0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (38)
  • R500+ (359)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Hardcover): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Hardcover)
Alan Tang
R3,119 Discovery Miles 31 190 Ships in 10 - 15 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Hardcover): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Hardcover)
Andrew Jenkinson
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,414 Discovery Miles 14 140 Ships in 10 - 15 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Practical Aviation Security - Predicting and Preventing Future Threats (Paperback, 3rd edition): Jeffrey Price, Jeffrey Forrest Practical Aviation Security - Predicting and Preventing Future Threats (Paperback, 3rd edition)
Jeffrey Price, Jeffrey Forrest
R2,374 R2,111 Discovery Miles 21 110 Save R263 (11%) Ships in 10 - 15 working days

Practical Aviation Security: Predicting and Preventing Future Threats, Third Edition is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today, as well as the cutting edge technologies that are shaping the future. This text equips readers working in airport security or other aviation management roles with the knowledge to implement effective security programs, meet international guidelines, and responsibly protect facilities or organizations of any size. Using case studies and practical security measures now in use at airports worldwide, readers learn the effective methods and the fundamental principles involved in designing and implementing a security system. The aviation security system is comprehensive and requires continual focus and attention to stay a step ahead of the next attack. Practical Aviation Security, Third Edition, helps prepare practitioners to enter the industry and helps seasoned professionals prepare for new threats and prevent new tragedies.

Hospitality Security - Managing Security in Today's Hotel, Nightlife, Entertainment, and Tourism Environment (Hardcover,... Hospitality Security - Managing Security in Today's Hotel, Nightlife, Entertainment, and Tourism Environment (Hardcover, 2nd edition)
Darrell Clifton
R4,254 Discovery Miles 42 540 Ships in 10 - 15 working days

Outlines risk assessments in which threats and vulnerabilities are calculated with probabilities to determine risk Presents how to establish a security plan, and, in this, how to determine the best deployment of various layers of control to mitigate risks Offers an overview of budgeting-determining, advocating for, and implementing the security program based on allotted funding Details how to document policies into a security manual, training manual, emergency procedures manual, and incident action plan Provides the ins and outs of staffing including scheduling, wages, deployment, and contract security Examines training best practices including physical security, emergency response and procedures, as well as specialized topics such as use of force and patrol procedures Explains prostitution and human trafficking, presenting sections with a focus on awareness and prevention

The Secret Life of the Lawman's Wife (Hardcover, Annotated edition): Barbara J. Alderman The Secret Life of the Lawman's Wife (Hardcover, Annotated edition)
Barbara J. Alderman
R2,805 R2,539 Discovery Miles 25 390 Save R266 (9%) Ships in 10 - 15 working days

The office of county sheriff has existed in America since 1634. Between 1800 and 1960, families of the sheriff lived in or near the jail. All family members, young and old, worked alongside the lawman to fulfill the required duties, without additional pay. The "mom and pop" jail was truly a family business. After the middle of the 20th century, fewer families carried on this tradition as counties modernized and jails became professionalized. During an era when many women concentrated on hearth and home, thousands of women quietly and without pay served in law enforcement. They organized, administered, presented reports to county commissioners, prepared for inspections, comforted victims, disciplined unruly inmates, fought with escapees, rode shotgun with their husbands as backup, and raised children, tended gardens, and kept house. They risked their lives every day and some paid the ultimate price. This is their story.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback)
Andrew Jenkinson
R954 Discovery Miles 9 540 Ships in 10 - 15 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition)
Nick Catrantzos
R1,830 Discovery Miles 18 300 Ships in 10 - 15 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Women in the Security Profession - A Practical Guide for Career Development (Paperback): Sandi J. Davies Women in the Security Profession - A Practical Guide for Career Development (Paperback)
Sandi J. Davies
R1,379 Discovery Miles 13 790 Ships in 10 - 15 working days

Women in the Security Profession: A Practical Guide for Career Development is a resource for women considering a career in security, or for those seeking to advance to its highest levels of management. It provides a historical perspective on how women have evolved in the industry, as well as providing real-world tips and insights on how they can help shape its future. The comprehensive text helps women navigate their security careers, providing information on the educational requirements necessary to secure the wide-ranging positions in today's security field. Women in the Security Profession describes available development opportunities, offering guidance from experienced women professionals who have risen through the ranks of different security sectors.

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover)
Shaun Aghili
R3,381 Discovery Miles 33 810 Ships in 10 - 15 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

Interviewing Vulnerable Suspects - Safeguarding the Process (Hardcover): Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee Interviewing Vulnerable Suspects - Safeguarding the Process (Hardcover)
Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee
R4,059 Discovery Miles 40 590 Ships in 10 - 15 working days

* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,126 Discovery Miles 11 260 Ships in 10 - 15 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

Zero Trust Journey Across the Digital Estate (Hardcover): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Hardcover)
Abbas Kudrati, Binil A. Pillai
R3,358 Discovery Miles 33 580 Ships in 18 - 22 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback)
Shaun Aghili
R1,196 Discovery Miles 11 960 Ships in 10 - 15 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

Supply Chain Security - How to Support Safety and Reduce Risk In Your Supply Chain Process (Hardcover): Andrzej Szymonik,... Supply Chain Security - How to Support Safety and Reduce Risk In Your Supply Chain Process (Hardcover)
Andrzej Szymonik, Robert Stanislawski
R4,511 Discovery Miles 45 110 Ships in 10 - 15 working days

Contemporary supply chains operate under the pressure of customer requirements, increasing price competition, sudden increases or decreases in demand, unforeseen obstacles and new threats. The right way to improve the functioning of the flow of material and accompanying information is not only the continuous collection of data but also their collection, analysis, inference and decision-making with the use of decision support systems, expert systems and artificial intelligence. Such procedures make it easier for logisticians not only to forecast processes but also to predict (forecast) and identify potential problems and facilitate the implementation of optimal modern solutions, paying attention to current trends in the supply chain market. An important issue that affects the quality, efficiency and availability (continuity) of the processes implemented within the supply chain is security. This is an area that is not clearly defined. This book uses theoretical and practical knowledge to define security in the supply chain as a state that gives a sense of certainty and guarantees the flow of material goods and services (in accordance with the 7w rule) as well as a smooth flow of information for the planning and management of logistics processes. Tools and instruments used to ensure the security of the supply chain contribute to the protection and survival in times of dangerous situations (threats) and adaptation to new conditions (susceptibility to unplanned situations). When analyzing the needs and structure of the 21st century supply chains, in the context of their security, it is impossible to ignore the problem of their digitization, which enables the determination of optimal routes and the anticipation of possible threats (crisis situations). Automatic data exchange between various departments of the company along the upper and lower part of the supply chain improves the functioning of the warehouse management through, among others, automation, robotization and pro-activity. It also contributes to efficient, good communication and market globalization. Automation also brings new, extremely attractive business models with regard to occupational safety, ergonomics and environmental protection. To meet the needs of creating modern supply chains, the book analyzes and presents current and future solutions that affect security and the continuity of supply chains.

Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover): Ishaani Priyadarshini, Chase Cotton Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover)
Ishaani Priyadarshini, Chase Cotton
R3,634 Discovery Miles 36 340 Ships in 10 - 15 working days

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well-its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

Tourism Security - Strategies for Effectively Managing Travel Risk and Safety (Paperback): Peter Tarlow Tourism Security - Strategies for Effectively Managing Travel Risk and Safety (Paperback)
Peter Tarlow
R1,097 Discovery Miles 10 970 Ships in 10 - 15 working days

Tourism security is an important part of both security management and tourism. Private security professionals and police departments in tourism cities, as well as hotels, major attractions, and theme parks, have all come to realize that tourism security and safety issues (often called tourism surety) are essential for industry survival and success. In Tourism Security, leading expert Peter Tarlow addresses a range of key issues in tourism safety and security. The book guides the reader through a study of tourism security themes and best practices. Topics include the relationship between tourism security and the economy, hotel and motel security, risk and crisis management, public places, transportation, and legal issues. The book also includes case studies of four popular tourist destinations. With each destination, an interview with a police or security representative is included-providing unique, in-depth insight to security concerns. Tourism Security is an invaluable resource for private security professionals, police departments that serve tourist destinations, and tourism professionals who work in hotels or convention centers, or at attractions, casinos, or events.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,814 Discovery Miles 18 140 Ships in 10 - 15 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

Cyber-Physical Systems in the Construction Sector (Hardcover): Wesam Salah Alaloul Cyber-Physical Systems in the Construction Sector (Hardcover)
Wesam Salah Alaloul
R4,631 Discovery Miles 46 310 Ships in 10 - 15 working days

Covers fundamental concepts and framework of CPS Reviews CPS and construction project management Reviews CPS applications in construction sector Covers CPS and IoT integrated network Reviews challenges and security aspects of construction CPS

Ransomware and Cybercrime (Paperback): Andrew Jenkinson Ransomware and Cybercrime (Paperback)
Andrew Jenkinson
R1,062 Discovery Miles 10 620 Ships in 10 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Zero Trust Journey Across the Digital Estate (Paperback): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Paperback)
Abbas Kudrati, Binil A. Pillai
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,499 Discovery Miles 34 990 Ships in 10 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback)
Mark Tarallo
R1,183 Discovery Miles 11 830 Ships in 10 - 15 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

Next-Generation Enterprise Security and Governance (Hardcover): Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland Next-Generation Enterprise Security and Governance (Hardcover)
Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland
R2,715 Discovery Miles 27 150 Ships in 10 - 15 working days

The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.

The Myth of International Order - Why Weak States Persist and Alternatives to the State Fade Away (Hardcover): Arjun Chowdhury The Myth of International Order - Why Weak States Persist and Alternatives to the State Fade Away (Hardcover)
Arjun Chowdhury
R3,275 Discovery Miles 32 750 Ships in 10 - 15 working days

In February of 2011, Libyan citizens rebelled against Muammar Qaddafi and quickly unseated him. The speed of the regime's collapse confounded many observers, and the ensuing civil war showed Foreign Policy's index of failed states to be deeply flawed-FP had, in 2010, identified 110 states as being more likely than Libya to descend into chaos. They were spectacularly wrong, but this points to a larger error in conventional foreign policy wisdom: failed, or weak and unstable, states are not anomalies but are instead in the majority. More states resemble Libya than Sweden. Why are most states weak and unstable? Taking as his launching point Charles Tilly's famous dictum that 'war made the state, and the state made war,' Arjun Chowdhury argues that the problem lies in our mistaken equation of democracy and economic power with stability. But major wars are the true source of stability: only the existential crisis that such wars produced could lead citizens to willingly sacrifice the resources that allowed the state to build the capacity it needed for survival. Developing states in the postcolonial era never experienced the demands major interstate war placed on European states, and hence citizens in those nations have been unwilling to sacrifice the resources that would build state capacity. For example, India and Mexico are established democracies with large economies. Despite their indices of stability, both countries are far from stable: there is an active Maoist insurgency in almost a quarter of India's districts, and Mexico is plagued by violence, drug trafficking, and high levels of corruption in local government. Nor are either effective at collecting revenue. As a consequence, they do not have the tax base necessary to perform the most fundamental tasks of modern states: controlling organized violence in a given territory and providing basic services to citizens. By this standard, the majority of states in the world-about two thirds-are weak states. Chowdury maintains that an accurate evaluation of international security requires a normative shift : the language of weakness and failure belies the fact that strong states are exceptions. Chowdhury believes that dismantling this norm is crucial, as it encourages developing states to pursue state-building via war, which is an extremely costly approach-in terms of human lives and capital. Moreover, in our era, such an approach is destined to fail because the total wars of the past are highly unlikely to occur today. Just as importantly, the non-state alternatives on offer are not viable alternatives. For better or worse, we will continue to live in a state-dominated world where most states are weak. Counterintuitive and sweeping in its coverage, The Myth of International Order demands that we fundamentally rethink foundational concepts of international politics like political stability and state failure.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Patriotic Information Systems
Todd Loendorf, G.David Garson Hardcover R2,595 Discovery Miles 25 950
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R592 R536 Discovery Miles 5 360
Machine See, Machine Do - How Technology…
Patrick K Lin Hardcover R683 R612 Discovery Miles 6 120
Model Security Policies, Plans and…
John Fay Paperback R1,675 Discovery Miles 16 750
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, … Hardcover R3,655 Discovery Miles 36 550
Risk Management for Security…
Carl Roper Hardcover R1,849 Discovery Miles 18 490
Fighting Fraud - How to Establish and…
Gerald L. Kovacich Paperback R1,130 Discovery Miles 11 300
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
Issues in Security Management - Thinking…
Robert Robinson Paperback R1,735 Discovery Miles 17 350
Gender and Private Security in Global…
Maya Eichler Hardcover R3,575 Discovery Miles 35 750

 

Partners