Within this Book Full site

Metrics

Views
4.3k+

Filter my results

ISBN of the Book

Material or Process Book or Chapter Title Author or Editor Publication dates

The Routledge Handbook of Security Studies

Edited by: Myriam Dunn Cavelty , Victor Mauer

Print publication date:  November  2009
Online publication date:  December  2009

Print ISBN: 9780415463614
eBook ISBN: 9780203866764
Adobe ISBN: 9781135239077

10.4324/9780203866764
 Cite  Marc Record

Book description

Focusing on contemporary challenges, this major new Handbook offers a wide-ranging collection of cutting-edge essays from leading scholars in the field of Security Studies.

The field of Security Studies has undergone significant change during the past twenty years, and is now one of the most dynamic sub-disciplines within International Relations. It now encompasses issues ranging from pandemics and environmental degradation to more traditional concerns about direct violence, such as those posed by international terrorism and inter-state armed conflict. A comprehensive volume, comprising articles by both established and up-and-coming scholars, the Handbook of Security Studies identifies the key contemporary topics of research and debate today.

This Handbook is a benchmark publication with major importance both for current research and the future  of the field. It will be essential reading for all scholars and students of Security Studies, War and Conflict Studies, and International Relations.

Table of contents

Prelims Download PDF
Chapter  1:  Realism and security studies Download PDF
Chapter  2:  Liberalism Download PDF
Chapter  3:  The English school and international security Download PDF
Chapter  4:  Critical security studies Download PDF
Chapter  5:  Constructivism and securitization studies Download PDF
Chapter  6:  Post-structuralism, continental philosophy and the remaking of security studies Download PDF
Chapter  7:  Feminist security studies Download PDF
Chapter  8:  National security, culture and identity Download PDF
Chapter  9:  Societal security Download PDF
Chapter  10:  Human security and diplomacy Download PDF
Chapter  11:  Terrorism Download PDF
Chapter  12:  Weapons of mass destruction and the proliferation challenge Download PDF
Chapter  13:  Organized crime, drug trafficking and trafficking in women Download PDF
Chapter  14:  State failure and state building Download PDF
Chapter  15:  Migration and security Download PDF
Chapter  16:  Cyber-threats Download PDF
Chapter  17:  Old and new wars Download PDF
Chapter  18:  The privatization of international security Download PDF
Chapter  19:  Energy security Download PDF
Chapter  20:  Resources, the environment and conflict  Download PDF
Chapter  21:  Emerging dangers of biological weapons Download PDF
Chapter  22:  Security and health in the twenty-first century Download PDF
Chapter  23:  China’s rise Download PDF
Chapter  24:  The Korean peninsula Download PDF
Chapter  25:  Indian security policy Download PDF
Chapter  26:  Pakistan’s security predicament Download PDF
Chapter  27:  Afghanistan Download PDF
Chapter  28:  The Middle East as a crisis region Download PDF
Chapter  29:  Iran’s nuclear challenge  Download PDF
Chapter  30:  Intervention in Iraq Download PDF
Chapter  31:  The Israeli–Palestinian conflict Download PDF
Chapter  32:  Russia’s revival Download PDF
Chapter  33:  The Western Balkans Download PDF
Chapter  34:  The European Union Download PDF
Chapter  35:  Alliances Download PDF
Chapter  36:  Deterrence Download PDF
Chapter  37:  Coercive diplomacy Download PDF
Chapter  38:  Peace operations Download PDF
Chapter  39:  Humanitarian intervention Download PDF
Chapter  40:  Global governance Download PDF
Chapter  41:  The study of crisis management Download PDF
Bibliography_Selected_Readings Download PDF
Index Download PDF
Search for more...

Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.