Redeveloping Communication for Social Change: Theory, Practice, and Power
Author: Karin G Wilkins
To reshape the field of development communication, "Redeveloping Communication for Social Change" proposes situating theory and practice within contexts of power, recognizing both the ability of dominant groups to control and the potential for marginal communities to resist. Contributors from communication and anthropology explore the global and institutional structures within which agencies construct social problems and interventions, the discourse guiding the normative climate for conceiving and implementing projects, and the practice of strategic interventions for social change. Examining early and emerging models of development, power dynamics, ethnographic approaches, gender issues, and information technologies, they speculate how a framework accounting for power might contribute toward new directions and applications in the field. Instead of mourning the demise of development communication, this volume should provoke critical debate that will help us change our approaches to meet new challenges.
Author Biography: Karin Gwinn Wilkins is assistant professor in the Department of Radio-Television-Film at the University of Texas at Austin, with joint appointments in the Center for Asian Studies, the Center for Middle Eastern Studies, and the Population Research Center.
Interesting textbook: Student Study Guide to Accompany Contemporary Management or Transnational Management
Information Security Management Handbook, Fourth Edition, Volume 2
Author: Harold F Tipton
The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization's security system an issue of prime importance. And information systems technology is advancing at a frenetic pace. Against this background, the challenges facing information security professionals are increasing rapidly.Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems.
Booknews
In response to new developments in information technologies, this second volume supplements the fourth edition with new information, covering access control issues; authentication services; network security<-->which includes ATM, frame relay, remote access, network monitoring, and TCP/IP; intrusion detection; penetration testing; secure voice communications; cryptography; security architecture and models; operations security; business continuity planning; and law and ethics. The format continues to follow the standard for Certified Information Systems Security (CISSP) professional certification examination. Contributors are all specialists in computer security systems for various corporations, and/or are associated with CISSP. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Table of Contents:
Access Control Systems and MethodologyAccess Control Issues
Access Control Administration
Telecommunications and Network Security
Network Security
Internet, Intranet, and Extranet Security
Voice Communications
Security Management Practices
Security Awareness
Policies, Standards, Procedures, and Guidelines
Risk Management
Applications and Systems Development Security
Application Security
System Security
Cryptography
Crypto Technology and Implementations
Security Architecture and Models
Microcomputer and LAN Security
Systems Architecture and Design
Operations Security
Threats
Business Continuity Planning and Disaster Recovery Planning
Business Continuity Planning
Law, Investigations, and Ethics
Investigation
No comments:
Post a Comment