Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
For many years now, there has been a strong economic scholarship pointing to the importance of institutions in general - and, more particularly, legal rules and the rule of law - for economic development. The importance of law for economic growth has also been empirically tested in many well-known and often cited studies. These studies seem to indicate not only that law is relevant in the development of countries and their economic growth in particular, but more specifically, that particular legal systems do better than others. The tenant of this scholarship (especially initiated by Andrej Schleifer and others) is that the common law would be a more efficient system in promoting economic growth than the civil law. However, many scholars doubt the empirical claim of this and criticize these findings, both on methodological grounds as well as on grounds of a misconception of differences between the civil and the common law. The interest in legal origins for the efficiency of the legal system also focuses on particular legal regimes, such as accident law, environmental law, or corporate law. Increasingly, the question is also asked whether legal institutions and the rule of law are also important in the process whereby poor nations develop their economy. For example, Cooter, Schafer, and Ulen have attempted to examine why particular developing countries do relatively better than others and, roughly speaking, also attribute (part of the) success of some developing countries to legal institutions. However, others (more particularly Ulen) point at the fact that legal rules may play some role, but perhaps only a modest role in economic development. A powerful example which is quoted in that respect is the one of China which, at least at first blush, does not seem to rely strongly on legal institutions (at least in the traditional sense) and nevertheless has experienced a spectacular economic growth. The particular case of China hence remains somewhat puzzling in this debate. So far, these various streams of literature paying attention to the question to what extent legal origins matter for economic growth have not been strongly integrated and have, to a large extent, been developed in separate social sciences (institutional economics, development economics, and comparative law). This multi-disciplinary book brings these approaches together in an integrated and structural manner. (Series: Ius Commune Europaeum - Vol. 100)
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen
This book provides a concise introduction to quantum fields on a lattice: a precise and non-perturbative definition of quantum field theory obtained by replacing continuous space-time by a discrete set of points on a lattice. The path integral on the lattice is explained in concrete examples using weak and strong coupling expansions. Fundamental concepts such as 'triviality' of Higgs fields and confinement of quarks and gluons into hadrons are described and illustrated with the results of numerical simulations. The book also provides an introduction to chiral symmetry and chiral gauge theory, as well as quantized non-Abelian gauge fields, scaling and universality. Based on the lecture notes of a course given by the author, this book contains many explanatory examples and exercises, and is suitable as a textbook for advanced undergraduate and graduate courses. Originally published in 2002, this title has been reissued as an Open Access publication on Cambridge Core.
This comprehensive overview brings the reader up-to-date on new technologies for low-speed data, speech and broadband communications, competing standards, adjacent technologies, new generation networks and future developments. It covers all EU countries, Norway, Switzerland, the USA and Japan. The text includes up-to-date discussions on standards such as TETRA/Tetrapol, POGSAC/ERMES/FLEX and W-CDMA, several adjacent technologies such as VSAT, (d-)GSP and DAB broadcasting, and US and Japanese standards such as IS-95, CDMA, D-AMPS, FLEX/ReFlex and PDC.
This book provides a concise introduction to quantum fields on a lattice: a precise and non-perturbative definition of quantum field theory obtained by replacing continuous space-time by a discrete set of points on a lattice. The path integral on the lattice is explained in concrete examples using weak and strong coupling expansions. Fundamental concepts such as 'triviality' of Higgs fields and confinement of quarks and gluons into hadrons are described and illustrated with the results of numerical simulations. The book also provides an introduction to chiral symmetry and chiral gauge theory, as well as quantized non-Abelian gauge fields, scaling and universality. Based on the lecture notes of a course given by the author, this book contains many explanatory examples and exercises, and is suitable as a textbook for advanced undergraduate and graduate courses. Originally published in 2002, this title has been reissued as an Open Access publication on Cambridge Core.
In numerous fields of law, ranging from family law to company law, private actors increasingly set their own rules, revert to private enforcement of those rules and choose the applicable law. Within each field this tendency has already been scrutinised. Until now, however, few attempts have been made to look at these phenomena together with a view to arriving at conclusions that go beyond one specific field. This book is a first attempt to fill this gap. It is relevant for scholars and practitioners working in the individual fields of law covered (private international law, company law, family law, consumer law and commercial law) as well as for scholars and policy makers trying to grasp the overall nature of the increasing privatisation of the law.
As the European Union (EU) matures, there is an increasing debate, partly fuelled by fierce national criticism offered by Eurosceptic politicians, partly initiated by the EU institutions themselves, on the way in which the EU has developed and what the EU must look like in the future. This debate includes a discussion on one of the core aspects of European integration: at which level should the rules be set and who decides where the authority to do so should lie? Private law has an important role to play in this discussion. Many private law rules touch on the core of the internal market as they serve to foster trade or to offer protection to market participants, such as consumers.In 2011, the Maastricht European Private Law Institute (M-EPLI) was founded. M-EPLI researchers combine European Private Law scholarship in the fields of contract, property, commercial and procedural law as well as legal theory. In this book M-EPLI fellows present perspectives on the allocation of competences in European Private Law. This includes both general perspectives and criteria on the basis of which to decide who does what in European Private Law, but also specific perspectives relating to the various fields M-EPLI's researchers cover. All contributions share a common approach in which each author or team of authors addresses the same two questions: (i) What are the criteria to decide upon the ideal design of their field of law for the EU?; (ii) Who should set the rules: what is in the author(s) view the optimal mix of national and European producers of legal norms?
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP),focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government,...Themoreour societyrelies on electronicforms ofcommunication,themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines,organisationsandcountries,todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering,mobileagentsecurity,e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies,one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion,and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea drivingforce for futureconferencestocome.
|
You may like...
The Inbetweeners Movie 2
James Buckley, Emily Berrington, …
Blu-ray disc
(1)
R32 Discovery Miles 320
|