Development Economics: EDE 221
- Authors: Nonxuba, P Z , Dwesini, N
- Date: 2011-02
- Subjects: Economic development
- Language: English
- Type: Examination paper
- Identifier: vital:17505 , http://hdl.handle.net/10353/d1010763
- Description: Development Economics: EDE 221, Supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Nonxuba, P Z , Dwesini, N
- Date: 2011-02
- Subjects: Economic development
- Language: English
- Type: Examination paper
- Identifier: vital:17505 , http://hdl.handle.net/10353/d1010763
- Description: Development Economics: EDE 221, Supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
International Relations: POL 322
- Authors: Kos, Z , Hudson, H
- Date: 2011-02
- Subjects: International relations -- Political aspects
- Language: English
- Type: Examination paper
- Identifier: vital:18258 , http://hdl.handle.net/10353/d1011253 , International relations -- Political aspects
- Description: International Relations: POL 322, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Kos, Z , Hudson, H
- Date: 2011-02
- Subjects: International relations -- Political aspects
- Language: English
- Type: Examination paper
- Identifier: vital:18258 , http://hdl.handle.net/10353/d1011253 , International relations -- Political aspects
- Description: International Relations: POL 322, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
Introduction to Political Science II: POL 121F
- Ferim, V
- Authors: Ferim, V
- Date: 2011-02
- Subjects: Department of Political Science
- Language: English
- Type: Examination paper
- Identifier: vital:18081 , http://hdl.handle.net/10353/d1010755
- Description: ntroduction to Political Science II: POL 121F, examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Ferim, V
- Date: 2011-02
- Subjects: Department of Political Science
- Language: English
- Type: Examination paper
- Identifier: vital:18081 , http://hdl.handle.net/10353/d1010755
- Description: ntroduction to Political Science II: POL 121F, examination February 2011.
- Full Text: false
- Date Issued: 2011-02
Kantian Philosophy: PHL 223
- Authors: Van der Nest, M , Louw, T
- Date: 2011-02
- Language: English
- Type: Examination paper
- Identifier: vital:18194 , http://hdl.handle.net/10353/d1011183
- Description: Kantian Philosophy: PHL 223, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Van der Nest, M , Louw, T
- Date: 2011-02
- Language: English
- Type: Examination paper
- Identifier: vital:18194 , http://hdl.handle.net/10353/d1011183
- Description: Kantian Philosophy: PHL 223, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
Management & Information Systems: LIB 422
- Ondari-Okemwa, E M, Leach, A
- Authors: Ondari-Okemwa, E M , Leach, A
- Date: 2011-02
- Language: English
- Type: Examination paper
- Identifier: vital:17996 , http://hdl.handle.net/10353/d1010570
- Description: Management & Information Systems: LIB 422, supplementary examination on February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Ondari-Okemwa, E M , Leach, A
- Date: 2011-02
- Language: English
- Type: Examination paper
- Identifier: vital:17996 , http://hdl.handle.net/10353/d1010570
- Description: Management & Information Systems: LIB 422, supplementary examination on February 2011.
- Full Text: false
- Date Issued: 2011-02
Motor Development: HUS 121
Music History: MUS 221
- Botha, H R, Bleibinger, B, Ncozana, J
- Authors: Botha, H R , Bleibinger, B , Ncozana, J
- Date: 2011-02
- Language: English
- Type: Examination paper
- Identifier: vital:18098 , http://hdl.handle.net/10353/d1010846
- Description: Music History: MUS 221, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Botha, H R , Bleibinger, B , Ncozana, J
- Date: 2011-02
- Language: English
- Type: Examination paper
- Identifier: vital:18098 , http://hdl.handle.net/10353/d1010846
- Description: Music History: MUS 221, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
Physiology of Digestion and Ruminology and Energy and Protein Metabolism: AGA 605
- Muchenje, V, Nkukwana, T T, Chimonyo, M, van de Vyver, F
- Authors: Muchenje, V , Nkukwana, T T , Chimonyo, M , van de Vyver, F
- Date: 2011-02
- Subjects: Ruminants -- Digestive organs
- Language: English
- Type: Examination paper
- Identifier: vital:17526 , http://hdl.handle.net/10353/d1009808
- Description: Physiology of Digestion and Ruminology and Energy and Protein Metabolism: AGA 605, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Muchenje, V , Nkukwana, T T , Chimonyo, M , van de Vyver, F
- Date: 2011-02
- Subjects: Ruminants -- Digestive organs
- Language: English
- Type: Examination paper
- Identifier: vital:17526 , http://hdl.handle.net/10353/d1009808
- Description: Physiology of Digestion and Ruminology and Energy and Protein Metabolism: AGA 605, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
Physiology of Digestion and Ruminology and Energy and Protein Metabolism: AGA 605
- Muchenje, V, Nkukwana, T T, Chimonyo, Van de Vyver, F
- Authors: Muchenje, V , Nkukwana, T T , Chimonyo , Van de Vyver, F
- Date: 2011-02
- Subjects: Ruminants -- Metabolism
- Language: English
- Type: Examination paper
- Identifier: vital:17525 , http://hdl.handle.net/10353/d1009807
- Description: Physiology of Digestion and Ruminology and Energy and Protein Metabolism: AGA 605, supplementary examination February 2010.
- Full Text: false
- Date Issued: 2011-02
- Authors: Muchenje, V , Nkukwana, T T , Chimonyo , Van de Vyver, F
- Date: 2011-02
- Subjects: Ruminants -- Metabolism
- Language: English
- Type: Examination paper
- Identifier: vital:17525 , http://hdl.handle.net/10353/d1009807
- Description: Physiology of Digestion and Ruminology and Energy and Protein Metabolism: AGA 605, supplementary examination February 2010.
- Full Text: false
- Date Issued: 2011-02
Plant Systematics: BOT 323
- Authors: Grierson, D S , Gama, P
- Date: 2011-02
- Subjects: Plants -- Classification
- Language: English
- Type: Examination paper
- Identifier: vital:17734 , http://hdl.handle.net/10353/d1010184
- Description: Plant Systematics: BOT 323, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
- Authors: Grierson, D S , Gama, P
- Date: 2011-02
- Subjects: Plants -- Classification
- Language: English
- Type: Examination paper
- Identifier: vital:17734 , http://hdl.handle.net/10353/d1010184
- Description: Plant Systematics: BOT 323, supplementary examination February 2011.
- Full Text: false
- Date Issued: 2011-02
A Framework for DNS Based Detection of Botnets at the ISP Level
- Stalmans, Etienne, Irwin, Barry V W
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427984 , vital:72478 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622932_A_Framework_for_DNS_Based_Detection_of_Botnets_at_the_ISP_Level/links/5b9a14e1458515310583fc19/A-Framework-for-DNS-Based-Detection-of-Botnets-at-the-ISP-Level.pdf
- Description: The rapid expansion of networks and increase in internet connected devices has lead to a large number of hosts susceptible to virus infec-tion. Infected hosts are controlled by attackers and form so called bot-nets. These botnets are used to steal data, mask malicious activity and perform distributed denial of service attacks. Traditional protection mechanisms rely on host based detection of viruses. These systems are failing due to the rapid increase in the number of vulnerable hosts and attacks that easily bypass detection mechanisms. This paper pro-poses moving protection from the individual hosts to the Internet Ser-vice Provider (ISP), allowing for the detection and prevention of botnet traffic. DNS traffic inspection allows for the development of a lightweight and accurate classifier that has little or no effect on network perfor-mance. By preventing botnet activity at the ISP level, it is hoped that the threat of botnets can largely be mitigated.
- Full Text:
- Date Issued: 2011
- Authors: Stalmans, Etienne , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427984 , vital:72478 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622932_A_Framework_for_DNS_Based_Detection_of_Botnets_at_the_ISP_Level/links/5b9a14e1458515310583fc19/A-Framework-for-DNS-Based-Detection-of-Botnets-at-the-ISP-Level.pdf
- Description: The rapid expansion of networks and increase in internet connected devices has lead to a large number of hosts susceptible to virus infec-tion. Infected hosts are controlled by attackers and form so called bot-nets. These botnets are used to steal data, mask malicious activity and perform distributed denial of service attacks. Traditional protection mechanisms rely on host based detection of viruses. These systems are failing due to the rapid increase in the number of vulnerable hosts and attacks that easily bypass detection mechanisms. This paper pro-poses moving protection from the individual hosts to the Internet Ser-vice Provider (ISP), allowing for the detection and prevention of botnet traffic. DNS traffic inspection allows for the development of a lightweight and accurate classifier that has little or no effect on network perfor-mance. By preventing botnet activity at the ISP level, it is hoped that the threat of botnets can largely be mitigated.
- Full Text:
- Date Issued: 2011
A fuzz testing framework for evaluating and securing network applications
- Zeisberger, Sascha, Irwin, Barry V W
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428000 , vital:72479 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622655_A_Fuzz_Testing_Framework_for_Evaluating_and_Securing_Network_Applications/links/5b9a153b92851c4ba8181b0d/A-Fuzz-Testing-Framework-for-Evaluating-and-Securing-Network-Applications.pdf
- Description: Research has shown that fuzz-testing is an effective means of increasing the quality and security of software and systems. This project proposes the im-plementation of a testing framework based on numerous fuzz-testing tech-niques. The framework will allow a user to detect errors in applications and locate critical areas in the applications that are responsible for the detected errors. The aim is to provide an all-encompassing testing framework that will allow a developer to quickly and effectively deploy fuzz tests on an applica-tion and ensure a higher level of quality control before deployment.
- Full Text:
- Date Issued: 2011
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428000 , vital:72479 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622655_A_Fuzz_Testing_Framework_for_Evaluating_and_Securing_Network_Applications/links/5b9a153b92851c4ba8181b0d/A-Fuzz-Testing-Framework-for-Evaluating-and-Securing-Network-Applications.pdf
- Description: Research has shown that fuzz-testing is an effective means of increasing the quality and security of software and systems. This project proposes the im-plementation of a testing framework based on numerous fuzz-testing tech-niques. The framework will allow a user to detect errors in applications and locate critical areas in the applications that are responsible for the detected errors. The aim is to provide an all-encompassing testing framework that will allow a developer to quickly and effectively deploy fuzz tests on an applica-tion and ensure a higher level of quality control before deployment.
- Full Text:
- Date Issued: 2011
An ethics of care for health journalists (and their editors): doing journalism.
- Authors: Dugmore, Harry
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/454636 , vital:75361 , https://hdl.handle.net/10520/EJC135803
- Description: Health journalists are not immune from pressures to break great stories before the opposition does and, in the digital age, all stories have to be entertaining and enticing to be read. So how do we think about the eth-ics of health journalism in the 21st century? Does health journalism, because it is about health, a special case, require different ethics to that of other subjects covered by journalists?
- Full Text:
- Date Issued: 2011
- Authors: Dugmore, Harry
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/454636 , vital:75361 , https://hdl.handle.net/10520/EJC135803
- Description: Health journalists are not immune from pressures to break great stories before the opposition does and, in the digital age, all stories have to be entertaining and enticing to be read. So how do we think about the eth-ics of health journalism in the 21st century? Does health journalism, because it is about health, a special case, require different ethics to that of other subjects covered by journalists?
- Full Text:
- Date Issued: 2011
High Speed Lexical Classification of Malicious URLs
- Egan, Shaun P, Irwin, Barry V W
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428055 , vital:72483 , https://www.researchgate.net/profile/Barry-Ir-win/publication/326225046_High_Speed_Lexical_Classification_of_Malicious_URLs/links/5b3f20acaca27207851c60f9/High-Speed-Lexical-Classification-of-Malicious-URLs.pdf
- Description: It has been shown in recent research that it is possible to identify malicious URLs through lexi-cal analysis of their URL structures alone. Lightweight algorithms are defined as methods by which URLs are analyzed that do not use external sources of information such as WHOIS lookups, blacklist lookups and content analysis. These parameters include URL length, number of delimiters as well as the number of traversals through the directory structure and are used throughout much of the research in the paradigm of lightweight classification. Methods which include external sources of information are often called fully featured classifications and have been shown to be only slightly more effective than a purely lexical analysis when considering both false-positives and falsenegatives. This distinction allows these algorithms to be run client side without the introduction of additional latency, but still providing a high level of accuracy through the use of modern techniques in training classifiers. Both AROW and CW classifier update methods will be used as prototype implementations and their effectiveness will be com-pared to fully featured analysis results. These methods are selected because they are able to train on any labeled data, including instances in which their prediction is correct, allowing them to build a confidence in specific lexical features.
- Full Text:
- Date Issued: 2011
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428055 , vital:72483 , https://www.researchgate.net/profile/Barry-Ir-win/publication/326225046_High_Speed_Lexical_Classification_of_Malicious_URLs/links/5b3f20acaca27207851c60f9/High-Speed-Lexical-Classification-of-Malicious-URLs.pdf
- Description: It has been shown in recent research that it is possible to identify malicious URLs through lexi-cal analysis of their URL structures alone. Lightweight algorithms are defined as methods by which URLs are analyzed that do not use external sources of information such as WHOIS lookups, blacklist lookups and content analysis. These parameters include URL length, number of delimiters as well as the number of traversals through the directory structure and are used throughout much of the research in the paradigm of lightweight classification. Methods which include external sources of information are often called fully featured classifications and have been shown to be only slightly more effective than a purely lexical analysis when considering both false-positives and falsenegatives. This distinction allows these algorithms to be run client side without the introduction of additional latency, but still providing a high level of accuracy through the use of modern techniques in training classifiers. Both AROW and CW classifier update methods will be used as prototype implementations and their effectiveness will be com-pared to fully featured analysis results. These methods are selected because they are able to train on any labeled data, including instances in which their prediction is correct, allowing them to build a confidence in specific lexical features.
- Full Text:
- Date Issued: 2011
Near Real-time Aggregation and Visualisation of Hostile Network Traffic
- Hunter, Samuel O, Irwin, Barry V W
- Authors: Hunter, Samuel O , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428067 , vital:72484 , https://www.researchgate.net/profile/Barry-Irwin/publication/327622653_Near_Real-time_Aggregation_and_Visualisation_of_Hostile_Network_Traffic/links/5b9a1474a6fdcc59bf8dfcc2/Near-Real-time-Aggregation-and-Visualisation-of-Hostile-Network-Traffic.pdf4
- Description: Efficient utilization of hostile network traffic for visualization and defen-sive purposes require near real-time availability of such data. Hostile or malicious traffic was obtained through the use of network telescopes and honeypots, as they are effective at capturing mostly illegitimate and nefarious traffic. The data is then exposed in near real-time through a messaging framework and visualized with the help of a geolocation based visualization tool. Defensive applications with regards to hostile network traffic are explored; these include the dynamic quarantine of malicious hosts internal to a network and the egress filtering of denial of service traffic originating from inside a network.
- Full Text:
- Date Issued: 2011
- Authors: Hunter, Samuel O , Irwin, Barry V W
- Date: 2011
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428067 , vital:72484 , https://www.researchgate.net/profile/Barry-Irwin/publication/327622653_Near_Real-time_Aggregation_and_Visualisation_of_Hostile_Network_Traffic/links/5b9a1474a6fdcc59bf8dfcc2/Near-Real-time-Aggregation-and-Visualisation-of-Hostile-Network-Traffic.pdf4
- Description: Efficient utilization of hostile network traffic for visualization and defen-sive purposes require near real-time availability of such data. Hostile or malicious traffic was obtained through the use of network telescopes and honeypots, as they are effective at capturing mostly illegitimate and nefarious traffic. The data is then exposed in near real-time through a messaging framework and visualized with the help of a geolocation based visualization tool. Defensive applications with regards to hostile network traffic are explored; these include the dynamic quarantine of malicious hosts internal to a network and the egress filtering of denial of service traffic originating from inside a network.
- Full Text:
- Date Issued: 2011
Precisely. Not five. Not seven. Six.: teaching journalism
- Authors: Rennie, Gillian
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/454839 , vital:75380 , https://hdl.handle.net/10520/EJC135796
- Description: After just one month at university, they had to tell their life story in six words. Precisely. Not five. Not seven. Six. And they were scared. So they made a noise. So I did too. Eventually they listened and this is what they heard.
- Full Text:
- Date Issued: 2011
- Authors: Rennie, Gillian
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/454839 , vital:75380 , https://hdl.handle.net/10520/EJC135796
- Description: After just one month at university, they had to tell their life story in six words. Precisely. Not five. Not seven. Six. And they were scared. So they made a noise. So I did too. Eventually they listened and this is what they heard.
- Full Text:
- Date Issued: 2011
Some considerations when comparing SABAP 1 with SABAP 2 data
- Authors: Bonnevie, Bo T
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/448327 , vital:74722 , https://doi.org/10.2989/00306525.2011.603486
- Description: Generally, one should be cautious when comparing data that have not been collected in the same manner. The data collection methods of the South African Bird Atlas Projects, SABAP 1 (Harrison et al. 1997) and SABAP 2 (in progress at the time of writing), differ both spatially and temporally. On the spatial scale SABAP 1 used predominantly quarter degree cells (15′ by 15′), whereas SABAP 2 uses pentads (5′ by 5′; one quarter-degree cell containing nine pentads). On a temporal scale SABAP 1 used one calendar month, whereas SABAP 2 is using one pentade (five days). Where possible, however, SABAP 1 used pentades post hoc for seasonality modelling (Harrison et al. 1997, pp lviii–lix). Because of, but possibly not limited to, this, caution will need to be exercised when comparing data between the two projects. It is naturally desirable to compare the data between these projects, particularly to seek long-term trends in population densities and in the potential changes in the distribution of species.
- Full Text:
- Date Issued: 2011
- Authors: Bonnevie, Bo T
- Date: 2011
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/448327 , vital:74722 , https://doi.org/10.2989/00306525.2011.603486
- Description: Generally, one should be cautious when comparing data that have not been collected in the same manner. The data collection methods of the South African Bird Atlas Projects, SABAP 1 (Harrison et al. 1997) and SABAP 2 (in progress at the time of writing), differ both spatially and temporally. On the spatial scale SABAP 1 used predominantly quarter degree cells (15′ by 15′), whereas SABAP 2 uses pentads (5′ by 5′; one quarter-degree cell containing nine pentads). On a temporal scale SABAP 1 used one calendar month, whereas SABAP 2 is using one pentade (five days). Where possible, however, SABAP 1 used pentades post hoc for seasonality modelling (Harrison et al. 1997, pp lviii–lix). Because of, but possibly not limited to, this, caution will need to be exercised when comparing data between the two projects. It is naturally desirable to compare the data between these projects, particularly to seek long-term trends in population densities and in the potential changes in the distribution of species.
- Full Text:
- Date Issued: 2011
Tebello Nyokong "As chemists, we are designers"
- Authors: Nolan, Cathy
- Date: 2011
- Language: English
- Type: Article , text
- Identifier: vital:7201 , http://hdl.handle.net/10962/d1006385
- Description: What is the common thread running through denim jeans, cancer and pesticides? None springs to mind, yet when chemist Tebello Nyokong describes her fascinating research, a link begins to emerge: light. A specialist in nanochemistry, Nyokong is using laser in ways that could revolutionize not only the diagnosis and treatment of cancer but also water purification.
- Full Text:
- Date Issued: 2011
- Authors: Nolan, Cathy
- Date: 2011
- Language: English
- Type: Article , text
- Identifier: vital:7201 , http://hdl.handle.net/10962/d1006385
- Description: What is the common thread running through denim jeans, cancer and pesticides? None springs to mind, yet when chemist Tebello Nyokong describes her fascinating research, a link begins to emerge: light. A specialist in nanochemistry, Nyokong is using laser in ways that could revolutionize not only the diagnosis and treatment of cancer but also water purification.
- Full Text:
- Date Issued: 2011
Tebello Nyokong 'As chemists, we are designers'
- Authors: Nolan, Cathy
- Date: 2011
- Subjects: Nyokong, Tebello , L’Oreal–UNESCO Awards for Women in Science
- Language: English
- Type: Article , text
- Identifier: vital:7183 , http://hdl.handle.net/10962/d1006272 , Nyokong, Tebello , L’Oreal–UNESCO Awards for Women in Science
- Description: What is the common thread running through denim jeans, cancer and pesticides? None springs to mind, yet when chemist Tebello Nyokong describes her fascinating research, a link begins to emerge: light. A specialist in nanochemistry, Nyokong is using laser in ways that could revolutionize not only the diagnosis and treatment of cancer but also water purification. Born in Lesotho, Tebello Nyokong is Professor of Medicinal Chemistry and Nanotechnology at Rhodes University in South Africa and Director of the Nanotechnology Innovation Centre for Sensors (Mintek). In 2009, she was one of the five Laureates of the 2009 L’Oreal–UNESCO Awards for Women in Science.
- Full Text:
- Date Issued: 2011
- Authors: Nolan, Cathy
- Date: 2011
- Subjects: Nyokong, Tebello , L’Oreal–UNESCO Awards for Women in Science
- Language: English
- Type: Article , text
- Identifier: vital:7183 , http://hdl.handle.net/10962/d1006272 , Nyokong, Tebello , L’Oreal–UNESCO Awards for Women in Science
- Description: What is the common thread running through denim jeans, cancer and pesticides? None springs to mind, yet when chemist Tebello Nyokong describes her fascinating research, a link begins to emerge: light. A specialist in nanochemistry, Nyokong is using laser in ways that could revolutionize not only the diagnosis and treatment of cancer but also water purification. Born in Lesotho, Tebello Nyokong is Professor of Medicinal Chemistry and Nanotechnology at Rhodes University in South Africa and Director of the Nanotechnology Innovation Centre for Sensors (Mintek). In 2009, she was one of the five Laureates of the 2009 L’Oreal–UNESCO Awards for Women in Science.
- Full Text:
- Date Issued: 2011
Advanced Organizational Psychology: IPS 521
- Nel, A, Van Niekerk, R, Berry, D
- Authors: Nel, A , Van Niekerk, R , Berry, D
- Date: 2011-01
- Subjects: Industrial psychology
- Language: English
- Type: Examination paper
- Identifier: vital:17508 , http://hdl.handle.net/10353/d1010975
- Description: Advanced Organizational Psychology: IPS 521, supplementary examination January 2011.
- Full Text: false
- Date Issued: 2011-01
- Authors: Nel, A , Van Niekerk, R , Berry, D
- Date: 2011-01
- Subjects: Industrial psychology
- Language: English
- Type: Examination paper
- Identifier: vital:17508 , http://hdl.handle.net/10353/d1010975
- Description: Advanced Organizational Psychology: IPS 521, supplementary examination January 2011.
- Full Text: false
- Date Issued: 2011-01