Buy anonops.eu ?

Products related to Using:


  • Using Digital Technology
    Using Digital Technology

    Could you program a toaster Make a phone call on a watch Stop a thief from stealing your identity With computers we can do all this and more.Learn about our digital lives from staying safe online to understanding a computer's languages and discover how computers store and use our information in Computers and Coding.This series uses engaging imagery and simple information to equip young readers with the digital skills they need to live and learn in a virtual world.l|Could you program a toaster Make a phone call on a watch Stop a thief from stealing your identity With computers we can do all this and more.Learn about our digital lives from staying safe online to understanding a computer's languages and discover how computers store and use our information in Computers and Coding.This series uses engaging imagery and simple information to equip young readers with the digital skills they need to live and learn in a virtual world.l

    Price: 12.99 £ | Shipping*: 3.99 £
  • Python for Cybersecurity : Using Python for Cyber Offense and Defense
    Python for Cybersecurity : Using Python for Cyber Offense and Defense

    Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity.It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today. Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and executionPersistence, privilege escalation, defense evasion, and credential accessDiscovery, lateral movement, collection, and command and controlExfiltration and impact Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases.The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.

    Price: 22.99 £ | Shipping*: 3.99 £
  • Collecting Qualitative Data Using Digital Methods
    Collecting Qualitative Data Using Digital Methods

    Part of SAGE’s Mastering Business Research Methods Series, conceived and edited by Bill Lee, Mark N.K. Saunders and Vadake K. Narayanan and designed to support researchers by providing in-depth and practical guidance on using a chosen method of data collection or analysis. In Collecting Qualitative Data Using Digital Methods, Rebecca Whiting and Katrina Pritchard provide a concise and accessible guide to a digital data collection method, comprised of tracking and trawling that can be used to collect qualitative data in the fields of business, management and organizational research. With practical guidance and insight into how to use this approach in your own research, this book provides invaluable support to Business and Management masters students who choose to work with secondary data when completing their dissertations.

    Price: 28.99 £ | Shipping*: 0.00 £
  • A Guide to Using the Anonymous Web in Libraries and Information Organizations : Enhancing Patron Privacy and Information Access
    A Guide to Using the Anonymous Web in Libraries and Information Organizations : Enhancing Patron Privacy and Information Access

    A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.It will be particularly useful to those seeking to promote enhanced privacy for their patrons.The book begins by explaining, in simple terms, what the anonymous web is, how it works, and its benefits for users.Lund and Beckstrom also explain why they believe access to the anonymous web should be provided in library and information organizations around the world.They describe how to provide access, as well as educate library users on how to utilize the anonymous web and navigate any challenges that might arise during implementation.The authors also encourage the development of library policies that guide appropriate conduct and filter content, where appropriate, in order to deter illegal activity. A Guide to Using the Anonymous Web in Libraries and Information Organizations reminds us that libraries and other information providers have a duty to educate and support their communities, while also preserving privacy.Demonstrating that the anonymous web can help them to fulfil these obligations, this book will be essential reading for library and information professionals working around the world.

    Price: 32.99 £ | Shipping*: 0.00 £
  • Am I anonymous when using Tails Linux?

    When using Tails Linux, you are more anonymous compared to using a regular operating system. Tails routes your internet traffic through the Tor network, which helps to anonymize your online activities. However, it is important to note that complete anonymity is difficult to achieve, and additional measures such as practicing good online security habits are recommended to enhance your privacy.

  • Can you still get viruses despite using the Tor Browser for anonymity?

    While the Tor Browser can provide anonymity by routing your internet traffic through multiple servers, it does not guarantee protection against viruses or malware. Users can still inadvertently download malicious files or visit compromised websites that can infect their devices. It is important to use additional security measures such as antivirus software and safe browsing practices to minimize the risk of getting viruses while using the Tor Browser.

  • Which tablet is suitable for written digital calculations using digital pens?

    Tablets that are suitable for written digital calculations using digital pens are those with high precision and responsiveness in terms of pen input. Some popular options include the Apple iPad Pro, Microsoft Surface Pro, and Samsung Galaxy Tab S7. These tablets offer features like pressure sensitivity, low latency, and palm rejection, making them ideal for accurate and efficient handwritten calculations. Additionally, they often come with specialized styluses that enhance the writing experience.

  • What is artistic freedom when using brand names?

    Artistic freedom when using brand names refers to the ability of artists to incorporate recognizable brands into their work without facing legal repercussions. It allows artists to make social commentary, critique consumer culture, or simply add a layer of realism to their creations. However, artists must be mindful of trademark laws and avoid using brand names in a way that could be seen as defamatory or damaging to the brand's reputation. Ultimately, artistic freedom with brand names allows for a rich and diverse cultural landscape where artists can freely express themselves.

Similar search terms for Using:


  • Global LGBTQ Activism : Social Media, Digital Technologies, and Protest Mechanisms
    Global LGBTQ Activism : Social Media, Digital Technologies, and Protest Mechanisms

    Focused on understanding and analyzing LGBTQ activism and protest globally, this edited collection brings together voices from different parts of the world to examine LGBTQ protests and their impact. Through the lens of media, culture, and sociopolitical structures, this collection highlights how cultural and technical factors like the emergence of social media and other digital platforms have impacted LGBTQ activism.This book draws on studies from countries as varied as Zimbabwe, Bangladesh, Sri Lanka, Hungary, Morocco, China, and the US.The contributions provide important insight into how social media and digital platforms have provided space for self-expression and protest and encouraged advocacy and empowerment for LGBTQ movements.It also examines the diversity and similarities between different national contexts and the various obstacles faced, while spotlighting countries that are traditionally understudied in Western academia, in an important step toward decolonizing research.Each chapter, through the voices of activists and media scholars, moves beyond an oversimplified examination of queer protests to show, in rich detail, the exciting yet complicated terrain of queer protests throughout the globe. This book is suitable for media, communication, and cultural studies students; researchers; academics; and LGBTQ activists, as well as students and scholars from related academic disciplines.

    Price: 35.99 £ | Shipping*: 0.00 £
  • Digital Design Using VHDL : A Systems Approach
    Digital Design Using VHDL : A Systems Approach

    This introductory textbook provides students with a system-level perspective and the tools they need to understand, analyze and design digital systems.Going beyond the design of simple combinational and sequential modules, it shows how such modules are used to build complete systems, reflecting real-world digital design.All the essential topics are covered, including design and analysis of combinational and sequential modules, as well as system timing and synchronization.It also teaches how to write VHDL-2008 HDL in a productive and maintainable style that enables CAD tools to do much of the tedious work.A complete introduction to digital design is given through clear explanations, extensive examples and online VHDL files.The teaching package is completed with lecture slides, labs and a solutions manual for instructors.Assuming no previous digital knowledge, this textbook is ideal for undergraduate digital design courses that will prepare students for modern digital practice.

    Price: 62.99 £ | Shipping*: 0.00 £
  • USING STATISTICS
    USING STATISTICS


    Price: 18.60 £ | Shipping*: 3.99 £
  • Using Docker
    Using Docker

    Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available.With this hands-on guide, you'll learn why containers are so important, what you'll gain by adopting Docker, and how to make it part of your development process.Ideal for developers, operations engineers, and system administrators-especially those keen to embrace a DevOps approach-Using Docker will take you from Docker and container basics to running dozens of containers on a multi-host system with networking and scheduling.The core of the book walks you through the steps needed to develop, test, and deploy a web application with Docker.Get started with Docker by building and deploying a simple web application Use Continuous Deployment techniques to push your application to production multiple times a day Learn various options and techniques for logging and monitoring multiple containers Examine networking and service discovery: how do containers find each other and how do you connect them?Orchestrate and cluster containers to address load-balancing, scaling, failover, and scheduling Secure your system by following the principles of defense-in-depth and least privilege

    Price: 47.99 £ | Shipping*: 0.00 £
  • Did we miss the digital revolution?

    No, we have not missed the digital revolution. The digital revolution is an ongoing process that continues to evolve and shape our world. While some may feel that they have missed out on certain aspects of the digital revolution, there are still plenty of opportunities to engage with and benefit from digital technologies. It's never too late to embrace the digital revolution and take advantage of the opportunities it presents.

  • How do I build a privacy screen using wooden discs?

    To build a privacy screen using wooden discs, start by gathering the necessary materials such as wooden discs, a drill, screws, and a frame or support structure. Next, arrange the wooden discs in the desired pattern and mark the spots where you want to attach them to the frame. Then, use a drill to create pilot holes in the wooden discs and the frame, and finally, secure the discs to the frame using screws. You can also add additional support or reinforcement as needed to ensure the privacy screen is sturdy and secure.

  • How do you calculate degrees of freedom using Excel?

    To calculate degrees of freedom using Excel, you can use the formula =N-1, where N is the sample size. For example, if you have a sample size of 20, the degrees of freedom would be 20-1 = 19. You can input this formula directly into a cell in Excel to calculate the degrees of freedom for your data set.

  • How do I calculate a solid of revolution using GeoGebra?

    To calculate a solid of revolution using GeoGebra, you can follow these steps: 1. First, create a function or curve that you want to revolve around an axis. 2. Use the 'Revolution' tool in GeoGebra to revolve the curve around the desired axis. 3. Adjust the parameters such as the angle of revolution or the axis of rotation to customize the solid of revolution. 4. You can then use the 'Volume' tool in GeoGebra to calculate the volume of the solid of revolution.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.