Search
-
UKRI open access policies
https://le.ac.uk/library/research-support/open-research/funder-open-access-policies/ukri
Open access policies for UKRI funded researchers.
-
Festival gives innovators the chance to link up with University of Leicester experts
https://le.ac.uk/news/2025/march/leicestershire-innovation-festival-university-leicester
Innovators, businesses and non-profits have the opportunity to connect with experts from the University of Leicester at the Leicestershire Innovation Festival (LIF).
-
River Dynamics
https://le.ac.uk/modules/2025/gy3438
Module code: GY3438 This module considers how rivers ‘work’ and evolve over timescales of 10s -100s of years.
-
River Dynamics
https://le.ac.uk/modules/2026/gy3438
Module code: GY3438 This module considers how rivers ‘work’ and evolve over timescales of 10s -100s of years.
-
River Dynamics
https://le.ac.uk/modules/2024/gy3438
Module code: GY3438 This module considers how rivers ‘work’ and evolve over timescales of 10s -100s of years.
-
Andrew Dunn: Page 183
https://staffblogs.le.ac.uk/socscilibrarians/author/andrew_dunn/page/183/
Academic Librarian.
-
Social Sciences and Humanities Librarians’ Blog: Academic and staff blogs from the University of Lei
https://staffblogs.le.ac.uk/socscilibrarians/page/184/
Academic and staff blogs from the University of Leicester
-
November Book Group: The Loved One
https://staffblogs.le.ac.uk/waughandwords/2014/11/10/menatarms/
Deatils of the November Waugh Book Group meeting, 2014
-
Intelligence and Security MA, by distance learning
https://le.ac.uk/courses/intelligence-and-security-ma-dl/2025
From battling international terrorism to solving local crime, using intelligence has become crucial to security. But using it means understanding it – the debates and ethical concerns, how it’s collected and analysed.
-
Intelligence and Security MA, by distance learning
https://le.ac.uk/courses/intelligence-and-security-ma-dl/2026
From battling international terrorism to solving local crime, using intelligence has become crucial to security. But using it means understanding it – the debates and ethical concerns, how it’s collected and analysed.