|
Showing 1 - 3 of
3 matches in All Departments
In this timely book about the current state of research and
practice of emergency management in China, the authors take as
their basic premises that we now live in a risk society and that
our collective ability to deal with disasters and their aftermath
is more important than ever. Set within a multi-disciplinary
framework that places risk, disaster and crisis, the three phases
of emergency management, on an analytical continuum, and drawing on
empirical data obtained through surveys, observations, and
interviews, the study not only provides a thorough overview of
recent progress in our theoretical understanding of the subject but
also offers insights on how scientifically informed policies can
improve the way emergency management is done in China.
In this timely book about the current state of research and
practice of emergency management in China, the authors take as
their basic premises that we now live in a risk society and that
our collective ability to deal with disasters and their aftermath
is more important than ever. Set within a multi-disciplinary
framework that places risk, disaster and crisis, the three phases
of emergency management, on an analytical continuum, and drawing on
empirical data obtained through surveys, observations, and
interviews, the study not only provides a thorough overview of
recent progress in our theoretical understanding of the subject but
also offers insights on how scientifically informed policies can
improve the way emergency management is done in China.
|
Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings (Paperback, 1st ed. 2015)
Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
|
R3,124
Discovery Miles 31 240
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 9th International
Conference on Network and System Security, NSS 2015, held in New
York City, NY, USA, in November 2015. The 23 full papers and 18
short papers presented were carefully reviewed and selected from
110 submissions. The papers are organized in topical sections on
wireless security and privacy; smartphone security; systems
security; applications security; security management; applied
cryptography; cryptosystems; cryptographic mechanisms; security
mechanisms; mobile and cloud security; applications and network
security.
|
|