Secure the Base: Making Africa Visible in the Globe
Book cover
Author
Ngũgĩ wa Thiong'o
Country
Nigeria
Language
English
Genre
non-fiction
Publisher
Seagull Books
Publication date
February 15, 2016
ISBN
0-857-42313-4
Secure the Base: Making Africa Visible in the Globe is a 2016 book by Kenyan author Ngũgĩ wa Thiong'o. The book addresses the issues of Africa's historical relationship with capitalism, the impact of slavery and colonialism, and the role of African intellectuals in fostering social change. He critiques the reductionist portrayal of African conflicts, advocates for the recognition of historical injustices, and calls for the use of African languages in building the continent, Africa. Secure The Base discusses global issues of economic inequality and nuclear disarmament, calling for united African leadership and a more equitable global order.[1]
^Thiong'o, Ngugi wa (2016-02-15). Secure the Base: Making Africa Visible in the Globe. London: Seagull Books. ISBN 978-0-85742-313-9.
SecuretheBase: Making Africa Visible in the Globe is a 2016 book by Kenyan author Ngũgĩ wa Thiong'o. The book addresses the issues of Africa's historical...
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer...
Secure Communication based on Quantum Cryptography (SECOQC) is a project that aims to develop quantum cryptography (see there for further details). The...
TheSecure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable...
org/2003/239 Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto: A Universally Composable Secure Channel Based on the KEM-DEM Framework. TCC 2005: 426-444...
secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual...
Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate...
two remote hosts. It is based on theSecure Shell (SSH) protocol. "SCP" commonly refers to both theSecure Copy Protocol and the program itself. According...
TheSecure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...
Secure by design, in software engineering, means that software products and capabilities have been designed to be foundationally secure. Alternate security...
they securethebase and motivate the other soldiers to prepare for a major offensive. Hafner encounters a photographer (Nick Nicholson) offering the men...
A trusted execution environment (TEE) is a secure area of a main processor. It helps code and data loaded inside it to be protected with respect to confidentiality...
network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly...
'belt' that becomes the walls of the pan and securesthebase into the groove at thebase of the walls. The most common springform pan is a round pan 9...
ShareFile is a secure content collaboration, file sharing and sync software that supports all the document-centric tasks and workflow needs of small and...
over the whole disk; it is applied to each individual sector. BitLocker originated as a part of Microsoft's Next-Generation Secure Computing Base architecture...
Secure Reliable Transport (SRT) is an open source video transport protocol that utilises the UDP transport protocol. The SRT Protocol specification is...
A secure element (SE) is a secure operating system (OS) in a tamper-resistant processor chip or secure component. It can protect assets (root of trust...
G4S Secure Solutions (USA) is an American/British-based security services company, and a subsidiary of G4S plc. It was founded as The Wackenhut Corporation...
Ace of Base is a Swedish pop group, formed in 1987, originally consisting of siblings Jonas, Linn, and Jenny Berggren, with Ulf Ekberg. They achieved worldwide...
Monyk is the head of the quantum cryptography business unit of ARC Seibersdorf research GmbH. In addition, he is the overall coordinator of Secure Communication...
Clear Secure, Inc. (operating as: CLEAR) is an American technology company that operates biometric travel document verification systems at some major airports...
A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple...