Search

3990 results for: ‘offices ssc’

  • Catalogues, Websites & Digital Tables

    Posted by Colin Hyde in Library Special Collections on September 18, 2019 Nidhi presenting in front of the large screen   In the summer of 2019 the Unlocking Our Sound Heritage (UOSH) project has hosted two Museums Studies work placement students, Feifei Qin and Nidhi...

  • Arthur Edward Davis (1882-1916)

    Arthur Edward Davis was educated at Mill Hill School, London. He became a cricketer of distinction and played for Leicestershire. In the great War he joined as a Private the 11th Royal Fusiliers and served in France, where he was killed in 1916.

  • Acting the Academic

    Posted by Angus Cameron in School of Business Blog on May 12, 2015 Deputy Head of School, Angus Cameron , reflects upon one of the stranger tasks he has been asked to perform: being a central character in a murder mystery novel.

  • Research as Activism: Researching LGB+ Online Hate

    Posted by ca270 in Soundings: criminology and sociology at the University of Leicester on September 28, 2023 Rachel Keighley – Research Associate and Vice-Chair of the British Society of Criminology Hate Crime Network To understand why activist research is so important, I...

  • Andrew Dunn: Page 191

    Academic Librarian.

  • Andrew Dunn: Page 201

    Academic Librarian.

  • Social Sciences and Humanities Librarians’ Blog: Academic and staff blogs from the University of Lei

    Academic and staff blogs from the University of Leicester

  • Social Sciences and Humanities Librarians’ Blog: Academic and staff blogs from the University of Lei

    Academic and staff blogs from the University of Leicester

  • Research to examine how children use social media to promote mental wellbeing and seek health advice

    A new project led by Dr Michelle O'Reilly from the Department of Sociology aims to explore the role social media plays in promoting mental health and wellbeing in children.

  • Computer Science with Cyber Security BSc

    Advance your computing skills with specialist knowledge in cybersecurity attacks and defence systems, ethical hacking and data-driven AI systems – from foundational methods to secure software development.

Back to top
MENU