This open access two-volume set LNCS 13371 and 13372 constitutes the refereed proceedings of the 34rd International Conference on Computer Aided Verification, CAV 2022, which was held in Haifa, Israel, in August 2022. The 40 full papers presented together with 9 tool papers and 2 case studies were carefully reviewed and selected from 209 submissions. The papers were organized in the following t…
This book tells the story of how modern environmentalism emerged in postwar Sweden. It shows that the ‘environmental turn’ in Sweden occurred as early as the autumn of 1967 and that natural scientists led the way. The most influential was the chemist Hans Palmstierna, who was both an active Social Democrat and a regular contributor to the nation’s leading morning paper. Thus, he had a uni…
software development; process management; collaboration; software-driven innovation
Although the financial sustainability of United Nations (UN) support to institutional capacity building in post-conflict contexts may be the least analysed topic on the peacebuilding agenda, understanding the costs of rebuilding and maintaining the security sector should be one of the most important priorities for security sector reform (SSR) practitioners today. Through innovative partnerships…
This book offers a new perspective on the making of Afro-Brazilian, African-American and African studies through the interrelated trajectory of E. Franklin Frazier, Lorenzo Dow Turner, Frances and Melville Herskovits in Brazil. The book compares the style, network and agenda of these different and yet somehow converging scholars, and relates them to the Brazilian intellectual context, especiall…
Since the end of the Cold War almost all European countries have reformed their armed forces, focusing on downsizing, internationalization and professionalization. This paper examines how these changes in security sector governance have affected the normative model underlying the militaryâ s relationship to democracy, using the image of the â democratic soldierâ . Drawing on a comparative an…
This book constitutes the refereed proceedings of the 5th International Symposium on Unifying Theories of Programming, UTP 2014, held in Singapore, Singapore, in May 13, 2014, co-located with the 19th International Symposium on Formal Methods, FM 2014. The 7 revised full papers presented together with one invited talk were carefully reviewed and selected from 11 submissions. They deal with nume…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
The use of private security companies (PSCs) to perform services that are traditionally associated with the state presents a challenge to regulatory and oversight frameworks. Analyzing developments leading to the International Code of Conduct for Security Providers (ICOC) and the ICOC Association, this paper argues that a multistakeholder approach to develop standards adapted for the private se…
Seven Ethiopian heritage sites were among the first sites on the UNESCO World Heritage List – a stunning number for an African country at the time and the product of extended international technical assistance and tourism planning. This book unpacks the beginnings of World Heritage in development thinking and the significance of national heritage for developing countries in a global context d…