Results 51 to 60 of about 173 (94)
Under the Mermaid Flag: Achzivland and the performance of micronationality on ancestral Palestinian land. [PDF]
Hayward, P
core +1 more source
Mine mechanisation and distributional conflict in rural South Africa [PDF]
ActionAid +75 more
core +1 more source
Mining in Ghana: Critical Reflections on the Turbulent Past and Uncertain Future
Hilson, Abigail, Hilson, Gavin
core +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Enclaves: The Enterprise as an Extranet
Information Systems Security, 2000Abstract Even in the most secure organizations, information security threats and vulnerabilities are increasing with the complexity of internal infrastructures — complex structures that have more single points of failure — and this in turn increases the risk of multiple simultaneous failures.
openaire +1 more source
2015
The immigrant enclave is a place where a significant portion of the immigrant work force works in enterprises owned by co-ethnics. The term is often substituted with ‘ethnic’ enclave. The formation of enclaves is due to the tendency of recent immigrants to concentrate spatially and to create economic spaces which are geographically and functionally ...
openaire +2 more sources
The immigrant enclave is a place where a significant portion of the immigrant work force works in enterprises owned by co-ethnics. The term is often substituted with ‘ethnic’ enclave. The formation of enclaves is due to the tendency of recent immigrants to concentrate spatially and to create economic spaces which are geographically and functionally ...
openaire +2 more sources
Proceedings 2002 IEEE Symposium on Security and Privacy, 2005
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be able to penetrate the system. Intrusion tolerance attempts to maintain acceptable service despite such intrusions.
Bruno Dutertre +2 more
openaire +1 more source
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be able to penetrate the system. Intrusion tolerance attempts to maintain acceptable service despite such intrusions.
Bruno Dutertre +2 more
openaire +1 more source
Public Culture, 1996
The forms producing segregation in city space are historically variable. From the 1940s to the 1980s, a division between center and periphery organized the space of Sao Paulo, where great distances separated different social groups: the middle and upper classes lived in central and well-equipped neighborhoods and the poor lived in the precarious ...
openaire +1 more source
The forms producing segregation in city space are historically variable. From the 1940s to the 1980s, a division between center and periphery organized the space of Sao Paulo, where great distances separated different social groups: the middle and upper classes lived in central and well-equipped neighborhoods and the poor lived in the precarious ...
openaire +1 more source

