Search

21983 results for: ‘%s’

  • Marie Muir: Page 2

    Project Manager - Communications and Events. Experienced in Student Recruitment, Recruitment, Employability and Widening Participation.

  • Safeguarding policy statement

    View the University of Leicester's Chaplaincy teams safeguarding policy statement.

  • Foundations of Financial Analysis and Investment

    Module code: MN7561 This module will enable you to establish and critique the essential conceptual and ethical frameworks that lie at the foundations of modern financial analysis.

  • Research degrees

    Film Studies at the University of Leicester has a proud reputation for research. Find out more about our research specialities, the support available, and things to think about when formulating your application.

  • Major £1.7m funding to clean up Philippines mineral extraction

    Leicester researchers have been awarded part of a £1.7 million grant for their work in reducing the environmental impact of mineral extraction in the Philippines.

  • Leicester facility to help optimise hybrid structures for automotive sector

    The ASDEC – The Advanced Structural Dynamics Evaluation Centre –  facility has announced that it is part of a successful winning bid for £1.

  • Critical GIS

    Module code: GY7703 This module takes an intellectual and critical focus to GIS, and seeks to unpack a range of contemporary issues encountered when applying spatial technologies.

  • What to do with it all?

    History at the University of Leicester - Building and Enriching Shared Heritages project. This guide gives ideas for using your oral history recordings.

  • Twitter and government bodies

    Posted by Andrew Dunn in Social Sciences and Humanities Librarians’ Blog on June 19, 2014 CIA launch Twitter account.   Their first post was ‘we can neither confirm or deny that this is our first tweet.

  • New report finds nuclear weapons and related systems are increasingly vulnerable to cyberattack

    Report involving Dr Andrew Futter finds nuclear weapon increasingly vulnerable to cyberattack

Back to top
MENU