LEADER 03129 am 2200553 n 450 001 9910324026503321 005 20190503 010 $a979-1-0923-1250-8 024 7 $a10.4000/books.ifra.1353 035 $a(CKB)4100000008283998 035 $a(FrMaCLE)OB-ifra-1353 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/53129 035 $a(PPN)236711911 035 $a(EXLCZ)994100000008283998 100 $a20190506j|||||||| ||| 0 101 0 $aeng 135 $auu||||||m|||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMemorialisation Principles, Post-Civil War Reintegration and the Quest for Sustainable Peace in Nigeria /$fPhilip Ademola Olayoku 210 $aIbadan $cIFRA-Nigeria$d2019 215 $a1 online resource (38 p.) 330 $aMnemonic devices have remained integral to human learning processes through history, as man continues to grapple with his existential experiences. Such epistemological consideration considers knowledge as a universal experience of recall, whereby events, objects, texts and processes are commited to memory. However, threats to Nigeria?s sociopolitical life has been the reverse of this logic with the erasure of History from the curriculum of secondary schools until the recent attempts at its restoration. It is such neglect that prompted this study?s examination of the need to revive the consciousness of the importance of historical lessons in the consolidation of the country?s democracy by adopting a memorialisation policy. It conceptualizes memorialisation within the framework of creation of public memorials as important for national integration and peacebuilding through references to extant memory initiatives. It then proceeds to situate the eight principles of memorialisation - as proposed by Impunity Watch - within the global context while drawing from an array of literature within the humanities and social sciences. In relaying this to the Nigerian context, the paper focuses on relevant historical events and discussions around the Nigerian Civil War with the purpose of demonstrating how memorialisation can be adopted in facilitating peacebuilding efforts in Nigeria, as a means to address different secessionist bids in a sustainable manner. 606 $aHistory 606 $aPolitical Science 606 $apeace 606 $acivil war 606 $apeace-building 606 $aNigerian politics 606 $amemorialisation 610 $amemorialisation 610 $apeace-building 610 $apeace 610 $acivil war 610 $aNigerian politics 615 4$aHistory 615 4$aPolitical Science 615 4$apeace 615 4$acivil war 615 4$apeace-building 615 4$aNigerian politics 615 4$amemorialisation 700 $aOlayoku$b Philip Ademola$01285171 801 0$bFR-FrMaCLE 906 $aBOOK 912 $a9910324026503321 996 $aMemorialisation Principles, Post-Civil War Reintegration and the Quest for Sustainable Peace in Nigeria$93037960 997 $aUNINA LEADER 03580oam 2200673 450 001 9910164054403321 005 20190911103517.0 010 $a1-5225-3837-2 010 $a1-5225-2297-2 024 7 $a10.4018/978-1-5225-2296-6 035 $a(OCoLC)973495644 035 $a(MiFhGG)GVRL02VF 035 $a(EXLCZ)993710000001051679 100 $a20170118h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aSecurity breaches and threat prevention in the Internet of things /$fN. Jeyanthi, R. Thandeeswaran [editors] 210 1$aHershey, PA :$cInformation Science Reference,$d[2017] 210 4$d?2017 215 $a1 online resource (xiv, 276 pages) $cillustrations (some color) 225 1 $aAdvances in Information Security, Privacy, and Ethics (AISPE) Book Series,$x1948-9749 311 $a1-5225-2296-4 320 $aIncludes bibliographical references and index. 327 $aIoT architecture / H. Parveen Sultana -- Internet of things and security perspectives: current issues and trends / Kijpokin Kasemsap -- Security in network layer of IoT: possible measures to preclude / B. Balamurugan -- Security in application layer protocols of IoT: threats and attacks / Jasmine Norman, Paul Joseph -- Security in IoT devices / N. Jeyanthi, Shreyansh Banthia, Akhil Sharma -- Security threats in autonomous vehicles / R. Thandeeswaran, Rajat Pawar, Mallika Rai -- Mechanisms to secure communications in the IoT / Azeddine Bilami, Somia Sahraoui -- IoT in healthcare: breaching security issues / Somasundaram R, Mythili Thirugnanam -- A contemplator on topical image encryption measures / Jayanta Mondal, Debabala Swain. 330 3 $a"This book provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things"--Provided by publisher. 410 0$aPremier reference source. 410 0$aAdvances in information security, privacy, and ethics (AISPE) book series. 606 $aComputer security 606 $aInternet of things 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aInformation warfare$xPrevention 606 $aCyberterrorism$xPrevention 610 $aApplication layer protocols 610 $aAutonomous vehicles 610 $aDigital forensics 610 $aEncryption measures 610 $aHealthcare security 610 $aImage encryption 610 $aSecure communications 615 0$aComputer security. 615 0$aInternet of things. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aInformation warfare$xPrevention. 615 0$aCyberterrorism$xPrevention. 676 $a004.67/8 700 $aJeyanthi$b N.$01246129 702 $aJeyanthi$b N.$f1977- 702 $aThandeeswaran$b R.$f1971- 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910164054403321 996 $aSecurity breaches and threat prevention in the internet of things$92889591 997 $aUNINA