Products related to Secure:
-
The Future of Cultural Analysis : A Critical Inquiry
Across the humanities and the social sciences, “cultural analysis” is a vibrant research practice.Since its introduction in the 1990s, its main principles have remained largely the same: interdisciplinarity, political urgency, a heuristic use of concepts, the detailed analysis of objects of culture, and an awareness of the scholar’s situatedness in the present.But is the practice still suited to the spiraling of social, political, and environmental crises that mark our time?Drawing on experiences in research, teaching, activism, and the creative arts, contributors explore what cultural analysis was back then, what it is now, and what it may be by 2034.In a shifting conjuncture, contributors strike notes of discomfort, defiance, and irony—as well as a renewed sense of urgency and care.
Price: 107.00 £ | Shipping*: 0.00 £ -
Critical Doubt
They met in a war-torn city on the other side of the world and shared an anonymous night of passion. They didn't intend to meet again. Nor did they think they'd be reunited by sinister secrets... Five years later, FBI Agent Savannah Kane is headed to a small town in Georgia for the funeral of her best friend's husband. Going home is fraught with complications, but Savannah never imagined one of those would be Ryker Stone, the stranger she'd shared an unforgettable night with.Haunted by an ambush that took the lives of two men in his unit, Ryker now copes by living a solitary civilian life. Attending the funeral of yet another soldier, this one lost to a senseless accident, he is shocked to run into the beautiful stranger he has never forgotten.When another man in Ryker's former unit dies under suspicious circumstances, it's clear that someone is targeting his team. He's determined to get the truth; Savannah is just as determined to get answers for her friend. Neither wants to work with the other, and as they struggle with trust and attraction, the truth grows murkier...and more dangerous. Will finding answers reveal secrets neither one of them is ready to know? Don't miss this twisting, suspenseful, romantic page-turner by #1 New York Times Bestselling Author Barbara Freethy!
Price: 15.99 £ | Shipping*: 3.99 £ -
Critical Doubt
They met in a war-torn city on the other side of the world and shared an anonymous night of passion. They didn't intend to meet again. Nor did they think they'd be reunited by sinister secrets... Five years later, FBI Agent Savannah Kane is headed to a small town in Georgia for the funeral of her best friend's husband. Going home is fraught with complications, but Savannah never imagined one of those would be Ryker Stone, the stranger she'd shared an unforgettable night with.Haunted by an ambush that took the lives of two men in his unit, Ryker now copes by living a solitary civilian life. Attending the funeral of yet another soldier, this one lost to a senseless accident, he is shocked to run into the beautiful stranger he has never forgotten.When another man in Ryker's former unit dies under suspicious circumstances, it's clear that someone is targeting his team. He's determined to get the truth; Savannah is just as determined to get answers for her friend. Neither wants to work with the other, and as they struggle with trust and attraction, the truth grows murkier...and more dangerous. Will finding answers reveal secrets neither one of them is ready to know? Don't miss this twisting, suspenseful, romantic page-turner by #1 New York Times Bestselling Author Barbara Freethy!
Price: 25.99 £ | Shipping*: 3.99 £ -
Secure Home
Price: 44 € | Shipping*: 0.00 €
-
Is the Samsung Secure Folder secure?
The Samsung Secure Folder is designed to be a secure and private space on Samsung devices, using a combination of hardware and software security measures to protect the data stored within it. It uses Samsung Knox, a defense-grade security platform, to safeguard the contents of the folder, including documents, photos, and apps, with encryption and authentication methods. While no system can be completely immune to security breaches, the Samsung Secure Folder is considered to be a secure option for users looking to protect their sensitive information on their devices.
-
Is ProtonMail secure?
Yes, ProtonMail is considered secure due to its end-to-end encryption, which means that only the sender and recipient can read the emails. Additionally, ProtonMail is based in Switzerland, known for its strong privacy laws. The service also offers features like two-factor authentication to enhance security further. Overall, ProtonMail is a popular choice for those looking for a secure email service.
-
Is email secure?
Email is not completely secure. While most email providers use encryption to protect the contents of emails while they are in transit, there are still vulnerabilities that can be exploited by hackers. Additionally, emails can be intercepted or accessed by unauthorized parties if the sender or recipient's email account is compromised. To enhance email security, it is recommended to use strong, unique passwords, enable two-factor authentication, and avoid sending sensitive information via email whenever possible.
-
Is WhatsApp secure?
WhatsApp uses end-to-end encryption to secure messages, meaning only the sender and recipient can read them. This encryption ensures that messages are protected from hackers, governments, and even WhatsApp itself. However, like any technology, there are potential vulnerabilities that could be exploited. Overall, WhatsApp is considered a secure messaging platform, but users should still be cautious about sharing sensitive information.
Similar search terms for Secure:
-
Questioning Qualitative Inquiry : Critical Essays
Is qualitative research in crisis? In Questioning Qualitative Inquiry Martyn Hammersley raises fundamental questions about the current state of qualitative social research.He examines some of the changes that have taken place within it over the past fifty years, suggesting that the move away from natural science as a model, and towards an appeal to literature and art, involves rejection of key principles that are essential to research of any kind. Hammersley argues that, in important respects, qualitative inquiry has not lived up to the claims originally made on its behalf, and that more recent developments have worsened the situation.Insufficient attention has been given to the problems surrounding leading ideas like thick description, analytic induction, and constructionism.The argument is pursued through discussion of the work of influential writers - such as Clifford, Geertz, Denzin and Lincoln - and by detailed examination of concrete issues, like the value of interview data, the rationales for discourse and conversation analysis, the role of rhetoric in research reports, and the nature of assessment criteria.At a time when qualitative inquiry is coming under renewed challenge in some quarters, the task of addressing the methodological problems it faces has become urgent. These essays on current developments and debates are essential reading for anyone interested in the future of qualitative research.
Price: 52.00 £ | Shipping*: 0.00 £ -
Cyber Security and Business Analysis : An essential guide to secure and robust systems
The imperative of cyber security has never been more pronounced and organisations must remain proactive, anticipating potential risks and evolving their strategies in response.Cyber Security and Business Analysis provides the necessary techniques, tools and framework to help business analysts include cyber security holistically in their approach, equipping them with the required knowledge to recognise risks at all levels and deliver a complete analysis.The versatile framework this book provides can be deployed adaptively, either as tailored individual components or as a whole to support the construction of secure and resilient systems. Enriched with accessible real-life experiences, security incidents and analogies, the content goes beneath the surface to provide a deeper understanding.Woven with the collective wisdom of business analysis and cyber security, this book forms a holistic guide for shaping secure, resilient and robust systems.If you want to protect your organisation from cyber threats and deliver tangible results, this book is an indispensable guide that will equip you with all you need to succeed.
Price: 29.99 £ | Shipping*: 0.00 £ -
A Secure Base
As Bowlby himself points out in his introduction to this seminal childcare book, to be a successful parent means a lot of very hard work.Giving time and attention to children means sacrificing other interests and activities, but for many people today these are unwelcome truths.Bowlby’s work showed that the early interactions between infant and caregiver have a profound impact on an infant's social, emotional, and intellectual growth.Controversial yet powerfully influential to this day, this classic collection of Bowlby’s lectures offers important guidelines for child rearing based on the crucial role of early relationships.
Price: 16.99 £ | Shipping*: 3.99 £ -
ESET Secure Authentication
Optimal protection of your data thanks to mobile-based multi-factor authentication What is multi-factor authentication? Multi-factor authentication (MFA), often referred to as two-factor authentication (2FA), is a strong authentication method that requires users to identify themselves with more than one element. By combining a static password with a dynamic second factor, the risk of data loss is greatly reduced. ESET Secure Authentication (ESA) provides a foundation for organizations to meet compliance requirements and proactively prevent data protection incidents. With ESA, organizations of any size can easily implement MFA for shared systems (Windows logins and servers, Microsoft cloud services such as Microsoft 365 or OWA, SAML, FIDO, ADFS 3.0, VPN and RADIUS-based services). The Solution: ESET Secure Authentication Powerful, easy-to-deploy multi-factor authentication for businesses of all sizes. Companies enjoy the following benefits: Prevention of data protection incidents. Fulfillment of compliance requirements Centralized control via browser Can be operated via cell phone or existing HW tokens Two-factor authentication made easy Authentication is simple: just confirm the code via your cell phone. Works on iOS and Android smartphones and for all platforms and services. Cloud support In addition to protecting local apps, ESET Secure Authentication can also be used to protect web and cloud services such as Microsoft Office 365, Google Apps, Dropbox and many others by integrating the ADFS 3.0 or SAML protocol. Various authentication methods ESET Secure Authentication supports push notifications, one-time password provisioning via the mobile client application, SMS or existing hardware tokens, as well as FIDO-based sticks and custom methods. Sample applications PROBLEM It is not uncommon for employees to use the same passwords for different applications and websites. A high security risk for organizations. SOLUTION Further secure access to corporate resources with two-factor authentication. By using multi-factor authentication, insecure or stolen passwords are no longer a problem. ESET Secure Authentication Feautures Remote Management ESET Secure Authentication uses a specially designed management console accessible through a web browser. You can choose to integrate with Active Directory, but you can also use the solution in environments without Active Directory. Once installed, no additional training or professional services are required to configure and deploy ESET Secure Authentication. Setup in just 10 minutes We designed the solution to be easy to install and deploy, even in small businesses without an internal IT department. Regardless of the size of your business, installing ESET Secure Authentication takes very little time thanks to the ability to configure multiple users at once. No additional hardware required ESET Secure Authentication does not require any additional hardware. Once the 10 MB application is installed on your server, you can start using it immediately. Compatibility with all major smartphones Your employees can continue to use the smartphones they already use. No additional hardware is required for ESET Secure Authentication. We also support hardware keys, but that's optional. Includes SDK and API We provide both an SDK and an API to customize the functionality. This allows organizations to extend ESET Secure Authentication to meet their needs and extend it to their own applications or web services. Push authentication Convenient authentication without entering a one-time password by confirming via push notification. Works on iOS and Android smartphones. With ESET Secure Authentication you protect: VPN access to your company Remote Desktop Protocol (RDP) Additional authentication for desktop logins (logging in to the operating system) Web/cloud services via Microsoft ADFS 3.0, e.g. Office 365 Online Web App (OWA) Microsoft Web Apps VMware Horizon View RADIUS-based services Exchange Control Panel & Exchange Administrator Center Supported VPNs Barracuda Cisco ASA Citrix Access Gateway Citrix NetScaler Check Point Software Cyberoam, F5 FirePass Fortinet FortiGate Juniper Palo Alto SonicWall System Requirements Server: 32-bit and 64-bit versions of Microsoft Windows Server 2003, 2003 R2, 2008, 2008 R2, 2012, 2012 R2, 2016. Client: iOS (iPhone), Android, Windows 10 Mobile. Token support: Although hardware tokens are not required, the solution supports all event-based, OATH-compliant HOTP tokens, as well as FIDO2 and FID...
Price: 28.20 £ | Shipping*: 0.00 £
-
Is iCloud secure?
iCloud is generally considered to be secure, as it uses encryption to protect user data both in transit and at rest. However, like any online service, there is always a risk of potential security breaches. Users can enhance the security of their iCloud accounts by enabling two-factor authentication and regularly updating their passwords. Overall, while iCloud has security measures in place, it is important for users to take precautions to protect their data.
-
Is Telegram secure?
Telegram is considered to be a secure messaging platform due to its use of end-to-end encryption for messages, calls, and media shared between users. It also offers features like self-destructing messages and the ability to enable two-step verification for added security. However, like any online platform, users should still exercise caution and be mindful of the information they share to ensure their privacy and security.
-
Is Veracrypt secure?
Veracrypt is considered to be a highly secure encryption software that offers strong protection for data. It uses advanced encryption algorithms such as AES, Serpent, and Twofish to secure data, making it difficult for unauthorized users to access. Veracrypt also regularly undergoes security audits and updates to address any potential vulnerabilities, further enhancing its security. Overall, Veracrypt is a reliable and secure option for encrypting sensitive information.
-
Is ProtonVPN secure?
Yes, ProtonVPN is considered secure as it uses strong encryption protocols to protect user data and privacy. It has a strict no-logs policy, meaning it does not store any user activity logs. Additionally, ProtonVPN is based in Switzerland, which has strong privacy laws and is not part of any surveillance alliances. Overall, ProtonVPN is a reliable and secure option for protecting your online activities.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.