software development; process management; collaboration; software-driven innovation
Although the financial sustainability of United Nations (UN) support to institutional capacity building in post-conflict contexts may be the least analysed topic on the peacebuilding agenda, understanding the costs of rebuilding and maintaining the security sector should be one of the most important priorities for security sector reform (SSR) practitioners today. Through innovative partnerships…
This book offers a new perspective on the making of Afro-Brazilian, African-American and African studies through the interrelated trajectory of E. Franklin Frazier, Lorenzo Dow Turner, Frances and Melville Herskovits in Brazil. The book compares the style, network and agenda of these different and yet somehow converging scholars, and relates them to the Brazilian intellectual context, especiall…
Since the end of the Cold War almost all European countries have reformed their armed forces, focusing on downsizing, internationalization and professionalization. This paper examines how these changes in security sector governance have affected the normative model underlying the militaryâ s relationship to democracy, using the image of the â democratic soldierâ . Drawing on a comparative an…
This book constitutes the refereed proceedings of the 5th International Symposium on Unifying Theories of Programming, UTP 2014, held in Singapore, Singapore, in May 13, 2014, co-located with the 19th International Symposium on Formal Methods, FM 2014. The 7 revised full papers presented together with one invited talk were carefully reviewed and selected from 11 submissions. They deal with nume…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
The use of private security companies (PSCs) to perform services that are traditionally associated with the state presents a challenge to regulatory and oversight frameworks. Analyzing developments leading to the International Code of Conduct for Security Providers (ICOC) and the ICOC Association, this paper argues that a multistakeholder approach to develop standards adapted for the private se…
Seven Ethiopian heritage sites were among the first sites on the UNESCO World Heritage List – a stunning number for an African country at the time and the product of extended international technical assistance and tourism planning. This book unpacks the beginnings of World Heritage in development thinking and the significance of national heritage for developing countries in a global context d…
Menargetkan pemilik bisnis yang sadar akan biaya dan ingin mulai menggunakan perangkat lunak bebas sumber terbuka. Hal ini sangat relevan karena Windows XP sudah tidak didukung lagi. Penulis telah menulis satu judul yang sukses untuk Apress, jadi sudah terbiasa dengan prosesnya.> Pertama kali saya mendengar tentang perangkat lunak bebas dan sumber terbuka kembali ke awal tahun 2000-an, ketika s…
This open access book brings science and practice together and inspires a global movement towards co-creating regenerative civilizations that work for 100% of humanity and the Earth as a whole. With its conceptual foundation of the concept of transformation literacy it enhances the knowledge and capacity of decision-makers, change agents and institutional actors to steward transformations effec…