Security is a vital subject of study in the twenty-first century and a central theme in many social science disciplines. This volume provides a comparative analysis of the ways in which the concept of security is theorized and studied across different disciplines. The book has two objectives: first, to explore the growing diversity of theories, paradigms, and methods developed to study security; and, second, to initiate a multidisciplinary dialogue about the ontological, epistemological, paradigmatic, and normative aspects of security studies in social sciences. Readers across nine fields are invited to reflect on their conceptualizations of security and to consider how an interdisciplinary dialogue can stimulate and enrich the understanding of security in our contemporary world. Analytically sharp yet easy to read, this is a cutting-edge volume exploring what security is and what it means in today's world.
Manderley Resort, a palace of opulence and unparalleled security, is about to open its doors, but someone is determined not to let that happen.
Although Brottman is already familiar with these works, the convicts open them up in completely new ways. Their discussions may “only” be about literature, but for the prisoners, everything is at stake.
Covert channels. These are hidden (covert) ways of passing information against organizational policy. There are two main types of covert channels: timing (signaling from one system to another) and storage (the storing of data in an ...
Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses ...
But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions.
All chapters in this new edition are updated and a wide range of new topics are discussed, including the Syrian civil war, Russia's annexation of Crimea and its intervention in East Ukraine, the global refugee crisis, China's military ...
This collection of essays by Richard K. Betts, a leading international politics scholar, investigates the use of American force since the end of the Cold War, suggesting guidelines for making it more selective and successful.
If security has become the dominant, perhaps impenetrable concept of our times, then we must start entertaining the impossible. We must begin asking: what would doing anti-security look like?
Does it ever seem they have all of the cool tools? Does it seem like defending a network is just not fun? This books introduces new cyber-security defensive tactics to annoy attackers, gain attribution and insight on who and where they are.
This book analyzes the most pressing current transnational security threats, including weapons of mass destruction, terrorism, organized crime, cybercrime, natural disasters, human-made disasters, infectious diseases, food insecurity, water ...