Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
This book traces the development of U.S-led global nuclear non-proliferation diplomacy during the three decades since the Eisenhower’s “Atoms for Peace” in 1953. The U.S. non-proliferation efforts had diverse obstacles. It had to prevent nuclear states’ export of nuclear technology while dissuading non-nuclear states from developing nuclear weapons. In addition, building non-proliferation regime was not always its top foreign policy priority. To understand the complex process of non-proliferation, the book examines the relations among three different actors in the nuclear field: a global non-proliferation regime builder (U.S.), a potential nuclear proliferator (France) and a would-be nuclear state (Republic of Korea). In tracing how they developed nuclear strategies, conflicting and compromising with one another, the book pays special attention to how the transforming Cold War structure in the 1970s not only affected foreign policies of the involved countries but also complicated their relationship. The exploration ultimately highlights the multidimensional nature of international discussion on nuclear non-proliferation as the ROK’s nuclear development attempts, U.S. non-proliferation efforts, and the U.S.-France nuclear technology cooperation in the 1970s were all deeply connected.
This study primarily explores whether conflicts between patents and human rights in the context of access to medicines are inevitable, or whether patents can be made to serve human rights. The author argues that it is necessary to have a deepened understanding of each of the two sets of norms that govern this issue, that is, patent law and international human rights law. The chapters investigate the relevant dimensions of patent law and analyse particular human rights bearing upon the issue of intellectual property and access to medicines.
Dr. Dre. Snoop Dogg. Ice Cube. Some of the biggest stars in hip hop made their careers in Los Angeles. And today there is a new generation of young, mostly black, men busting out rhymes and hoping to one day find themselves "blowin' up"--getting signed to a record label and becoming famous. Many of these aspiring rappers get their start in Leimart Park, home to the legendary hip hop open-mic workshop Project Blowed. In Blowin' Up, Jooyoung Lee takes us deep inside Project Blowed and the surrounding music industry, offering an unparalleled look at hip hop in the making. While most books on rap are written from the perspective of listeners and the market, Blowin' Up looks specifically at the creative side of rappers. As Lee shows, learning how to rap involves a great deal of discipline, and it takes practice to acquire the necessary skills to put on a good show. Along with Lee--who is himself a pop-locker--we watch as the rappers at Project Blowed learn the basics, from how to hold a microphone to how to control their breath amid all those words. And we meet rappers like E. Crimsin, Nocando, VerBS, and Flawliss as they freestyle and battle with each other. For the men at Project Blowed, hip hop offers a creative alternative to the gang lifestyle, substituting verbal competition for physical violence, and provides an outlet for setting goals and working toward them. Engagingly descriptive and chock-full of entertaining personalities and real-life vignettes, Blowin' Up not only delivers a behind-the-scenes view of the underground world of hip hop, but also makes a strong case for supporting the creative aspirations of young, urban, black men, who are often growing up in the shadow of gang violence and dead-end jobs.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.
|
You may like...
Demanding Sustainability - Pillars to…
John Morrissey, C. Patrick Heidkamp
Hardcover
R1,235
Discovery Miles 12 350
The Unresolved National Question - Left…
Edward Webster, Karin Pampallis
Paperback
(2)
|