|
|
Showing 1 - 25 of
28 matches in All Departments
The first history of schooling gathered as a single and continuous text since the 1980s. It is also the first attempt to put together a history of South African schooling from the perspective of the subjugated people.
It attempts to show, as South Africa moves from a landscape essentially marked by encounters of people at different frontiers – physical, geographical, economic, cultural and psychological (where only the first two have previously received real attention) – how education is conceptualised, mobilised and used by all the players in the emerging country from the colonial Dutch and British periods into apartheid.
This book covers the period of the history of South African schooling from the establishment of the first school in 1658 to 1910 when South Africa became a Union. It approaches the task of narrating this history as a deliberate intervention. The intervention is that of restoring into the narrative the place of the subjugated people in the unfolding of a landscape which they share with a racialised white community. Propelled by a post-colonial framing of South Africa’s history, it offers itself as a deliberate counter to dominant historiographic and systematic privileging of the country’s elites. As such, it works on a larger canvas than simply the school. It deliberately works the story of schooling alongside the bigger socioeconomic history of South Africa, i.e., Dutch settlement of the Cape, the arrival of colonial Britain and the dramatic discovery of gold and diamonds leading to the industrialisation of South Africa. The story of schooling, the text seeks to emphasise, cannot be told independently of what is going on economically, politically and socially in the making of modern South Africa. Modernity, as a consequence, is a major theme of the book.
In telling the story of formal schooling in South Africa, the text, critically, seeks to retrieve the experience of the subjugated to present a wider and larger canvas upon which to describe the process of the making of the South African school. The text works historically with the Dutch East Indian experience up until 1804 when schooling was characterised by its neglect. It shows then how it develops a systematic character through the institutionalisation of a formal system in 1839 and the initiatives of missionaries. It draws the story to a close by looking at how formal systems are established in the colonies, the Boer Republics and the protectorates.
Thematically, the text seeks to thread through the conceits of race and class to show how, contradictorily, they take expression through conflict and struggle. In this conflict and struggle people who are not white (i.e., they do not yet have the racialised labels that apartheid brings in the middle of the 20th century) are systematically marginalised and discriminated against. They work with their discrimination, however, in generative ways by taking opportunity when it arises and exercising political agency.
The book is important because it explains the roots of educational inequality. It shows how inequality is systematically installed in almost every step of the way. For a period, in the middle of the 19th century, attempts were made to forestall this inequality. The text shows how the British administration acceded to eugenicist influences which pushed children of colour out of what were called first-class schools into segregated missionary-run institutions.
This book traces the emergence and development of SADTU's
professional unionism and explores its implications for teachers
and the delivery of quality education in the context of SADTU's
relationship with the state and the governing party, specifically
the union's location within the ANC-led Tripartite Alliance.It
highlights SADTU's role in the struggle for democracy, including
its crusade for recognition as a non-racial union and its
involvement in the development of post-apartheid education policy.
However, despite its centrality in the education struggles of the
past, SADTU's continued role and relevance in the development of
the education system have become the subject of intense debate in
the public domain, as it is seen as more focused on unionism and
the political battles in the Alliance than on furthering teacher
professionalism. This volume explores how and why this has come
about, and offers insights that would enable SADTU to reclaim its
role and relevance in reimagining the future of education in South
Africa in response to the socio-economic development challenges
that confront the country in the twenty-first century.
There is a dire need today to create spaces in which people can
make meaning of their existence in the world, abiding by cultural
frameworks and practices that acknowledge and validate a meaningful
existence for all. People are not just isolated individuals but are
connected in diverse ways with other persons within our natural and
social environment which is part of the whole universe. The African
philosophy of uBuntu or humaneness is re-emerging for its timely
relevance and potential as indispensable in our quest for global
citizenship, peace, and mutual understanding in securing
sustainable human development in the broader ecosystem. Comparative
educationists have the challenge to devise theoretical frameworks,
epistemological and pedagogical constructs as well as pragmatic,
useful and effective ways of promoting the virtues of compassion
and recognition of our common humanity in eliminating the ills of
domination and control that are guided by greed, hatred, jealousy,
and intolerance. Comparative Education for Global Citizenship,
Peace and Shared Living through Ubuntu paves the way for a better
understanding of the critical importance of the collective search
and endeavor towards achieving the virtues of nonviolence, peace,
shared values of living together, global citizenship, improved
quality of life for all and a better appreciation of the positive
implications of interdependence.
Social networks, particularly public ones, have become part of
the fabric of how we communicate and collaborate as a society. With
value from micro-level personal networking to macro-level outreach,
social networking has become pervasive in people s lives and is now
becoming a significant driving force in business. These new
platforms have provided new approaches to many critical enterprise
functions, including identifying, communicating, and gathering
feedback with customers (e.g., Facebook, Ning); locating expertise
(e.g., LinkedIn); providing new communication platforms (e.g.,
Twitter); and collaborating with a community, small or large (e.g.,
wikis). However, many organizations have stayed away from potential
benefits of social networks because of the significant risks
associated with them. This book will help an organization
understand the risks present in social networks and provide a
framework covering policy, training and technology to address those
concerns and mitigate the risks presented to leverage social media
in their organization. The book also acknowledges that many
organizations have already exposed themselves to more risk than
they think from social networking and offers strategies for
"dialing it back" to retake control.
Defines an organization's goals for social networkingPresents the
risks present in social networking and how to mitigate themExplains
how to maintain continuous social networking security"
This volume focuses on current demands, challenges and expectations
facing African higher education institutions in general, and those
in South Africa in particular. Subsequently, transformative
curricula, pedagogies and epistemologies that define diverse
practices of access and inclusion within the context of
transformation and decolonisation are explored.
"Google Earth Forensics" is the first book to explain how to use
Google Earth in digital forensic investigations. This book teaches
you how to leverage Google's free tool to craft compelling
location-based evidence for use in investigations and in the
courtroom. It shows how to extract location-based data that can be
used to display evidence in compelling audiovisual manners that
explain and inform the data in contextual, meaningful, and
easy-to-understand ways.
As mobile computing devices become more and more prevalent and
powerful, they are becoming more and more useful in the field of
law enforcement investigations and forensics. Of all the widely
used mobile applications, none have more potential for helping
solve crimes than those with geo-location tools.
Written for investigators and forensic practitioners, "Google
Earth Forensics" is written by an investigator and trainer with
more than 13 years of experience in law enforcement who will show
you how to use this valuable tool anywhere at the crime scene, in
the lab, or in the courtroom.
Learn how to extract location-based evidence using the Google Earth
program or app on computers and mobile devicesCovers the basics of
GPS systems, the usage of Google Earth, and helps sort through data
imported from external evidence sourcesIncludes tips on presenting
evidence in compelling, easy-to-understand formats
When it comes to computer crimes, the criminals got a big head
start. But the law enforcement and IT security communities are now
working diligently to develop the knowledge, skills, and tools to
successfully investigate and prosecute Cybercrime cases. When the
first edition of "Scene of the Cybercrime" published in 2002, it
was one of the first books that educated IT security professionals
and law enforcement how to fight Cybercrime. Over the past 5 years
a great deal has changed in how computer crimes are perpetrated and
subsequently investigated. Also, the IT security and law
enforcement communities have dramatically improved their ability to
deal with Cybercrime, largely as a result of increased spending and
training. According to the 2006 Computer Security Institute's and
FBI's joint Cybercrime report: 52% of companies reported
unauthorized use of computer systems in the prior 12 months. Each
of these incidents is a Cybecrime requiring a certain level of
investigation and remediation. And in many cases, an investigation
is mandates by federal compliance regulations such as
Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data
Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and
updated book which covers all of the technological, legal, and
regulatory changes, which have occurred since the first edition.
The book is written for dual audience; IT security professionals
and members of law enforcement. It gives the technical experts a
little peek into the law enforcement world, a highly structured
environment where the "letter of the law" is paramount and
procedures must be followed closely lest an investigation be
contaminated and all the evidence collected rendered useless. It
also provides law enforcement officers with an idea of some of the
technical aspects of how cyber crimes are committed, and how
technology can be used to track down and build a case against the
criminals who commit them. Scene of the Cybercrime, Second Editions
provides a roadmap that those on both sides of the table can use to
navigate the legal and technical landscape to understand, prevent,
detect, and successfully prosecute the criminal behavior that is as
much a threat to the online community as "traditional" crime is to
the neighborhoods in which we live. Also included is an all new
chapter on Worldwide Forensics Acts and Laws.
* Companion Web site provides custom tools and scripts, which
readers can download for conducting digital, forensic
investigations.
* Special chapters outline how Cybercrime investigations must be
reported and investigated by corporate IT staff to meet federal
mandates from Sarbanes Oxley, and the Payment Card Industry (PCI)
Data Security Standard
* Details forensic investigative techniques for the most common
operating systems (Windows, Linux and UNIX) as well as cutting edge
devices including iPods, Blackberries, and cell phones.
Transforming Universities in South Africa: Pathways to Higher
Education Reform responds to the pressing need to comprehensively
review the post-apartheid experience and assess where South
Africa's higher education stands across the continent and globally,
particularly within the country's efforts to overcome decades of
socio-economic imbalances.
The Basics of Cyber Safety: Computer and Mobile Device Safety Made
Easy presents modern tactics on how to secure computer and mobile
devices, including what behaviors are safe while surfing,
searching, and interacting with others in the virtual world. The
book's author, Professor John Sammons, who teaches information
security at Marshall University, introduces readers to the basic
concepts of protecting their computer, mobile devices, and data
during a time that is described as the most connected in history.
This timely resource provides useful information for readers who
know very little about the basic principles of keeping the devices
they are connected to-or themselves-secure while online. In
addition, the text discusses, in a non-technical way, the cost of
connectedness to your privacy, and what you can do to it, including
how to avoid all kinds of viruses, malware, cybercrime, and
identity theft. Final sections provide the latest information on
safe computing in the workplace and at school, and give parents
steps they can take to keep young kids and teens safe online.
Many exciting frontiers of science and engineering require
understanding the spatiotemporal properties of sustained
nonequilibrium systems such as fluids, plasmas, reacting and
diffusing chemicals, crystals solidifying from a melt, heart
muscle, and networks of excitable neurons in brains. This
introductory textbook for graduate students in biology, chemistry,
engineering, mathematics, and physics provides a systematic account
of the basic science common to these diverse areas. This book
provides a careful pedagogical motivation of key concepts,
discusses why diverse nonequilibrium systems often show similar
patterns and dynamics, and gives a balanced discussion of the role
of experiments, simulation, and analytics. It contains numerous
worked examples and over 150 exercises. This book will also
interest scientists who want to learn about the experiments,
simulations, and theory that explain how complex patterns form in
sustained nonequilibrium systems.
There is a dire need today to create spaces in which people can
make meaning of their existence in the world, abiding by cultural
frameworks and practices that acknowledge and validate a meaningful
existence for all. People are not just isolated individuals but are
connected in diverse ways with other persons within our natural and
social environment which is part of the whole universe. The African
philosophy of uBuntu or humaneness is re-emerging for its timely
relevance and potential as indispensable in our quest for global
citizenship, peace, and mutual understanding in securing
sustainable human development in the broader ecosystem. Comparative
educationists have the challenge to devise theoretical frameworks,
epistemological and pedagogical constructs as well as pragmatic,
useful and effective ways of promoting the virtues of compassion
and recognition of our common humanity in eliminating the ills of
domination and control that are guided by greed, hatred, jealousy,
and intolerance. Comparative Education for Global Citizenship,
Peace and Shared Living through Ubuntu paves the way for a better
understanding of the critical importance of the collective search
and endeavor towards achieving the virtues of nonviolence, peace,
shared values of living together, global citizenship, improved
quality of life for all and a better appreciation of the positive
implications of interdependence.
This volume focuses on current demands, challenges and expectations
facing African higher education institutions in general, and those
in South Africa in particular. Subsequently, transformative
curricula, pedagogies and epistemologies that define diverse
practices of access and inclusion within the context of
transformation and decolonisation are explored.
Transforming Universities in South Africa: Pathways to Higher
Education Reform responds to the pressing need to comprehensively
review the post-apartheid experience and assess where South
Africa's higher education stands across the continent and globally,
particularly within the country's efforts to overcome decades of
socio-economic imbalances.
CompTIA's Network+ certification is a globally-recognized,
vendor neutral exam that has helped over 235,000 IT professionals
reach further and higher in their careers. The 2009 Network+ exam
(N10-004) is a major update with more focus on security and
wireless aspects of networking. Our new study guide has been
updated accordingly with focus on network, systems, and WAN
security and complete coverage of today's wireless networking
standards. As always this companion covers the core Network+
material including basic design principles, management and
operation of a network infrastructure, and testing tools. After
reading this book not only will you be able to ace the exam but you
will be able to maintain, troubleshoot, and install computer
networks.
New to this edition are: Intensified focus on network
securityTwo NEW practice exams to help eliminate test-day
jittersTiered chapter ending quesitons that allow gradual
learning
New to this edition in accordance with the newly revised exam is an
intensified focus on network securityTwo NEW practice exams to help
eliminate test-day jittersTiered chapter ending questions that
allow for graduated learningCovers everything from test taking
techniques to advanced topics - keeping the beginner and
intermediate IT professional in mindLayout of the guide parallels
the Network+ N10-004 objectives for ease of study
The book begins with real world cases of botnet attacks to
underscore the need for action. Next the book will explain botnet
fundamentals using real world examples. These chapters will cover
what they are, how they operate, and the environment and technology
that makes them possible. The following chapters will analyze
botnets for opportunities to detect, track, and remove them. Then
the book will describe intelligence gathering efforts and results
obtained to date. Public domain tools like OurMon, developed by Jim
Binkley of Portland State University, will be described in detail
along with discussions of other tools and resources that are useful
in the fight against Botnets.
* This is the first book to explain the newest internet threat -
Botnets, zombie armies, bot herders, what is being done, and what
you can do to protect your enterprise
* Botnets are the most complicated and difficult threat the hacker
world has unleashed - read how to protect yourself
|
You may like...
Ab Wheel
R209
R149
Discovery Miles 1 490
|