Since the end of the Cold War almost all European countries have reformed their armed forces, focusing on downsizing, internationalization and professionalization. This paper examines how these changes in security sector governance have affected the normative model underlying the militaryâ s relationship to democracy, using the image of the â democratic soldierâ . Drawing on a comparative an…
This book constitutes the refereed proceedings of the 5th International Symposium on Unifying Theories of Programming, UTP 2014, held in Singapore, Singapore, in May 13, 2014, co-located with the 19th International Symposium on Formal Methods, FM 2014. The 7 revised full papers presented together with one invited talk were carefully reviewed and selected from 11 submissions. They deal with nume…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
The use of private security companies (PSCs) to perform services that are traditionally associated with the state presents a challenge to regulatory and oversight frameworks. Analyzing developments leading to the International Code of Conduct for Security Providers (ICOC) and the ICOC Association, this paper argues that a multistakeholder approach to develop standards adapted for the private se…
Seven Ethiopian heritage sites were among the first sites on the UNESCO World Heritage List – a stunning number for an African country at the time and the product of extended international technical assistance and tourism planning. This book unpacks the beginnings of World Heritage in development thinking and the significance of national heritage for developing countries in a global context d…
Menargetkan pemilik bisnis yang sadar akan biaya dan ingin mulai menggunakan perangkat lunak bebas sumber terbuka. Hal ini sangat relevan karena Windows XP sudah tidak didukung lagi. Penulis telah menulis satu judul yang sukses untuk Apress, jadi sudah terbiasa dengan prosesnya.> Pertama kali saya mendengar tentang perangkat lunak bebas dan sumber terbuka kembali ke awal tahun 2000-an, ketika s…
This open access book brings science and practice together and inspires a global movement towards co-creating regenerative civilizations that work for 100% of humanity and the Earth as a whole. With its conceptual foundation of the concept of transformation literacy it enhances the knowledge and capacity of decision-makers, change agents and institutional actors to steward transformations effec…
The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMC…
Over the last twenty years, advanced communication technologies have become pervasive throughout Western society. These technologies have not only revolutionised the delivery of public and private services, they have shaped consumers’ expectations about service quality. This guide (written for managers who have an interest in expanding their approach to public engagement, rather than IT profe…
This book examines the roles, responsibilities and accountabilities of Australian cabinet ministers. It examines the sorts of jobs ministers do, what is expected of them, what they expect of the job and how they (are supposed to) work together as a team. It considers aspects of how they are chosen to become ministers; how they are scrutinised by parliament and the media; and how ministers thems…