![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
With thorough analysis and balanced reporting, Ghost Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution is an essential resource for readers seeking to understand the rise of homemade firearms and future options for managing them. For more than a century, strict gun control was possible because firearms were produced in centralized industrial factories. Today, the Fourth Industrial Revolution, combining old and new technologies, threatens to upend this arrangement. An increasing number of hobbyists, "makers," technology provocateurs, and sophisticated criminals are proving that you don't need a factory to make guns anymore. The security challenges of this transformation are increasingly apparent, but the technologies behind it hold tremendous potential, and while ignoring the security implications would entail risks, the costs of new policies also must be evaluated. "Do-it-yourself," or DIY, weapons will bring significant ramifications for First and Second Amendment law, international and homeland security, crime control, technology, privacy, innovation, and the character of open source culture itself. How can a liberal society adjust to technologies that make it easier to produce weapons and contraband? Informative and thought-provoking, Ghost Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution carefully analyzes the technical, legal, social, political, and criminological trends behind this challenging new area of illicit weapons activity. Provides readers with informative background on DIY gun laws and legislative trends and fascinating descriptions of legal and illegal practices with homemade weapons around the world Presents in-depth explanations of the consumer appeal, technology, economics, politics, and enforcement challenges behind America's quickly growing DIY gun-making phenomenon Evaluates the current and future appeal of homemade weapons for differing types of crime and terrorism Offers a series of forward-looking recommendations for weapons control and security policy in an increasingly "post-industrial" 21st century
Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.
Headlines of public service corruption scandals are painful reminders of the need for continuing education in the subjects of ethics and integrity. Public service professionals employed as government officials, forensic scientists, investigators, first responders, and those within the legal and justice systems, face daily decisions that can mean the difference between life or death and freedom or imprisonment. Sometimes, such decisions can present ethical dilemmas even to the most seasoned of professionals. Building on the success of the first edition, Ethics for the Public Service Professional, Second Edition serves as a single-source resource for the topic of ethics and ethical decision making as it relates to government service. While incorporating an examination of the history of ethics, codes and legislation, the book exposes the reader to the challenges faced by today's public service professionals and administrators in incorporating ethics within daily decisions, procedures, and duties. Key features include: Current controversies in police, forensic, and other public service sectors including: racial profiling, evidence tampering, disaster response, and audits Important new mechanisms of accountability, including use-of-force reporting, citizen complaint procedures, and open government Contemporary news stories throughout the book introduce the reader to a broad range of ethical issues facing leaders within the public service workplace Chapter pedagogy including key terms, learning objectives, end-of-chapter questions, a variety of boxed ethical case examples, and references Ripped from the Headlines current event examples demonstrate actual scenarios involving the issues discussed within each chapter This in-depth text will be essential for the foundational development and explanation of protocols used within a successful organization. As such, Ethics for the Public Service Professional, Second Edition will help introduce ethics and ethical decision-making to both those new to the realm of forensic science, criminal justice, and emergency services and those already working in the field.
Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.
Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about change management. Organizations exist within a complex and changing environment. The changes within the organizational context (e.g., societal, technological, and customer preferences) place pressure upon the organization to remain relevant and competitive. Change is not inherently wrong; our perceptions of the change make it negative or positive. A perceived negative change can become a real opportunity for improvement if desired. Systemic degradation and irrelevancy are the results of an organization that fails to acknowledge the reality of change. The book focuses on the dynamics of change management with an eye toward the risk professional. There is a real need for an uncomplicated resource that helps educate non-change management professionals involved in risk-oriented change initiatives. Examples of risk disciplines are organizational resilience, business continuity, risk management, crisis management, and security management, but any discipline or function within an organization focuses on risk. Any organizational project is an initiative requiring dynamic change management skills. The author brings his extensive experience to offer risk practitioners advice, industry examples, and best practices to the change management process. Change Management for Risk Professionals will be a welcome addition to enterprise-wide business continuity, crisis management, disaster recovery, security management, and homeland security professionals wanting to learn the secrets to becoming successful in initiating organizational change.
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
Since Pakistan was founded in 1947, its army has dominated the state. The military establishment has locked the country in an enduring rivalry with India, with the primary aim of wresting Kashmir from it. To that end, Pakistan initiated three wars over Kashmir-in 1947, 1965, and 1999-and failed to win any of them. Today, the army continues to prosecute this dangerous policy by employing non-state actors under the security of its ever-expanding nuclear umbrella. It has sustained a proxy war in Kashmir since 1989 using Islamist militants, as well as supporting non-Islamist insurgencies throughout India and a country-wide Islamist terror campaign that have brought the two countries to the brink of war on several occasions. In addition to these territorial revisionist goals, the Pakistani army has committed itself to resisting India's slow but inevitable rise on the global stage. Despite Pakistan's efforts to coerce India, it has achieved only modest successes at best. Even though India vivisected Pakistan in 1971, Pakistan continues to see itself as India's equal and demands the world do the same. The dangerous methods that the army uses to enforce this self-perception have brought international opprobrium upon Pakistan and its army. And in recent years, their erstwhile proxies have turned their guns on the Pakistani state itself. Why does the army persist in pursuing these revisionist policies that have come to imperil the very viability of the state itself, from which the army feeds? In Fighting to the End, C. Christine Fair argues that the answer lies, at least partially, in the strategic culture of the army. Through an unprecedented analysis of decades' worth of the army's own defense publications, she concludes that from the army's distorted view of history, it is victorious as long as it can resist India's purported drive for regional hegemony as well as the territorial status quo. Simply put, acquiescence means defeat. Fighting to the End convincingly shows that because the army is unlikely to abandon these preferences, Pakistan will remain a destabilizing force in world politics for the foreseeable future.
Managing the ever-changing nature and cross-disciplinary challenges of the maritime sector demands a complete understanding of the special characteristics of the maritime space. The complexity of the operations of ships, ports, shipping companies, and naval and coast guard maritime security operations-as well as the economic significance and the inherent security vulnerabilities of global maritime trade-requires a thorough, holistic and adaptable understanding of commercial, law enforcement and naval maritime security phenomena. Written by a team of expert contributors, this book identifies and assesses the issues inherent in developing and implementing maritime security measures. It examines the new maritime security environment, including the different but complementary interests of the shipping industry and national regulatory agencies. The coverage includes analyses of the different threats to maritime security and how they are perceived by different actors in the maritime domain. The editors evaluate the international and national legal frameworks developed for specific sectors and the responses that different nations have given to these initiatives. Comprehensive in scope, the volume addresses security concerns that pertain to a wide spectrum of commercial shipping and maritime security situations, regulatory frameworks, sector-specific vulnerabilities, regional nuances, and port facilities.
Clear, comprehensive approach to crime prevention introduces undergraduates to the breadth of this field, showing students how to assess tactics and their impact in reducing crime or fear of victimization The market leader in a course taught in Criminal Justice, Criminology, and Sociology programs world-wide Foundational principles of crime prevention with global examples plus a curated collection of online resources for instructors and students makes this book the best choice for Crime Prevention and Crime Control courses
The gradual retreat of polar sea ice in the Arctic region, combined with an expected increase in human activity - shipping traffic, oil and gas exploration, and tourism - could eventually increase the need for a U.S. military and homeland security presence in the Arctic. In recognition of increasing strategic interest in the Arctic, the United States has developed national level policies that guide the actions of the Department of Defense (DOD), the U.S. Coast Guard, and other stakeholders in the region. This book provides an overview of the policies that indicate that the United States has an enduring interest in working collaboratively with other nations to address the emerging challenges arising from the impacts of climate change and globalization in the Arctic. Also discussed, are Arctic national security needs including protecting the environment, managing resources, and supporting scientific research.
This book analyses the cooperation between the European Union and the United States on internal security and counter-terrorism since the 9/11 terrorist attacks. In particular, four areas of cooperation are examined: customs and supply chain security; judicial cooperation (the mutual legal assistance and extradition agreements); law enforcement cooperation (the Europol-US agreements); and the EU-US agreements for the sharing of air passengers' data (PNR agreements). These cases are analysed through a conceptual framework based on the theories of international regimes, with the data being drawn from an extensive documentary analysis of media sources collected through the 'Nexis' database, official documents, and from 13 semi-structured elite interviews with US and EU officials. The book argues that the EU and the US have established a transatlantic internal security regime based on shared principles, norms, rules, and interests. While at the beginning of this process the EU had a more reactive and passive stance at the later stages both the EU and the US were active in shaping the transatlantic political agenda and negotiations. The book demonstrates how the EU has had a much more proactive role in its relations with the US than has often been assumed in the current literature. This book will be of much interest to students of EU policy, foreign policy, international security and IR in general.
Conventional wisdom holds that weak and failing states are the source of the world's most pressing security threats. After all, the 9/11 attacks originated in an impoverished, war-ravaged country, and transnational crime appears to flourish in weakly governed states. However, our assumptions about the threats posed by failing states are based on anecdotal arguments, not on a systematic analysis of the connections between state failure and transnational security threats. Analyzing terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity, Stewart Patrick shows that while some global threats do emerge in fragile states, most of their weaknesses create misery only for their own citizenry. Moreover, many threats originate farther up the chain, in wealthier and more stable countries like Russia and Venezuela. Weak Links will force policymakers to rethink what they assume about state failure and transnational insecurity.
In spite of Edward Snowden's disclosures about government abuses of dragnet communication surveillance, the surveillance industry continues to expand around the world. Many people have become resigned to a world where they cannot have a reasonable expectation of privacy. The author looks at what can be done to rein in these powers and restructure how they are used beyond the limited and often ineffective reforms that have been attempted. Using southern Africa as a backdrop, and its liberation history, Jane Duncan examines what an anti-capitalist perspective on intelligence and security powers could look like. Are the police and intelligence agencies even needed, and if so, what should they do and why? What lessons can be learnt from how security was organised during the struggles for liberation in the region? Southern Africa is seeing thousands of people in the region taking to the streets in protests. In response, governments are scrambling to acquire surveillance technologies to monitor these new protest movements. Southern Africa faces no major terrorism threats at the moment, which should make it easier to develop clearer anti-surveillance campaigns than in Europe or the US. Yet, because of tactical and strategic ambivalence about security powers, movements often engage in limited calls for intelligence and policing reforms, and fail to provide an alternative vision for policing and intelligence. Surveillance and Intelligence in Southern Africa examines what that vision could look like.
The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.
This book analyses the collective security system as it now stands, focusing on strategic and normative frameworks. The old system of international collective security is based on assumptions that are inadequate in relation to current challenges. Against the backdrop of changed geopolitical constellations, democracies under siege and the challenges posed by new types of warfare, critical analysts hold that not a single multilateral institution today is fully up to the task it was created for. The UN, from its founding to the Sustained Peace Approach, represents a fascinating global process of vision-building and adaptation to reality. Based on this understanding, the dynamics of the UN peace and security architecture are examined along with major agendas, from peacebuilding to development. In turn, reform proposals in the post-COVID-19 era are discussed. The book examines whether a regionalization of security structures within the UN framework may offer a way out of global fragility and growing instability factors, a question of utmost importance for conflict prevention and crisis management in the next few decades. In turn, the author discusses a normative positioning of a new intervention logic as the lowest common denominator between collaborative regional orders. Reinvented multilateralism will return as a "must." Given its scope, the book will appeal to students and scholars of international relations and international security studies, as well as to policymakers in governments and international organizations.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
After 9/11, the initial focus from the U.S. government, media, and the public was on security at commercial airports and aboard commercial airlines. Soon, investigation revealed the hijackers had trained at flight schools operating out of general aviation airports, leading to a huge outcry by the media and within the government to mandate security regulations for this flight sector. General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports examines the threats against general aviation (GA) and presents resources for security professionals and GA airport owners and operators to develop an impenetrable airport and aircraft security plan. Following an overview of general aviation and its inherent security threats, the book explores: Physical security for the aviation environment, including intrusion detection systems, cameras, locks, lighting, and window security The security force, including recruitment and training Security of general aviation aircraft and airports, including runway security and fuel storage Airport safety regulations such as the Workers Protection Act and the Bloodborne Pathogens Act Emergency response to a range of scenarios, including medical emergencies, fires, gas leaks, and bomb threats The security of hangars, fixed-base operations, and flight schools Corporate aviation security departments The book concludes with a study involving the Aircraft Owners and Pilots Association (AOPA) Airport Watch Program and the Transportation Security Administration (TSA) security requirements and recommendations for general aviation. General aviation supports public safety, business, agriculture, commercial airports, aeronautical education, and many aspects of the aviation industry. The book is the first to explore the unique security concerns relevant to general aviation operations. Dr. Daniel J. Benny was interviewed on video by General Aviation Security Magazine about his article concerning the effects of the Airport Watch Program.
National security has been at the forefront of the Israeli experience for seven decades, with threats ranging from terrorism, to vast rocket and missile arsenals, and even existential nuclear dangers. Yet, despite its overwhelming preoccupation with foreign and defense affairs, Israel does not have a formal national security strategy. In Israeli National Security, Chuck Freilich presents an authoritative analysis of the military, diplomatic, demographic, and societal challenges Israel faces today, to propose a comprehensive and long-term Israeli national security strategy. The heart of the new strategy places greater emphasis on restraint, defense, and diplomacy as means of addressing the challenges Israel faces, along with the military capacity to deter and, if necessary, defeat Israel's adversaries, while also maintaining the resolve of its society. By bringing Israel's most critical debates about the Palestinians, demography, Iran, Hezbollah, Hamas, US relations and nuclear strategy into sharp focus, the strategy Freilich proposes addresses the primary challenges Israel must address in order to chart its national course. The most comprehensive study of Israel's national security to date, this book presents the first public proposal for a comprehensive Israeli national security strategy and prescribes an actionable course forward.
What our health data tell American capitalism about our value-and how that controls our lives. Afterlives of Data follows the curious and multiple lives that our data live once they escape our control. Mary F. E. Ebeling's ethnographic investigation shows how information about our health and the debt that we carry becomes biopolitical assets owned by healthcare providers, insurers, commercial data brokers, credit reporting companies, and platforms. By delving into the oceans of data built from everyday medical and debt traumas, Ebeling reveals how data about our lives come to affect our bodies and our life chances and to wholly define us. Investigations into secretive data collection and breaches of privacy by the likes of Cambridge Analytica have piqued concerns among many Americans about exactly what is being done with their data. From credit bureaus and consumer data brokers like Equifax and Experian to the secretive military contractor Palantir, this massive industry has little regulatory oversight for health data and works to actively obscure how it profits from our data. In this book, Ebeling traces the health data-medical information extracted from patients' bodies-that are digitized and repackaged into new data commodities that have afterlives in database lakes and oceans, algorithms, and statistical models used to score patients on their creditworthiness and riskiness. Critical and disturbing, Afterlives of Data examines how Americans' data about their health and their debt are used in the service of marketing and capitalist surveillance.
Democracy Declassified tackles an enduring question of particular current importance: How do democratic governments balance the need for foreign policy secrecy with accountability to the public? Democracies keep secrets both from potential enemies and their publics. This simple fact challenges the surprisingly prevalent assumption that foreign policy successes and failures can be attributed to public transparency and accountability. In fact, the ability to keep secrets has aided democratic victories from the European and Pacific theatres in World War II to the global competition of the Cold War. At the same time, executive discretion over the capacity to classify information created the opportunity for abuse that contributed to Watergate, as well as domestic spying and repression in France, Norway and Canada over the last 40 years. Therefore, democracies face a secrecy dilemma. Secrecy is useful, but once a group or person has the ability to decide what information is concealed from an international competitor, citizens can no longer monitor that information. How then can the public be assured that national security policies are not promoting hidden corruption or incompetence? As Democracy Declassified shows, it is indeed possible for democracies to keep secrets while also maintaining national security oversight institutions that can deter abuse and reassure the public, including freedom of information laws, legislative committee powers, and press freedom. Understanding secrecy and oversight in democracies helps us explain not only why the Maginot Line rose and the French Republic fell, or how the US stumbled but eventually won the Cold War, but more generally how democracies can benefit from both public consent and necessary national security secrets. At a time when the issue of institutional accountability and transparency has reached fever pitch, Democracy Declassified provides a grounded and important view on the connection between the role of secrecy in democratic governance and foreign policy-making.
|
You may like...
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
|