyses, engages important text-critical debates, and addresses questions relating to the Greek text that are frequently overlooked by standard commentaries. Beyond serving as a succinct and accessible analytic key, 2 Maccabees 1-7 also reflects recent advances in scholarship on Greek grammar and linguistics and is informed by current discussions within Septuagint studies. These handbooks prove themselves indispensable tools for anyone committed to a deep reading of the Greek text of the Septuagint.
2 Maccabees 8-15

2 Maccabees 8-15

Seth M. Ehorn

Baylor University Press
2022
pokkari
In 2 Maccabees 8–15, Seth Ehorn provides a foundational analysis of the Greek text of 2 Maccabees. The analysis is distinguished by the detailed yet comprehensive attention paid to the text. Ehorn's analysis is a convenient pedagogical and reference tool that explains the form and syntax of the biblical text, offers guidance for deciding between competing semantic analyses, engages important text-critical debates, and addresses questions relating to the Greek text that are frequently overlooked by standard commentaries. Beyond serving as a succinct and accessible analytic key, 2 Maccabees 8–15 also reflects recent advances in scholarship on Greek grammar and linguistics and is informed by current discussions within Septuagint studies. These handbooks prove themselves indispensable tools for anyone committed to a deep reading of the Greek text of the Septuagint.
Desperately Reassmbling Me: A Collection of Poetry

Desperately Reassmbling Me: A Collection of Poetry

Seth A. Tribble

Createspace Independent Publishing Platform
2013
nidottu
Poetry is an explosion; the end result of the critical mass built up inside a mind that can only see the world in metaphor, concept, and verse. The content is a raw, unfettered, ever expanding front of emotional, philosophical, and psychological ore. The poet does not seek to mine or refine the things that result from this type of release. That is for the reader. The poetry contained within this book falls in line with that attitude. It is unrefined, explosive and impossible to ignore. From the outcries against war from a man who's seen it first-hand, and the simple mewlings of a brokenhearted boy, to the triumphant roar of sinful joys, and the gentle lilting whispers of new loves, these poems find focus in the frenetic mania of life. Thoughtful and thought-provoking, this book is a young mans attempt to make sense of the painful, wonderful world around him. Praise for Seth Tribble and Desperately Reassembling Me: "...it gave me hope for the future of poetry. Here is a young poet who thinks deeply. Not like so many young poets we've read who are so deeply self-absorbed, here is a young poet concerned with the broader concepts of the world." -J. Glenn Evans (Founder, PoetsWest)
What Is the Presidential Line of Succession?

What Is the Presidential Line of Succession?

Seth Lynch

Gareth Stevens Publishing
2025
nidottu
What would happen if the president were to become incapacitated or unable to perform their duties? In this educational book, readers will learn about how the presidential line of succession works. They'll discover the unique roles of the vice president, secretary of state, attorney general and more. They'll also understand how the line of succession was established, and when it has been used historically. The chapters are filled with vibrant photographs and relevant quotes from influential people, which enhance the main text. This enlightening book offers readers insight into our government system while inviting them to think critically about it.
What Is the Presidential Line of Succession?

What Is the Presidential Line of Succession?

Seth Lynch

Gareth Stevens Publishing
2025
sidottu
What would happen if the president were to become incapacitated or unable to perform their duties? In this educational book, readers will learn about how the presidential line of succession works. They'll discover the unique roles of the vice president, secretary of state, attorney general and more. They'll also understand how the line of succession was established, and when it has been used historically. The chapters are filled with vibrant photographs and relevant quotes from influential people, which enhance the main text. This enlightening book offers readers insight into our government system while inviting them to think critically about it.
Sold! Overthrowing the Status Quo in the Car Business
How would you like to Sell more Cars, and Make more Money...without having to take any more Fresh Customers than you already do? Imagine how many more Cars you would Sell, and how much more Money you would Make with a 50%% Closing Ratio. The Full Circle Sales Approach is a Simple, Systematic, Outside The Box Approach To The Sale that will help you dramatically increase your Closing Ratio. You will Sell more Cars, Make more Money, get better CSI Scores, and put your Sales on Autopilot. This Approach is perfectly suited to work with the way that Consumers shop for Vehicles in The Information Age. Your Sales and your Checking Account will never be the same again. Increase Your Closing Ratio. Increase Your Income.
Developing Games on the Raspberry Pi
Learn to set up a Pi-based game development environment, and then develop a game with Lua, a popular scripting language used in major game frameworks like Unreal Engine (BioShock Infinite), CryEngine (Far Cry series), Diesel (Payday: The Heist), Silent Storm Engine (Heroes of Might and Magic V) and many others. More importantly, learn how to dig deeper into programming languages to find and understand new functions, frameworks, and languages to utilize in your games.You’ll start by learning your way around the Raspberry Pi. Then you’ll quickly dive into learning game development with an industry-standard and scalable language. After reading this book, you'll have the ability to write your own games on a Raspberry Pi, and deliver those games to Linux, Mac, Windows, iOS, and Android. And you’ll learn how to publish your games to popular marketplaces for those desktop and mobile platforms.Whether you're new to programming or whether you've already published to marketslike Itch.io or Steam, this book showcases compelling reasons to use the Raspberry Pi for game development. Use Developing Games on the Raspberry Pi as your guide to ensure that your game plays on computers both old and new, desktop or mobile.What You'll Learn Confidently write programs in Lua and the LOVE game engine on the Raspberry PiResearch and learn new libraries, methods, and frameworks for more advanced programmingWrite, package, and sell apps for mobile platformsDeliver your games on multiple platformsWho This Book Is ForSoftware engineers, teachers, hobbyists, and development professionals looking to up-skill and develop games for mobile platforms, this book eases them into a parallel universe of lightweight, POSIX, ARM-based development.
Practical Cryptography in Python

Practical Cryptography in Python

Seth James Nielson; Christopher K. Monson

APress
2019
nidottu
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood of the digital world’s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand.Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You’ll LearnUnderstand where cryptography is used, why, and how it gets misusedKnow what secure hashing is used for and its basic propertiesGet up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations breakUse message integrity and/or digital signatures to protect messagesUtilize modern symmetric ciphers such as AES-GCM and CHACHAPractice the basics of public key cryptography, including ECDSA signaturesDiscover how RSA encryption can be broken if insecure padding is usedEmploy TLS connections for secure communicationsFind out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs Who This Book Is For IT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.
Discovering Cybersecurity

Discovering Cybersecurity

Seth James Nielson

APRESS
2023
nidottu
The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization’s mission.This book introduces major technologies that are employed in today’s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. What You Will Learn Authentication technologies, including secure password storage and how hackers “crack” password listsAccess control technology, such as BLP, BIBA, and more recent models such as RBAC and ABACCore cryptography technology, including AES encryption and public key signaturesClassical host security technologies that protect against malware (viruses, trojans, ransomware)Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systemsWeb security technologies, including cookies, state, and session defenses, and threats that try to subvert themEmail and social media security threats such as spam, phishing, social media, and other email threats Who This Book Is ForProfessionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.