Products related to Breach:
-
Breach
Price: 6.99 £ | Shipping*: 3.99 £ -
Breach
In the refugee camp known as The Jungle an illusion is being disrupted: that of a neatly ordered world, with those deserving safety and comfort separated from those who need to be kept out. --------- Calais is a border town. Between France and Britain. Between us and them. The eight short stories in this collection explore the refugee crisis through fiction.They give voice to the hopes and fears of both sides.Dlo and Jan break into refrigerated trucks bound for the UK.Marjorie, a volunteer, is happy to mingle in the camps until her niece goes a step too far.Mariam lies to her mother back home. With humour, insight and empathy breach tackles an issue that we can no longer ignore. ----------breach is the first title in the Peirene Now! series. This exciting new series will be made up of commissioned works of new fiction, which engage with the political issues of the day.In breach, the authors beautifully capture a multiplicity of voices - refugees, volunteers, angry citizens - whilst deftly charting a clear narrative path through it all. Each story is different in tone, and yet they complement one another perfectly.Taken as a whole, this stands as an empathetic and probing collage, where the words 'home', 'displacement' and 'integration' come to mean many things as the collection progresses to a moving finale. Why Peirene chose to commission breach-----------'I have commissioned Olumide Popoola and Annie Holmes to go to the Calais refugee camps to distil stories into a work of fiction about escape, hope and aspiration.On another level, however, this work will also take seriously the fears of people in this country who want to close their borders.It's that dialogue that isn't happening in real life.A work of art can help to bridge the gap.' Meike Ziervogel, publisher
Price: 12.00 £ | Shipping*: 3.99 £ -
The Breach
They won't even know we won this game. Only you and I will know that we Topped Their Love. Love has no limits for the Diggs siblings: there's nothing that seventeen-year-old Jude won't do to keep her younger brother Acton safe.Growing up in the turbulence of 1970s America, Jude works nights and weekends to pay the bills, just so that they can stay together with their mother.But when Acton's troublesome pals form a club in their basement, a foolish game threatens to upend Jude's plans and derail their lives forever.Jude will do anything to protect her brother, but someone may have to pay the price.As trust and loyalty are put on the line, hindsight proves devastating in Naomi Wallace's riveting drama.The Breach opened at Hampstead Theatre, London, in May 2022.
Price: 9.99 £ | Shipping*: 3.99 £ -
The Breach
From Philip K. Dick Award-nominated author M.T. Hill, The Breach is a unique science fiction mystery set in the dangerous underground world of the urban exploration scene.Freya Medlock, a reporter at her local paper, is down on her luck and chasing a break.When she's assigned to cover the death of a young climber named Stephen, she might just have the story she needs.Digging into Stephen's life, Freya uncovers a strange photo uploaded to an urban exploration forum not long before he died.It seems to show a weird nest, yet the caption below suggests there's more to it. Freya believes this nest - discovering what it really is and where it's hidden - could be the key to understanding the mysteries surrounding Stephen's death. Soon she meets Shep, a trainee steeplejack with his own secret life.When Shep's not working up chimneys, he's also into urban exploration - undertaking dangerous 'missions' into abandoned and restricted sites.As Shep draws Freya deeper into the urbex scene, the circumstances of Stephen's death become increasingly unsettling - and Freya finds herself risking more and more to get the answers she wants. But neither Freya nor Shep realise that some dark corners are better left unlit.
Price: 7.99 £ | Shipping*: 3.99 £
-
What is a data breach?
A data breach is a security incident in which sensitive, confidential, or protected information is accessed, disclosed, or stolen without authorization. This can happen through various means such as hacking, malware, phishing, or physical theft of devices. Data breaches can have serious consequences for individuals and organizations, including financial loss, reputational damage, and legal implications. It is important for organizations to have robust security measures in place to prevent and respond to data breaches effectively.
-
Was the data breach hacked?
The term "hacked" typically refers to unauthorized access to a system or network. Without specific information about the data breach in question, it is difficult to definitively say whether it was hacked. Data breaches can occur through a variety of means, including hacking, insider threats, or accidental exposure. It would be necessary to investigate the specific circumstances of the data breach to determine whether it was the result of hacking.
-
What is a data protection breach?
A data protection breach is when there is unauthorized access, disclosure, or loss of personal or sensitive information. This can happen due to hacking, theft, or accidental exposure of data. Data protection breaches can have serious consequences, such as identity theft, financial loss, or damage to an individual's reputation. Organizations have a legal responsibility to protect the personal data they hold and must take steps to prevent breaches from occurring.
-
What is a breach of confidentiality?
A breach of confidentiality occurs when sensitive or private information is disclosed to unauthorized individuals or entities without the consent of the person or organization to whom the information belongs. This breach can happen intentionally or accidentally, but in either case, it violates the trust and privacy of the individual or organization whose information has been compromised. Breaches of confidentiality can have serious consequences, including legal ramifications, damage to reputation, and loss of trust from clients or customers. It is essential for individuals and organizations to take appropriate measures to safeguard confidential information and prevent breaches from occurring.
Similar search terms for Breach:
-
BEYOND THE BREACH
Life sucks for Vanessa. Her mother just died and her boyfriend is cheating on her (with her own sister!).To clear her mind, Vanessa is taking the California road-trip that she’s been dreaming about for years. Her postcard-perfect drive through old growth forests quickly turns when THE BREACH hits.A bizarre anomaly in the sky plunges California into a nightmare-world populated with strange, extra-dimensional creatures.Now Vanessa, along with Dougie, an orphaned child, and Kai, a strange, fuzzball of a beast, must fight to survive if they ever hope to make it back home.If there's even a home to return to. Written by Ed Brisson (Uncanny X-Men, Ghost Rider, Old Man Logan) and illustrated by Damian Couceiro (Old Man Logan, Iron Fist, X-Force), BEYOND THE BREACH is a fantastical sci-fi road trip adventure about perseverance and finding family in unexpected places.
Price: 14.99 £ | Shipping*: 3.99 £ -
Portfolio Management : Delivering on Strategy
Portfolio management is becoming the ‘must have’ for organizations to prosper and survive in this decade and beyond.No longer can the organizational focus be one of following best and repeatable practices as resource limitations mean only those programs, projects, and operational work that add business value can and should be pursued.Executives are focusing on strategic ability and managing complexity, which can only be done through a disciplined portfolio process in ensuring the best mix of programs, projects, and operational work is under way.In turn, the portfolio is constantly in flux as difficult decisions are made if a project, for example, is no longer contributing to business value and providing benefits and should be terminated to reallocate resources to one of higher priority.Commitment to this difficult approach is necessary at all levels, and communication is required so everyone knows how their work contributes to the organization’s strategic goals and objectives. Portfolio Management: Delivering on Strategy, Second Edition focuses on the benefits of portfolio management to the organization.Its goal is to provide senior executives a view on how portfolio management can deliver organizational strategy.The emphasis is on the specific aspects within the portfolio management discipline and how each aspect should be managed from a business perspective and not necessarily from a portfolio management perspective.Highlights of the book include:Agile portfolio management Delivering organizational value Portfolio management and uncertainty Portfolio governance Marketing a portfolio Portfolio management success Starting with a review of the project portfolio concept and its development, this book is a reference for executives and practitioners in the field, as well as a students and researchers studying portfolio management.
Price: 44.99 £ | Shipping*: 0.00 £ -
Applied Fundamentals in Finance : Portfolio Management and Investments
This textbook provides a comprehensive introduction to portfolio management and investments.Focusing on four core areas – portfolio management, equities, bonds, and derivatives – it is primarily intended for undergraduate and graduate students alike.However, it will also benefit practitioners working in the fields of financial analysis and portfolio management and professionals who aspire to such professional activities in the financial industry.To ensure its high practical relevance, the book includes a host of case studies and examples from real-world practice, mainly from the German and Swiss financial markets.Additionally, the book shows how to implement the models in Microsoft Excel.
Price: 79.99 £ | Shipping*: 0.00 £ -
Portfolio Selection : Efficient Diversification of Investments
This is a classic book, representing the first major breakthrough in the field of modern financial theory.In effect, it created the mathematics of portfolio selection in a model which has turned out to be the indispensable building block from which the theory of the demand for risky securities is constructed.
Price: 65.00 £ | Shipping*: 0.00 £
-
What does breach of convention mean?
Breach of convention refers to the violation or breaking of established norms, rules, or agreements within a particular context or society. This can include disregarding traditional customs, failing to adhere to agreed-upon standards, or acting in a way that goes against commonly accepted practices. Breaching conventions can lead to social or legal consequences, as it disrupts the expected behavior and can cause harm or conflict within a community.
-
What does breach of loyalty mean?
Breach of loyalty refers to the violation of the duty of faithfulness and allegiance that one owes to another party, such as an employer, client, or business partner. This can occur when an individual acts in a way that is disloyal, unfaithful, or deceitful towards the party to whom they owe loyalty. Examples of breach of loyalty can include disclosing confidential information, competing against one's employer, or acting in a way that undermines the best interests of the party to whom loyalty is owed. Breach of loyalty can have legal and ethical implications, and can result in consequences such as termination of employment, legal action, or damage to one's reputation.
-
What is a breach of civilization?
A breach of civilization occurs when the fundamental values and norms that uphold a society are violated or undermined. This can manifest in various forms, such as widespread corruption, erosion of human rights, or breakdown of social order. It represents a departure from the principles of justice, equality, and respect for human dignity that are essential for a functioning and harmonious society. Ultimately, a breach of civilization threatens the stability and well-being of a community, and requires concerted efforts to address and rectify.
-
What is the data breach 2?
Data breach 2 refers to the second instance of unauthorized access to sensitive or confidential information, resulting in the potential compromise of personal or corporate data. This breach could involve the theft or exposure of personal information, financial data, or other sensitive records. Data breach 2 may have occurred through a variety of means, such as hacking, phishing, or insider threats, and it could have significant implications for the affected individuals or organizations. It is important for affected parties to take immediate action to mitigate the impact of the breach and prevent further unauthorized access to their data.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.