Search
-
Professor George Fraser
https://le.ac.uk/bepicolombo/meet-the-team/professor-george-fraser
George Fraser was born 22 July 1955 near Inverness and was a proud Highlander.
-
Hidden inscriptions hint at mystery medieval woman’s identity
https://le.ac.uk/news/2022/november/insular-manuscript-medieval-inscriptions
Drawings and the name ‘Eadburg’ found scratched into early medieval manuscript by University of Leicester PhD student.
-
Senate regulation 3: Regulations governing fees
https://le.ac.uk/policies/regulations/senate-regulations/senate-regulation-3
Downloadable version of Senate Regulation 3 (PDF, 229KB) General 3.1 These regulations apply to all students registered at the University on a taught programme of study, and to associate students registered on one or more modules.
-
Locating the choir within the church
https://le.ac.uk/richard-iii/discovery/locating-the-choir
A small area above the human remains in Trench 1 was carefully widened with a digger to give archaeologists better access to the burial. Jo Appleby and Turi King began to carefully remove the grave soil by hand. Work was slow, to avoid damage to the skeleton.
-
Glossary of Terms
https://le.ac.uk/cardiovascular-sciences/about/heart-surgery/national-cardiac-surgery-clinical-trials-programme/infection-prevention/glossary-of-terms
Glossary of terms explains unfamiliar terms used within context of page
-
Playing Prometheus: some reflections from Australia
https://staffblogs.le.ac.uk/carchipelago/2014/11/19/playing-prometheus-some-reflections-from-australia/
Blog on Australia Convict heritage sites and archives
-
Computer Science with Cyber Security BSc
https://le.ac.uk/courses/computer-science-with-cyber-security-bsc/2026
Advance your computing skills with specialist knowledge in cybersecurity attacks and defence systems, ethical hacking and data-driven AI systems – from foundational methods to secure software development.
-
Computer Science with Cyber Security BSc
https://le.ac.uk/courses/computer-science-with-cyber-security-bsc/2027
Advance your computing skills with specialist knowledge in cybersecurity attacks and defence systems, ethical hacking and data-driven AI systems – from foundational methods to secure software development.
-
Colin Hyde: Page 3
https://staffblogs.le.ac.uk/specialcollections/author/colin_hyde/page/3/
Colin Hyde manages the East Midlands Oral History Archive, based in Special Collections.
-
Library Special Collections: Academic and staff blogs from the University of Leicester: Page 5
https://staffblogs.le.ac.uk/specialcollections/page/5/
Academic and staff blogs from the University of Leicester