![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 25 of 26 matches in All Departments
The first history of schooling gathered as a single and continuous text since the 1980s. It is also the first attempt to put together a history of South African schooling from the perspective of the subjugated people. It attempts to show, as South Africa moves from a landscape essentially marked by encounters of people at different frontiers – physical, geographical, economic, cultural and psychological (where only the first two have previously received real attention) – how education is conceptualised, mobilised and used by all the players in the emerging country from the colonial Dutch and British periods into apartheid. This book covers the period of the history of South African schooling from the establishment of the first school in 1658 to 1910 when South Africa became a Union. It approaches the task of narrating this history as a deliberate intervention. The intervention is that of restoring into the narrative the place of the subjugated people in the unfolding of a landscape which they share with a racialised white community. Propelled by a post-colonial framing of South Africa’s history, it offers itself as a deliberate counter to dominant historiographic and systematic privileging of the country’s elites. As such, it works on a larger canvas than simply the school. It deliberately works the story of schooling alongside the bigger socioeconomic history of South Africa, i.e., Dutch settlement of the Cape, the arrival of colonial Britain and the dramatic discovery of gold and diamonds leading to the industrialisation of South Africa. The story of schooling, the text seeks to emphasise, cannot be told independently of what is going on economically, politically and socially in the making of modern South Africa. Modernity, as a consequence, is a major theme of the book. In telling the story of formal schooling in South Africa, the text, critically, seeks to retrieve the experience of the subjugated to present a wider and larger canvas upon which to describe the process of the making of the South African school. The text works historically with the Dutch East Indian experience up until 1804 when schooling was characterised by its neglect. It shows then how it develops a systematic character through the institutionalisation of a formal system in 1839 and the initiatives of missionaries. It draws the story to a close by looking at how formal systems are established in the colonies, the Boer Republics and the protectorates. Thematically, the text seeks to thread through the conceits of race and class to show how, contradictorily, they take expression through conflict and struggle. In this conflict and struggle people who are not white (i.e., they do not yet have the racialised labels that apartheid brings in the middle of the 20th century) are systematically marginalised and discriminated against. They work with their discrimination, however, in generative ways by taking opportunity when it arises and exercising political agency. The book is important because it explains the roots of educational inequality. It shows how inequality is systematically installed in almost every step of the way. For a period, in the middle of the 19th century, attempts were made to forestall this inequality. The text shows how the British administration acceded to eugenicist influences which pushed children of colour out of what were called first-class schools into segregated missionary-run institutions.
There is a dire need today to create spaces in which people can make meaning of their existence in the world, abiding by cultural frameworks and practices that acknowledge and validate a meaningful existence for all. People are not just isolated individuals but are connected in diverse ways with other persons within our natural and social environment which is part of the whole universe. The African philosophy of uBuntu or humaneness is re-emerging for its timely relevance and potential as indispensable in our quest for global citizenship, peace, and mutual understanding in securing sustainable human development in the broader ecosystem. Comparative educationists have the challenge to devise theoretical frameworks, epistemological and pedagogical constructs as well as pragmatic, useful and effective ways of promoting the virtues of compassion and recognition of our common humanity in eliminating the ills of domination and control that are guided by greed, hatred, jealousy, and intolerance. Comparative Education for Global Citizenship, Peace and Shared Living through Ubuntu paves the way for a better understanding of the critical importance of the collective search and endeavor towards achieving the virtues of nonviolence, peace, shared values of living together, global citizenship, improved quality of life for all and a better appreciation of the positive implications of interdependence.
There is a dire need today to create spaces in which people can make meaning of their existence in the world, abiding by cultural frameworks and practices that acknowledge and validate a meaningful existence for all. People are not just isolated individuals but are connected in diverse ways with other persons within our natural and social environment which is part of the whole universe. The African philosophy of uBuntu or humaneness is re-emerging for its timely relevance and potential as indispensable in our quest for global citizenship, peace, and mutual understanding in securing sustainable human development in the broader ecosystem. Comparative educationists have the challenge to devise theoretical frameworks, epistemological and pedagogical constructs as well as pragmatic, useful and effective ways of promoting the virtues of compassion and recognition of our common humanity in eliminating the ills of domination and control that are guided by greed, hatred, jealousy, and intolerance. Comparative Education for Global Citizenship, Peace and Shared Living through Ubuntu paves the way for a better understanding of the critical importance of the collective search and endeavor towards achieving the virtues of nonviolence, peace, shared values of living together, global citizenship, improved quality of life for all and a better appreciation of the positive implications of interdependence.
Social networks, particularly public ones, have become part of
the fabric of how we communicate and collaborate as a society. With
value from micro-level personal networking to macro-level outreach,
social networking has become pervasive in people s lives and is now
becoming a significant driving force in business. These new
platforms have provided new approaches to many critical enterprise
functions, including identifying, communicating, and gathering
feedback with customers (e.g., Facebook, Ning); locating expertise
(e.g., LinkedIn); providing new communication platforms (e.g.,
Twitter); and collaborating with a community, small or large (e.g.,
wikis). However, many organizations have stayed away from potential
benefits of social networks because of the significant risks
associated with them. This book will help an organization
understand the risks present in social networks and provide a
framework covering policy, training and technology to address those
concerns and mitigate the risks presented to leverage social media
in their organization. The book also acknowledges that many
organizations have already exposed themselves to more risk than
they think from social networking and offers strategies for
"dialing it back" to retake control.
This volume focuses on current demands, challenges and expectations facing African higher education institutions in general, and those in South Africa in particular. Subsequently, transformative curricula, pedagogies and epistemologies that define diverse practices of access and inclusion within the context of transformation and decolonisation are explored.
This volume focuses on current demands, challenges and expectations facing African higher education institutions in general, and those in South Africa in particular. Subsequently, transformative curricula, pedagogies and epistemologies that define diverse practices of access and inclusion within the context of transformation and decolonisation are explored.
"Google Earth Forensics" is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways. As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools. Written for investigators and forensic practitioners, "Google
Earth Forensics" is written by an investigator and trainer with
more than 13 years of experience in law enforcement who will show
you how to use this valuable tool anywhere at the crime scene, in
the lab, or in the courtroom.
Windows 2003 Server is unquestionably the dominant enterprise level
operating system in the industry, with 95% of all companies running
it. And for the last tow years, over 50% of all product upgrades
have been security related. Securing Windows Server, according to
bill gates, is the company's #1 priority.
When it comes to computer crimes, the criminals got a big head
start. But the law enforcement and IT security communities are now
working diligently to develop the knowledge, skills, and tools to
successfully investigate and prosecute Cybercrime cases. When the
first edition of "Scene of the Cybercrime" published in 2002, it
was one of the first books that educated IT security professionals
and law enforcement how to fight Cybercrime. Over the past 5 years
a great deal has changed in how computer crimes are perpetrated and
subsequently investigated. Also, the IT security and law
enforcement communities have dramatically improved their ability to
deal with Cybercrime, largely as a result of increased spending and
training. According to the 2006 Computer Security Institute's and
FBI's joint Cybercrime report: 52% of companies reported
unauthorized use of computer systems in the prior 12 months. Each
of these incidents is a Cybecrime requiring a certain level of
investigation and remediation. And in many cases, an investigation
is mandates by federal compliance regulations such as
Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data
Security Standard.
CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major update with more focus on security and wireless aspects of networking. Our new study guide has been updated accordingly with focus on network, systems, and WAN security and complete coverage of today's wireless networking standards. As always this companion covers the core Network+ material including basic design principles, management and operation of a network infrastructure, and testing tools. After reading this book not only will you be able to ace the exam but you will be able to maintain, troubleshoot, and install computer networks. New to this edition are: Intensified focus on network
securityTwo NEW practice exams to help eliminate test-day
jittersTiered chapter ending quesitons that allow gradual
learning
Transforming Universities in South Africa: Pathways to Higher Education Reform responds to the pressing need to comprehensively review the post-apartheid experience and assess where South Africa's higher education stands across the continent and globally, particularly within the country's efforts to overcome decades of socio-economic imbalances.
Transforming Universities in South Africa: Pathways to Higher Education Reform responds to the pressing need to comprehensively review the post-apartheid experience and assess where South Africa's higher education stands across the continent and globally, particularly within the country's efforts to overcome decades of socio-economic imbalances.
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.
Many exciting frontiers of science and engineering require understanding the spatiotemporal properties of sustained nonequilibrium systems such as fluids, plasmas, reacting and diffusing chemicals, crystals solidifying from a melt, heart muscle, and networks of excitable neurons in brains. This introductory textbook for graduate students in biology, chemistry, engineering, mathematics, and physics provides a systematic account of the basic science common to these diverse areas. This book provides a careful pedagogical motivation of key concepts, discusses why diverse nonequilibrium systems often show similar patterns and dynamics, and gives a balanced discussion of the role of experiments, simulation, and analytics. It contains numerous worked examples and over 150 exercises. This book will also interest scientists who want to learn about the experiments, simulations, and theory that explain how complex patterns form in sustained nonequilibrium systems.
The book begins with real world cases of botnet attacks to
underscore the need for action. Next the book will explain botnet
fundamentals using real world examples. These chapters will cover
what they are, how they operate, and the environment and technology
that makes them possible. The following chapters will analyze
botnets for opportunities to detect, track, and remove them. Then
the book will describe intelligence gathering efforts and results
obtained to date. Public domain tools like OurMon, developed by Jim
Binkley of Portland State University, will be described in detail
along with discussions of other tools and resources that are useful
in the fight against Botnets. |
You may like...
Chemistry as a Second Language…
Charity Flener Lovitt, Paul Kelter
Hardcover
R2,722
Discovery Miles 27 220
Recent Trends in Computer-aided…
Saptarshi Chatterjee, Debangshu Dey, …
Paperback
R2,570
Discovery Miles 25 700
On-Chip Interconnect with aelite…
Andreas Hansson, Kees Goossens
Hardcover
R4,125
Discovery Miles 41 250
Advances in Production Management…
Alexandre Dolgui, Alain Bernard, …
Hardcover
R4,853
Discovery Miles 48 530
Verilog and SystemVerilog Gotchas - 101…
Stuart Sutherland, Don Mills
Hardcover
R4,312
Discovery Miles 43 120
|