Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjailija

Tony Bradley

Kirjat ja teokset yhdessä paikassa: 6 kirjaa, julkaisuja vuosilta 2006-2020, suosituimpien joukossa Wireless Security: Know It All. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

6 kirjaa

Kirjojen julkaisuhaarukka 2006-2020.

Evolving Work

Evolving Work

Ronnie Lessem; Tony Bradley

Routledge
2020
nidottu
The idea of Self and the authenticity of particular identities have been rapidly dissolving in the acids of post-modern globalising capitalism. The hegemony of patterns of work, wage-labor and the operation of labour markets in the American West (and European North) has ridden rough-shod over distinctive ways of enabling communities to flourish in many parts of the Southern and Eastern worlds (Global South). But, this is not inevitable. Indeed, as this book indicates, there are many practical examples across the globe – that connect with some of the most significant theoretical challenges to the operation of dehumanising work – which reveal that a profound reversal is taking place. As such, the core theme of this book is to show that a movement is occurring whereby self-employment can be transformed into communal work that employs the Self in ways that release the authentic vocations of people, individually and collectively.The approach taken in these chapters traverses the globe, utilising the original ‘integral worlds’ model that will be familiar to students of the Trans4M/Routledge Transformation and Innovation series, developed over more than a decade. Such a standpoint points the way to the release of particular social and economic cultures in each of what we term the four "realities" or "worldviews" of South, East, North and Western worlds. In this book we use the methodology of GENEalogy – identifying the realms associated with each world – to show how the rhythms, that is Grounding, Emergence, Navigation and Effect, of each is leading to greater economic, social and spiritual freedom for individuals, organisations, communities and, indeed, entire societies.
The Idea of the Communiversity

The Idea of the Communiversity

Ronnie Lessem; Anselm Adodo; Tony Bradley

Beacon Books and Media Ltd
2019
pokkari
This book takes an integral world's approach to societal transformation, by pointing to ways in which we can reform our modes of knowledge creation. Through the fourfold model of community, pilgrimium, academy and co-laboratory, the authors have re-conceptualised a university for every people and culture.
Evolving Work

Evolving Work

Ronnie Lessem; Tony Bradley

CRC Press Inc
2018
sidottu
The idea of Self and the authenticity of particular identities have been rapidly dissolving in the acids of post-modern globalising capitalism. The hegemony of patterns of work, wage-labor and the operation of labour markets in the American West (and European North) has ridden rough-shod over distinctive ways of enabling communities to flourish in many parts of the Southern and Eastern worlds (Global South). But, this is not inevitable. Indeed, as this book indicates, there are many practical examples across the globe – that connect with some of the most significant theoretical challenges to the operation of dehumanising work – which reveal that a profound reversal is taking place. As such, the core theme of this book is to show that a movement is occurring whereby self-employment can be transformed into communal work that employs the Self in ways that release the authentic vocations of people, individually and collectively.The approach taken in these chapters traverses the globe, utilising the original ‘integral worlds’ model that will be familiar to students of the Trans4M/Routledge Transformation and Innovation series, developed over more than a decade. Such a standpoint points the way to the release of particular social and economic cultures in each of what we term the four "realities" or "worldviews" of South, East, North and Western worlds. In this book we use the methodology of GENEalogy – identifying the realms associated with each world – to show how the rhythms, that is Grounding, Emergence, Navigation and Effect, of each is leading to greater economic, social and spiritual freedom for individuals, organisations, communities and, indeed, entire societies.
Wireless Security: Know It All

Wireless Security: Know It All

Praphul Chandra; Frank Thornton; Chris Lanthem; Jon S. Wilson; Dan Bensky; Tony Bradley; Chris Hurley; Steve A. Rackley; John Rittinghouse PhD CISM; James F. Ransome PhD CISM CISSP; Timothy Stapko; George L Stefanek

Newnes (an imprint of Butterworth-Heinemann Ltd )
2008
nidottu
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
Windows Vista Security For Dummies

Windows Vista Security For Dummies

Tony Bradley

John Wiley Sons
2007
nidottu
Windows Vista is beefed up with plenty of new security features to help you deflect spyware, malware, and identity thieves. But unless you know how to use these powerful tools, all you'll get is frustration. So arm yourself with "Vista Security For Dummies" and discover your right to Rights Management, what Windows Security Center provides, and how to toughen up your defenses. This indispensable guide shows you how to slam your Windows shut on vulnerabilities and security threats. You'll find out how to use the fortress built into Vista to assess your risk, protect your kids, keep pfishers out of your bank account, and much more. You'll also learn how to get the most out of Vista's security features using authentication, Windows Defender, parent controls, security enhancements, firewall buttresses, wireless protections, encryption, and much more. Discover how to: Save money by using built-in security tools Audit your network Fine-tune your firewall Use all of the enhancements in Explorer 7 Control what your kids play and where they go online Develop a comprehensive security plan Dispense security from Windows Security Center Reduce exposure by controlling user tasks Secure your digital information with RMS Manage accounts, groups, and shares Plan and implement Encrypting File System Avoid data theft with BitLocker Establish advanced security practices Don't leave your computer and network security to chance. Get "Vista Security For Dummies" and be ready for anything
Hacker's Challenge 3

Hacker's Challenge 3

David Pollino; Bill Pennington; Tony Bradley; Himanshu Dwivedi

McGraw-Hill Professional
2006
nidottu
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in SecurityEvery day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.