Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Fully updated and revised, this leading guide on Internet privacy, anonymity and security contains all the practical information you need to inform and protect yourself. In this comprehensive yet easy-to-read guide for Windows users, you will quickly learn how to: stop search engines, social media and other powerful Internet players from tracking and profiling your online activities gain unrestricted access to all the content and downloads the Internet has to offer use social media to stay connected with friends in ways that don't compromise your privacy or safety keep hackers, identity thieves and adversaries from gaining access to your computer use the best (and often free!) privacy, anonymity and security apps that really work mask your IP address with a proxy, The Onion Router (Tor) or a virtual private network (VPN) use encryption to keep your digital items, downloads and personal information completely hidden and safe prevent surveillance and the monitoring of your activities by Internet service providers (ISP), governments, adversaries and other unwelcome snoops enjoy all the benefits (and downloads) of torrent file-sharing and Usenet newsgroups while staying protected and anonymous get rid of trace and hidden data on your computer that exposes your private activities conduct checks on how private your online activities and devices really are From your small investment in this book, you will benefit for years to come. After all, your privacy and security are priceless.
Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obtain all kinds of great media on the Internet, ranging from full-length movies, music files, video clips, ebooks, apps, software programs, images, documents to basically any digital content you can think of. Downloading and sharing torrents can feel anonymous, but this is deceptive. Unless you take some extra steps to protect your privacy while downloading and sharing torrents, the prying eyes of unwelcome snoops can eavesdrop, monitor and record your torrenting activities. You need to protect yourself against: aggressive firms monitoring your torrent activities your Internet service provider (ISP) slowing down or "throttling" your connection consequences from inadvertently downloading copyright materials (hey, it can happen to anyone) disclosure of torrent downloads you would rather keep hidden or secret intrusion and overreach on the part of businesses and governments prying into every aspect of our online lives (Big Brother syndrome) This no-nonsense Guide is your one-stop for how to download torrents anonymously, with helpful screenshots and recommendations along the way. It briefly explains the technology behind torrents, outlines the risks you take when downloading and sharing torrents, recommends the best ways to find torrents, and takes you step-by-step through the process of downloading and sharing torrents anonymously. If torrents are a new concept to you, don't worry, they are explained in the Guide without any fluff or technobabble. At the same time, even the most advanced users will learn new tips and tricks in this Guide. Either way, from beginner to advanced user, with the help of this Guide you will be downloading torrents anonymously like a pro in no time.
This book traces the evolution of an oral narrative tradition that inspired the Spanish epic poem Mocedades de Rodrigo.
This book introduces business historians to oral history methodologies and approaches.Using four distinct oral history case studies to explore ideas of disruption and continuity in business history over the second half of the twentieth century, Robert Crawford and Matthew Bailey demonstrate how critical engagement with oral history approaches serves to enhance and enliven business history as well as its relationship with other historical fields. The focus on disruption is used to encompass a broad set of processes such as technological change, the impact of external forces, informal business networks, social constructions of gender, knowledge transfer, firm adaptability and cultural change. The use of oral histories to interpret responses to disruption in the past, and to explore the features characterising business continuity, provides an opportunity to consider the human dimensions, subjective experiences and personal insights of workplace, firm and industry change. It also sheds light on the ways that people and firms respond to disruptive forces through innovation and adaptation - both successfully and unsuccessfully.This succinct and accessible account is essential reading for business historians with little experience in using oral history, as well as those looking to gain deeper insights from their oral history data.
Contributors: Alan Deyermond, Samuel G. Armistead, Thomas Montgomery, David Hook, Antonia Long, Vera Castro Lingl, Matthew Bailey, Mercedes Vaquero, Fernando Gómez Redondo, Fátima Alfonso Pinto
New examinations of the figure of Charlemagne in Spanish literature and culture.The historical point of departure for this volume is Charlemagne's ill-fated incursion into Spain in 778. After an unsuccessful siege of Zaragoza, the king of the Franks directed his army north and on his passage through the Pyrenees, he turned his wrath on Pamplona, destroying the Basque city and its walls. The Basques subsequently ambushed the rearguard of Charlemagne's army on the heights of Pyrenees, killing numerous officers of the palace, plunderingthe baggage, and then vanishing into the forested hills, leaving the Franks to grieve without the satisfaction of revenge. In Spain, popular narratives eventually diverted their attention away from the Franks to the Spaniards responsible for their slaughter. This volume explores those legendary narratives of the Spaniards who defeated Charlemagne's army and the larger textual and cultural context of his presence in Spain, from before their careful elaboration in Latin and vernacular chronicles into the early modern period. It shares with previous studies a focus on the narration of historical and imaginary events across genres, but is unique in its emphasis on the reception and evolution of the legendary figure of Charlemagne in Spain. Overall, its purpose is to address the diversity and importance of the Carolingian legends in the literary, historical, and imaginative spheres during the Middle Ages, Renaissance, and into the seventeenth century. Matthew Bailey is Professor of Spanish at Washington and Lee University in Lexington, Virginia; Ryan D. Giles is Associate Professor in the Department of Spanish and Portuguese at Indiana University, Bloomington. Contributors: Frederick A. de Armas, Matthew Bailey, Anibal Biglieri, Ryan D. Giles, Lucy K. Pick, Mercedes Vaquero.
The Poetics of Speech in the Medieval Spanish Epic explores the composition of manuscript texts in thirteenth-century Spain.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.