Global Information Lookup Global Information

Secure the Base information


Secure the Base: Making Africa Visible in the Globe
AuthorNgũgĩ wa Thiong'o
CountryNigeria
LanguageEnglish
Genrenon-fiction
PublisherSeagull Books
Publication date
February 15, 2016
ISBN0-857-42313-4

Secure the Base: Making Africa Visible in the Globe is a 2016 book by Kenyan author Ngũgĩ wa Thiong'o. The book addresses the issues of Africa's historical relationship with capitalism, the impact of slavery and colonialism, and the role of African intellectuals in fostering social change. He critiques the reductionist portrayal of African conflicts, advocates for the recognition of historical injustices, and calls for the use of African languages in building the continent, Africa. Secure The Base discusses global issues of economic inequality and nuclear disarmament, calling for united African leadership and a more equitable global order.[1]

  1. ^ Thiong'o, Ngugi wa (2016-02-15). Secure the Base: Making Africa Visible in the Globe. London: Seagull Books. ISBN 978-0-85742-313-9.

and 23 Related for: Secure the Base information

Request time (Page generated in 3.4269 seconds.)

Secure the Base

Last Update:

Secure the Base: Making Africa Visible in the Globe is a 2016 book by Kenyan author Ngũgĩ wa Thiong'o. The book addresses the issues of Africa's historical...

Word Count : 720

HTTPS

Last Update:

Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer...

Word Count : 4373

Secure Communication based on Quantum Cryptography

Last Update:

Secure Communication based on Quantum Cryptography (SECOQC) is a project that aims to develop quantum cryptography (see there for further details). The...

Word Count : 354

Secure Shell

Last Update:

The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable...

Word Count : 4271

Secure channel

Last Update:

org/2003/239 Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto: A Universally Composable Secure Channel Based on the KEM-DEM Framework. TCC 2005: 426-444...

Word Count : 752

Secure telephone

Last Update:

secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual...

Word Count : 667

Secure communication

Last Update:

Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate...

Word Count : 2426

Secure copy protocol

Last Update:

two remote hosts. It is based on the Secure Shell (SSH) protocol. "SCP" commonly refers to both the Secure Copy Protocol and the program itself. According...

Word Count : 995

Secure Hash Algorithms

Last Update:

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...

Word Count : 464

Secure by design

Last Update:

Secure by design, in software engineering, means that software products and capabilities have been designed to be foundationally secure. Alternate security...

Word Count : 1072

The Siege of Firebase Gloria

Last Update:

they secure the base and motivate the other soldiers to prepare for a major offensive. Hafner encounters a photographer (Nick Nicholson) offering the men...

Word Count : 1096

Trusted execution environment

Last Update:

A trusted execution environment (TEE) is a secure area of a main processor. It helps code and data loaded inside it to be protected with respect to confidentiality...

Word Count : 3212

Transport Layer Security

Last Update:

network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly...

Word Count : 17090

Springform pan

Last Update:

'belt' that becomes the walls of the pan and secures the base into the groove at the base of the walls. The most common springform pan is a round pan 9...

Word Count : 520

ShareFile

Last Update:

ShareFile is a secure content collaboration, file sharing and sync software that supports all the document-centric tasks and workflow needs of small and...

Word Count : 945

BitLocker

Last Update:

over the whole disk; it is applied to each individual sector. BitLocker originated as a part of Microsoft's Next-Generation Secure Computing Base architecture...

Word Count : 3322

Secure Reliable Transport

Last Update:

Secure Reliable Transport (SRT) is an open source video transport protocol that utilises the UDP transport protocol. The SRT Protocol specification is...

Word Count : 981

Secure element

Last Update:

A secure element (SE) is a secure operating system (OS) in a tamper-resistant processor chip or secure component. It can protect assets (root of trust...

Word Count : 496

G4S Secure Solutions

Last Update:

G4S Secure Solutions (USA) is an American/British-based security services company, and a subsidiary of G4S plc. It was founded as The Wackenhut Corporation...

Word Count : 2813

Ace of Base

Last Update:

Ace of Base is a Swedish pop group, formed in 1987, originally consisting of siblings Jonas, Linn, and Jenny Berggren, with Ulf Ekberg. They achieved worldwide...

Word Count : 7519

Christian Monyk

Last Update:

Monyk is the head of the quantum cryptography business unit of ARC Seibersdorf research GmbH. In addition, he is the overall coordinator of Secure Communication...

Word Count : 43

Clear Secure

Last Update:

Clear Secure, Inc. (operating as: CLEAR) is an American technology company that operates biometric travel document verification systems at some major airports...

Word Count : 1399

Secure cryptoprocessor

Last Update:

A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple...

Word Count : 1961

PDF Search Engine © AllGlobal.net