| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910464789603321 |
|
|
Titolo |
Incisive journalism in Cameroon : the best of Cameroon report (1978 - 1986) / / edited by Michael Sam-Nuvala Fonkem ; contributors Wilfred Nkwenti [and seventeen others] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Bamenda, Cameroon : , : Langaa Research & Publishing, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (1 PDF (xxxii, 241 pages)) |
|
|
|
|
|
|
Altri autori (Persone) |
|
FonkemMichael Sam-Nuvala |
NkwentiWilfred |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Radio journalism - Cameroon |
Journalism - Cameroon |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Issued as part of UPCC book collections on Project MUSE. |
|
|
|
|
|
|
Sommario/riassunto |
|
Working for Cameroon state-owned Radio in the 1970's and '80's meant toeing the official line and learning not to sing out of tune. While the rather scanty private press that existed at the time was subject to prior censorship, a different kind of censorship - self-censorship prevailed at the Radio where topics for commentaries were vetted by the Minister of Information or his delegate. But for Anglophones working in a predominantly francophone environment, once topics were approved, the authorities could not be sure which direction commentaries were going to take as the journalists applied the tactics of 'bite and blow', sometimes giving full expression of their Anglo-Saxon spirit of debate and critical analysis as evidenced in this selection of commentaries from the Sunday morning commentary programme, "Cameroon Report" (now "Cameroon Calling") of the late 1970's up till 1986. It is a showcase of the irrepressible seed of freedom of expression that Anglophone journalists were imbued with and demonstrated at a time when subjects related to coups d'état, human rights and governance were considered taboo. It was and shall |
|
|
|
|
|
|
|
|
|
|
|
|
|
remain the indelible input of the Anglophone character that has had a positive influence on Cameroon's media landscape. |
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996466039603316 |
|
|
Titolo |
Security Protocols [[electronic resource] ] : 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-283-47747-5 |
9786613477477 |
3-642-17773-5 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2010.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (VIII, 257 p. 45 illus., 16 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 5964 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer communication systems |
Data encryption (Computer science) |
Management information systems |
Computer science |
Algorithms |
Application software |
Computers and civilization |
Computer Communication Networks |
Cryptology |
Management of Computing and Information Systems |
Algorithm Analysis and Problem Complexity |
Information Systems Applications (incl. Internet) |
Computers and Society |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions. |
|
|
|
|
|
|
|
| |