You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The ebook edition of this title is Open Access and freely available to read online. The most comprehensive book about practitioners working in research management and administration, with insights from around the globe and across disciplines to provide a comprehensive account of RMAs as a profession.
Rev. ed. of: Project management for business, engineering, and technology: principles and practice. 3rd ed. c2008.
I3E 2001 is the first in a series of conferences on e-commerce, e-business, and- government organised by the three IFIP committees TC6, TC8, and TC11. It provides a forum, where users, engineers, and scientists from academia, industry, and government can present their latest findings in e-commerce, e-business, and- government applications and the underlying technology to support those applications. The conference comprises a main track and mini tracks dedicated to special topics. The papers presented in the main track were rigorously refereed and selected by the International Programme Committee of the conference. Thematically they were grouped in the following sessions: – Sessions on secu...
International relations are what a government does when nobody s looking. While this may well once have been true, the conduct of international relations in South Africa and elsewhere has come under increasing scrutiny by the public. This is partially the result of specialist expertise around the formal study of international relations and the making of foreign policy, enhanced by the development of International Relations as a separate academic field. Like the growth of institutes of international affairs (or the Council on Foreign Relations, in the case of America), the study of international relations commenced at the end of the First World War (1914 18) with the establishment at the Univ...
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
Complexity theory is a great, untapped resource in the field of management. Experts agree that it can be a powerful tool for managing complex and virtual programs, but there is little material available to guide program managers on how to use complexity theory to communicate and lead effectively. Filling this void, Successful Program Management: Complexity Theory, Communication, and Leadership identifies the best leadership types for complex program environments. It goes beyond what is currently available in program management standards to outline powerful solutions to the macro and micro program issues facing program managers. Using language that is easy to understand, the book describes pr...
This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments". The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019. The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
This book comparatively examines the China–South Africa trade relationship over three decades through the prism of four other relationships South Africa has with states that have been China’s most contentious neighbours in the Indo-Pacific (India, Japan, Taiwan and the USA). Asia is widely expected to be the new economic centre of gravity in international relations, particularly for trade. Yet despite the story of growth for both it and its neighbours, China ranks above all these countries in terms of trade partnership with South Africa and a majority of states across the globe. This poses a puzzle answerable only through in-depth analysis. In this way, this pathbreaking new book uses quantitative data to test commonly held assumptions about the ‘new scramble for Africa’ and shines a light on the driving forces, interests and sources of agency in South Africa’s trade and foreign policies over the past three decades. The findings allow for the deduction of general patterns applicable to South Africa and peer economies, some of whom are benchmarked throughout the book for comparative insights.