Kirjahaku
Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.
1000 tulosta hakusanalla Gideon Wulff
An Historical Narrative of the Great and Terrible Fire of London, Sept. 2nd 1666
Gideon Harvey
Anson Street Press
2025
pokkari
Thoughts on a Pebble, or, A First Lesson in Geology
Gideon Algernon Mantell
Anson Street Press
2025
pokkari
Old Christianity Against Papal Novelties
Gideon Ouseley; Matthew Sorin
Hutson Street Press
2025
sidottu
Old Christianity Against Papal Novelties
Gideon Ouseley; Matthew Sorin
Hutson Street Press
2025
pokkari
The History of Connecticut, From the First Settlement of the Colony. Vol. I. Second Edition
Gideon Hiram Hollister
Hutson Street Press
2025
sidottu
The History of Connecticut, From the First Settlement of the Colony. Vol. I. Second Edition
Gideon Hiram Hollister
Hutson Street Press
2025
pokkari
The Wonders of Geology; or A Familiar Exposition of Geological Phenomena
Gideon Algernon 1790-1852 Mantell
Hutson Street Press
2025
sidottu
The Wonders of Geology; or A Familiar Exposition of Geological Phenomena
Gideon Algernon 1790-1852 Mantell
Hutson Street Press
2025
pokkari
Hegemony, Security Infrastructures and the Politics of Crime
Gideon van Riet
TAYLOR FRANCIS LTD
2023
nidottu
This book examines the politics of crime and the response to it in Potchefstroom, a small settler colonial city in South Africa. It draws on the city’s everyday practices and experiences to offer local bottom-up insights into security beyond the state.The book provides a comprehensive understanding of security beyond the state and how security workers and residents experience and perceive their own security practices, their daily interactions with other security providers which influences power dynamics between those who express fear through various platforms and those deemed potential criminals. It aids in re-conceptualising violence and security governance in South Africa with a view to analysing the processes of crime prevention and management, the changing nature of public and private spaces and how these spaces interact with state and local authorities. In a rigorous exploration of the ways to tackle the complex problem of crime, the book critiques an overreliance on security infrastructures such as social media, gated barriers, neighbourhood residents’ associations and private security companies. It also looks at how crime is treated as an individual as opposed to a societal problem. The book addresses the urgent need for collaboration across these fault lines to promote a more inclusive security in a broader fragmented social and political context.With a novel analytical approach based on the twin optics of infrastructure and post-structural hegemony, the book will be relevant to scholars and students of South African politics and critical security studies, as well as international audience interested in crime and private security.
Business executives consider what is necessary to protect the company. It comes down to people, process and technology, organized within an information security program. Everything has its place within the program, including business processes, assets and the right blend of controls to protect them.This book describes program architecture, the discipline of designing, implementing and leading information security programs.• Prove Yourself Ready Now• Team Development and Retention• Program Maturity• Influence Support and Funding• Cyber Threat Intelligence• Third Party Risk Management • Metrics and Reporting• Insider Risk Monitoring and Response• Threat Landscape and Controls Analysis• Conduct an Assessment• Crisis Communications• Control by GovernanceThis book provides practical advice in the areas of cybersecurity and operational risk management. The goal is to provide readers with practical advice they can use upon return to work.
Business executives consider what is necessary to protect the company. It comes down to people, process and technology, organized within an information security program. Everything has its place within the program, including business processes, assets and the right blend of controls to protect them.This book describes program architecture, the discipline of designing, implementing and leading information security programs.• Prove Yourself Ready Now• Team Development and Retention• Program Maturity• Influence Support and Funding• Cyber Threat Intelligence• Third Party Risk Management • Metrics and Reporting• Insider Risk Monitoring and Response• Threat Landscape and Controls Analysis• Conduct an Assessment• Crisis Communications• Control by GovernanceThis book provides practical advice in the areas of cybersecurity and operational risk management. The goal is to provide readers with practical advice they can use upon return to work.
The ethics of hospitality – the welcome of the foreigner – is implied in all moral debate in international relations ranging from questions of asylum to those of humanitarian intervention. Why then has there been so little reflection on hospitality in the study of international relations to date? Seeking to correct this striking omission, and making an important and original contribution to debates about ethics in international relations in the process, Baker outlines a theory of cosmopolitanism as hospitality which goes beyond existing cosmopolitanisms. He argues that we must understand cosmopolitanism not as the pursuit of a world in which there are no more foreigners but as the welcome of the foreigner. However, though hospitality calls for a welcome, there is always a decision on the welcome to be made. Cosmopolitanism as hospitality is therefore always as much a politics as it is an ethics.Addressing issues of central concern for those who seek to understand our obligations to strangers, this book will be of interest to students and scholars of international relations, security studies, ethics, and political and international theory.