414 results on '"VAN VUUREN, A. Jansen"'
Search Results
2. Security Issues in Cyber Threat Intelligence Exchange: A Review
3. Preparing for the Fourth Industrial Revolution : Recommendations to Adapt Cyber Security Governance and Skills in South Africa
4. Meerkat Maths -- A Comprehensive Maths Learning Programme for Grade-R
5. Blended Learning from Design to Evaluation: International Case Studies of Evidence-Based Practice
6. Out of southern Africa: Origins and cryptic speciation in Chamaeleo, the most widespread chameleon genus
7. Mitogenome selection in the evolution of key ecological strategies in the ancient hexapod class Collembola
8. Fire Dynamics in Informal Settlement 'Shacks': Lessons Learnt and Appraisal of Fire Behavior Based on Full-Scale Testing
9. From the Editors : Special Issue: Legal, Social, and Technical Considerations for Cyber Security in the Digital Revolution
10. Proving It Is the Data That Is Biased, Not the Algorithm Through a Recent South African Online Case Study
11. Development and Implementation of Cybercrime Strategies in Africa with Specific Reference to South Africa
12. Genomic divergence and differential gene expression between crustacean ecotypes across a marine thermal gradient
13. Reviewer Acknowledgements
14. Contributors
15. Assessment in higher education during troubled times: The case of a South African arts module
16. Translation between Non-humans and Humans
17. Effect of electrode characteristics on electromyographic activity of the masseter muscle
18. Development of a scintillator based fast-ion loss detector for the Wendelstein 7-X stellarator
19. EXPLORATORY ANALYSIS OF TRANSACTIONAL DATA TO AID IN THE SUPPLY CHAIN NETWORK DESIGN OF A FOOD BANKING NETWORK: A CASE STUDY.
20. Unveiling the toxic leadership culture in south African universities: authoritarian behaviour, cronyism and self-serving practices.
21. The influence of undercut depths on the accuracy of casts poured from irreversible hydrocolloid impression materials
22. Integrating Enterprise Architecture into Cybersecurity Risk Management in Higher Education.
23. NATIONAL COUNCIL FEEDBACK.
24. Genetic structure and diversity within lethally managed populations of two mesopredators in South Africa
25. Spatial genetic structure in the rock hyrax (Procavia capensis) across the Namaqualand and western Fynbos areas of South Africa--a mitochondrial and microsatellite perspective
26. subCULTron - Cultural Development as a Tool in Underwater Robotics
27. The efficacy of single mitochondrial genes at reconciling the complete mitogenome phylogeny--a case study on dwarf chameleons.
28. Theory-based early numeracy programme adapted to learners’ pre-knowledge
29. A targeted gene approach to SNP discovery in the blue (Connochaetes taurinus) and black wildebeest (C. gnou)
30. Point-of-Care Viral Load Testing to Manage HIV Viremia During the Rollout of Dolutegravir-Based ART in South Africa: A Randomized Feasibility Study (POwER)
31. A general morphological analysis: delineating a cyber-security culture
32. The Ship Has Left the Harbour, but the Captain is MIA: Mobile Adoption within Higher Education Institutes
33. Active Control of Alfvén Eigenmodes by Externally Applied 3D Magnetic Perturbations
34. Active Control of Alfvén Eigenmodes by Externally Applied 3D Magnetic Perturbations
35. Music in the Life Skills Classroom
36. Proposed Model for a Cybersecurity Centre of Innovation for South Africa
37. Distributional range, ecology, and mating system of the Cape mole-rat (Georychus capensis) family Bathyergidae
38. Multiple introductions, polyploidy and mixed reproductive strategies are linked to genetic diversity and structure in the most widespread invasive plant across Southern Ocean archipelagos
39. Ant-ICON - ‘Integrated Science to Inform Antarctic and Southern Ocean Conservation’: a new SCAR Scientific Research Programme
40. Active Control of Alfvén Eigenmodes by Externally Applied 3D Magnetic Perturbations
41. Conservation implications of significant population differentiation in an endangered estuarine seahorse
42. Deconstructing intercontinental invasion pathway hypotheses of the Mediterranean fruit fly (Ceratitis capitata) using a Bayesian inference approach: are port interceptions and quarantine protocols successfully preventing new invasions?
43. Rapid collapse of a sub-Antarctic alpine ecosystem: the role of climate and pathogens
44. Towards the Establishment of an African Cyber-Army
45. Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward
46. Corrigendum: The last two remaining populations of the critically endangered estuarine pipefish are inbred and notgenetically distinct
47. Digital Measurement of Construction Performance: Data-to-dashboard Strategy
48. H-SURF: Heterogeneous Swarm of Underwater Robotic Fish
49. An Ontological Model for a National Cyber-attack Response in South Africa
50. Effect of autoclave induced low-temperature degradation on the adhesion energy between yttria-stabilized zirconia veneered with porcelain
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.