Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
Access
  • 1
    Online Resource
    Online Resource
    New York : Oxford University press
    UID:
    gbv_1800566352
    Format: 1 Online-Ressource (XI, 406 Seiten) , Karten
    ISBN: 9780197641804
    Content: "How do societies respond to great demographic change? This question lingers over the contemporary politics of the United States and other countries where persistent immigration has altered populations and may soon produce a majority minority milestone, where the original ethnic or religious majority loses its numerical advantage to one or more foreign-origin minority groups. Until now, most of our knowledge about largescale responses to demographic change has been based on studies of individual people's reactions, which tend to be instinctively defensive and intolerant. We know little about why and how these habits are sometimes tempered to promote more successful coexistence. To anticipate and inform future responses to demographic change, Justin Gest looks to the past. In Majority Minority, Gest wields historical analysis and interview-based fieldwork inside six of the world's few societies that have already experienced a majority minority transition to understand what factors produce different social outcomes. Gest concludes that, rather than yield to people's prejudices, states hold great power to shape public responses and perceptions of demographic change through political institutions and the rhetoric of leaders. Through subsequent survey research, Gest also identifies novel ways that leaders can leverage nationalist sentiment to reduce the appeal of nativism--by framing immigration and demographic change in terms of the national interest. Grounded in rich narratives and surprising survey findings, Majority Minority reveals that this contentious milestone and its accompanying identity politics are ultimately subject to unifying or divisive governance."--Amazon.com
    Note: Description based on publisher supplied metadata and other sources
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_BV048296846
    Format: 1 Online-Ressource (ix, 254 Seiten) : , Illustrationen, Diagramme.
    ISBN: 978-1-80056-364-3
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-80056-635-4
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    edocfu_9961373491402883
    Format: 1 online resource (272 pages)
    ISBN: 1-80056-364-7
    Content: Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey FeaturesConvert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order to operationalize your organization's information security strategyLearn how to achieve security goals in your organization and reduce software riskBook DescriptionInformation security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats. The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security. By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.What you will learnUnderstand and operationalize risk management concepts and important security operations activitiesDiscover how to identify, classify, and maintain information and assetsAssess and mitigate vulnerabilities in information systemsDetermine how security control testing will be undertakenIncorporate security into the SDLC (software development life cycle)Improve the security of developed software and mitigate the risks of using unsafe softwareWho this book is forIf you are looking to begin your career in an information security role, then this book is for you. Anyone who is studying to achieve industry-standard certification such as the CISSP or CISM, but looking for a way to convert concepts (and the seemingly endless number of acronyms) from theory into practice and start making a difference in your day-to-day work will find this book useful.
    Note: Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices
    Additional Edition: ISBN 1-80056-635-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 1000566382?
Did you mean 1000566358?
Did you mean 1800561350?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages