What are the factors that shape and determine the foreign policy choices of the United States? The Politics of United States Foreign Policy helps students consider the players, processes, and politics that drive US decisions and involvement in foreign policy. Blending substance, theory, and stimulating analysis, James Scott and Jerel Rosati emphasize that society, government, and global forces play a role in the struggle over competing values when it comes to foreign policymaking. The book discusses historical patterns, the president’s ability to influence both at home and abroad, and the tension between democracy and national security. The Eighth Edition has been updated to cover developments since the end of the Trump administration, the transition to the Biden administration, the challenges of changing international and domestic contexts, and the increasingly partisan political environment. It also incorporates key recent national and international developments, including the global pandemic, the Russian invasion of Ukraine, US global reengagement, and competition between the US and key rivals like China and Russia.
A former Marine judge advocate and legal counsel to General Colin Powell, James Terry explores the genesis of the United States approach to terror violence and the legal foundation for the nation’s response to the conflicts in Afghanistan and Iraq. Terry first reviews the entire spectrum of legal issues that arise before offering creative and practical legal and political solutions to counter terrorist activities. The author examines the development of rules of engagement and their application in the terrorist environment while differentiating the law of self-defense in this environment from more traditional conflicts. He also addresses the role of interrogation, and the line between harsh interrogation and torture, and the jurisdictional claims that arise. This volume examines a large number of topics related to the struggle and in a remarkably concise exploration, makes them understandable to experts in international law as well as those who do not have a strong background in the field. This text provides a serious but concise review of the legal issues in 20 interrelated chapters. All constitutional law scholars and political scientists will greatly benefit from reading this book. No other text offers such a comprehensive or detailed review of the issues arising from the war on terror.
Written by one of the best Criminological Ethnographers in the business, this text will serve as an invaluable and insightful resource for both novice and seasoned ethnographers of criminological issues." - Anthony Ellis, University of Salford In the first textbook to cover ethnography specific to criminology, James Treadwell guides readers through the ethnographic research process in full, starting with a background to criminological ethnography, through planning and doing an ethnographic project, and finally, the writing up and reporting stage. The book provides guidance for navigating key issues in ethnography, including access and researcher safety, and supports readers when carrying out their project with helpful exercises, questions and checklists. It also includes insightful case studies comprised of classic works and the author′s own ethnographic projects, along with a range of extra learning features including key terms, a glossary, and further reading suggestions. A valuable resource for anyone embarking on ethnographic research in criminology for the first time.
A thoroughly updated revision of the first comprehensive overview of intelligence designed for both the student and the general reader, "Silent Warfare" is an insider s guide to a shadowy, often misunderstood world. Leading intelligence scholars Abram N. Shulsky and Gary J. Schmitt clearly explain such topics as the principles of collection, analysis, counterintelligence, and covert action, and their interrelationship with policymakers and democratic values. This new edition takes account of the expanding literature in the field of intelligence and deals with the consequences for intelligence of vast recent changes in telecommunication and computer technology the new information age. It also reflects the world s strategic changes since the end of the Cold War. This landmark book provides a valuable framework for understanding today s headlines, as well as the many developments likely to come in the real world of the spy.
From the outbreak of the Cold War to the rise of the United States as the last remaining superpower, the years following World War II were filled with momentous events and rapid change. Diplomatically, economically, politically, and culturally, the United States became a major influence around the globe. On the domestic front, this period witnessed some of the most turbulent and prosperous years in American history. "Postwar America: An Encyclopedia of Social, Political, Cultural, and Economic History" provides detailed coverage of all the remarkable developments within the United States during this period, as well as their dramatic impact on the rest of the world. A-Z entries address specific persons, groups, concepts, events, geographical locations, organizations, and cultural and technological phenomena. Sidebars highlight primary source materials, items of special interest, statistical data, and other information; and Cultural Landmark entries chronologically detail the music, literature, arts, and cultural history of the era. Bibliographies covering literature from the postwar era and about the era are also included, as are illustrations and specialized indexes.
This collection of original essays on Virginia Woolf by leading scholars in the field opens up new debates on the work of one of the foremost modernists of the 20th century. The collection also looks at some of Woolf's own essays, discussing her theory of fiction and devotion to 'stream of consciousness' writing. Its thirteen contributors place this discussion of Woolf's artistic theory and practice within the context of her association with the Bloomsbury Group and her interest in spirituality, feminism, homosexuality, pacifism and psychoanalysis.
Front flap copy: Terrorists and insurgents, not foreign governments, now pose the greatest threat to America--and how to fight and defeat such "non-state" enemies is the single most urgent and vexing question confronting our military today. This timely book has some answers. Drawing on decades of experience with counterinsurgency--as a scholar, a strategist, and a military officer--James S. Corum brings unique insight to the problems we face. His book offers a deeply informed, closely reasoned and--most valuably--eminently sensible account of how circumstances and our actions (or inaction) have contributed to our present dilemma. With the lessons of recent history in clear view, Corum "lays out a workable strategy for meeting the often-overlapping threat raised by terrorist groups and insurgents. Critical to understanding the nature of modern-day warfare, Fighting the War on Terror" has broad implications for the future course of military, intelligence, and foreign policymaking. No one with an interest in the nation's security can afford to overlook it. Back flap copy: James S. Corum, PhD, is an associate professor at the U.S. Army Command and General Staff College in the Department of Joint and Multinational Operations at Fort Leavenworth, Kansas. He was recently a visiting fellow at Oxford University's All Souls College. While serving as a professor at the Air University, Corum developed and taught the course Terrorism and Small Wars. He is a member of the editorial boards of the Journal of Strategic Studies and Airpower Journal and the author of four books. A Lieutenant Colonel, Corum recently retired from the U.S. Army Reserve after six years of active duty and twenty-two years of reserve service, including duty in Iraq in 2004.
Special Operations Success establishes a new benchmark in military theory in this deeply analytic and innovative work. It answers several pressing questions: How successful have American special operations been over the past quarter-century? Are special forces fated to cycles of expansion and misuse? Will special forces invariably exceed the authorities granted to them because of they are? Is a general theory of special operations feasible given the range of activities and conditions that fall under the category? Kiras' work is based on two decades of practical, teaching, and consulting experience within different special operations communities, and its analysis and conclusions are designed to inform practitioners, policymakers, educators, and the general public. The book develops a framework, in the form of a theory comprising capabilities and control, for the comprehensively evaluating special operations success, and is divided into three parts: Part I lays the foundation for a general theory of special operations, Part II explores the two component parts of theory, capabilities and control, and Part III uses various aspects of the theory, depending on available information, to assess the success of special operations over a twenty-year period in the United Kingdom, South Africa, and the United States.
Here's the book you need to prepare for the challenging CISSP exam from (ISC)-2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides: Clear and concise information on critical security technologies and topics Practical examples and insights drawn from real-world experience Leading-edge exam preparation software, including a testing engine and electronic flashcards for your Palm You'll find authoritative coverage of key exam topics including: Access Control Systems & Methodology Applications & Systems Development Business Continuity Planning Cryptography Law, Investigation & Ethics Operations Security Physical Security Security Architecture & Models Security Management Practices Telecommunications, Network & Internet Security Note:CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.
This is the first volume in which an account of personal autonomy is developed that both captures the contours of this concept as it is used in social philosophy and bioethics, and is theoretically grounded in, and a part of, contemporary autonomy theory. James Stacey Taylor’s account is unique as it is explicitly a political one, recognizing that the attribution of autonomy to agents is dependent in part on their relationships with others and not merely upon their own mental states. The volume is distinctive in its examples, which touch on the ethics of using inducements to encourage persons to participate in medical research, the ethical issues associated with the use of antibiotics, and the ethical basis for both patient confidentiality and informed consent.
In this “gripping . . . spectacular piece of reporting” (Ken Burns), a Pulitzer Prize-winning journalist examines Senator Frank Church, the man at the center of numerous investigations into the abuses of power within the American government. For decades now, America’s national security state has grown ever bigger, ever more secretive and powerful, and ever more abusive. Only once did someone manage to put a stop to any of it. Senator Frank Church of Idaho was an unlikely hero. He led congressional opposition to the Vietnam War and had become a scathing, radical critic of what he saw as American imperialism around the world. But he was still politically ambitious, privately yearning for acceptance from the foreign policy establishment that he hated and eager to run for president. Despite his flaws, Church would show historic strength in his greatest moment, when in the wake of Watergate he was suddenly tasked with investigating abuses of power in the intelligence community. The dark truths that Church exposed—from assassination plots by the CIA, to links between the Kennedy dynasty and the mafia, to the surveillance of civil rights activists by the NSA and FBI—would shake the nation to its core, and forever change the way that Americans thought about not only their government but also their ability to hold it accountable. Drawing upon hundreds of interviews, thousands of pages of recently declassified documents, and reams of unpublished letters, notes, and memoirs, some of which remain sensitive today, Pulitzer Prize–winning reporter James Risen tells the gripping, untold story of truth and integrity standing against unchecked power—and winning—in The Last Honest Man. An instant New York Times bestseller
This text will provide a comprehensive overview of traditional and evolving theoretical models of family therapy and intervention techniques. The objective of this text is to enable a student to gain beginning proficiency as a family therapist along with understanding the impact of a client's race, ethnicity, religion, sexual orientation, disability, gender issues, age, socioeconomic status, disability, and differences from the “traditional” family on family assessment and intervention. The book has six goals, as follows: (1) acquaint students with the theoretical underpinnings of various approaches to assessing and intervening with families (2) assist students in understanding the similarities, differences and strategies of change among the major models of family therapy (3) introduce the student to the current available research on the effectiveness of different approaches to family intervention (4) help students assess family functioning from a life cycle perspective and make a valid plan, taking into account client's race, ethnicity, religion, sexual orientation, disability, gender issues, age, socioeconomic status, disability, and differences from the “traditional” family (5) help students develop techniques and strategies related to stages of the intervention in family therapy (6) enable the student to critique the appropriateness of the theoretical models and its intervention techniques according to family developmental factors as well as the particular needs of the family. Features: (1) Comprehensive coverage of familty therapy theory and research 2) Presentation of clinical process issues unique to family therapy (3) Inclusion of family live cycle and developement issues and the impact on family assessment and treatment planning (4) Interventions in diverse family structures (5) Interventions with special family issues such as substance abuse, domestic violence and poverty (6) An emphasis throughout on helping students to develop beginning competencies in family therapy practice (7) Numerous case examples
The Three Barons proves that it is possible (with enough research), to reconstruct the organizational chart of the JFK plot. This book provides the first useful, in-depth analysis of the 120 phone calls by LBJ in the week following the assassination regarding such items as the Civil Rights Act, demands made by the military and similar political power plays. The Three Barons presents the first use of statistical factor analysis to identify the plotters, using a database of 30 books and 1500 names and examines the military officers allegedly close to the plot, such as NATO Commander Gen. Lyman Lemnitzer, General Lauris Norstad, and JFK's advisor, Gen. Maxwell Taylor. For the first time, the National Security Council, its structure and its members, are scrutinized for their obvious role in the JFK plot. More specifically, The Three Barons explains the role of Treasury Secretary C. Douglas Dillon and his father, investment banker Clarence Dillon, who likely had fascist sympathies. This book identifies, for the first time, why there were three actual barons involved in the plot and why at least three members of the Warren Commission had powerful Nazi connections, beginning in WWII and continuing through November 22, 1963.
During the last few years there has been a rapidly increasing interest in neural modeling of brain and cognitive disorders. This multidisciplinary book presents a variety of such models in neurology, neuropsychology and psychiatry. A review of work in this area is given first. Computational models are then presented of memory impairment in Alzheimer's disease, functional brain reorganization following a stroke, patterns of neural activity in epilepsy, disruption of language processes in aphasia and acquired dyslexia, altered cognitive processes in schizophrenia and depression, and related disorders. This is the first book on this topic, with contributions from many of the leading researchers in this field.
Pronouncements such as “the avant-garde is dead,” argues James M. Harding, have suggested a unified history or theory of the avant-garde. His book examines the diversity and plurality of avant-garde gestures and expressions to suggest “avant-garde pluralities” and how an appreciation of these pluralities enables a more dynamic and increasingly global understanding of vanguardism in the performing arts. In pursuing this goal, the book not only surveys a wide variety of canonical and noncanonical examples of avant-garde performance, but also develops a range of theoretical paradigms that defend the haunting cultural and political significance of avant-garde expressions beyond what critics have presumed to be the death of the avant-garde. The Ghosts of the Avant-Garde(s) offers a strikingly new perspective not only on key controversies and debates within avant-garde studies but also on contemporary forms of avant-garde expression within a global political economy.
This book will further stimulate interest and discussion of the telephone and the Internet as a mode of treatment. In this extensively revised third edition, a practical framework for providing immediate problem-solving assistance by telephone to persons in crisis is provided. Several new chapters have been added and several chapters have been updated and rewritten. The text offers specific techniques to deal with out-of-control situations with the highly important initial steps to protect the caller, the crisis worker, and the community. The scope of the book includes an overview of counseling by telephone, how to effectively manage crises, how to be supportive verbally and nonverbally, how to accurately assess situations, and how to help create a sense of stability. Part I discusses the varieties of telephone services, while Part II covers crisis intervention and counseling, including telephone therapy, active listening, cognitive therapy approaches, transactional analysis and learned helplessness approaches, as well as Gestalt therapy approaches. Part III discusses a variety of problem callers: the obscene caller, the chronic caller, the silent caller, the nuisance caller, and the “one counselor” caller. A new section, Part IV—Special Topics, includes valuable information on dealing with adolescents, war veterans, rural communities, the elderly, and individuals with disabilities on campus. Part V offers a look at contact beyond the telephone, including crisis intervention by e-mail and letter. Part VI views the roles of telephone counselors, such as the mental health professional, the nonprofessional crisis worker, selecting telephone counselors, and training crisis workers. Finally, Part VII summarizes and evaluates today’s telephone counseling services. This unique and up-to-date book serves as a comprehensive tool for those setting up telephone and Internet counseling services and those in charge of centers already operating, especially in training and supervising those on the front lines, the crisis interveners.
The condition and characteristics of the black family have been subjects of intense debate since at least the 1960s, when the Moynihan Report and the culture of poverty theses held sway. Since then a consistent theme has been that black families are pathological. Despite the fact that research has been inconclusive and contradictory, political debate and policy have been strongly influenced by the pathology theme. This volume presents alternative approaches toward understanding the special characteristics of black families. Extending a special issue of The Review of Black Political Economy, the book focuses on the economic circumstances and decision making of these families, employing Interdisciplinary and cross-cultural perspectives. It examines the general responses of black families to various external factors such as economic systems, and to Internal factors such as interpersonal relationships. This compendium of current thinking and research will be of interest to professionals in a number of fields, Including family studies, counseling, social work, psychology, and sociology. It will be of practical use in training programs for service delivery systems Interested In Incorporating multicultural perspectives, as well as those specifically interested in black families today.
This groundbreaking book explores the relevance of queer theory to Translation Studies and of translation to Global Sexuality Studies. Beginning with a comprehensive overview of the origins and evolution of queer theory, this book places queer theory and Translation Studies in a productive and mutually interrogating relationship. After framing the discussion of actual and potential interfaces between queer sexuality and queer textuality, the chapters trace the transnational circulation of queer texts, focusing on the place of translation in "gay" anthologies, the packaging of queer life writing for global audiences, and the translation of lyric poetry as a distinct site of queer performativity. Baer analyzes fictional translators in literature and film, the treatment of translation in historical and ethnographic studies of sexual and linguistic others, the work of queer translators, and the reception of queer texts in translation. Including a range of case studies to exemplify key ethical issues relevant to all scholars of global sexuality and postcolonial studies, this book is essential reading for advanced students, scholars, and researchers in Translation Studies, gender and sexuality studies, and related areas.
Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. Using extensive downloadable examples, they teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers."--Jacket.
Under the direction of lead editors, Leiyu Shi and James A. Johnson, the Fourth Edition of Public Health Administration: Principles for Population-Based Management examines the many events, advances, and challenges in the United States and the world since the publication of the prior edition. With contributions from experts in areas ranging from workforce to community-based prevention to emergency preparedness, this timely and thorough revision offers detailed, comprehensive coverage of current, relevant issues for students as well as practicing public health administrators. This edition also addresses new perspectives of evidence-based public health, systems thinking, accountable care organizations, social entrepreneurship, integrated information management, disaster preparedness and response, and social media.
This work provides an authoritative survey of America's long and turbulent history of rebellions against laws and institutions of the state, ranging from violent acts of sedition and terrorism to acts of nonviolent civil disobedience against discriminatory or unjust laws. Crimes against the State is an evenhanded and illuminating one-stop resource for understanding acts of rebellion against legal authorities and institutions and the motivations/goals driving them. Special care is taken to differentiate between hostile acts and actors that seek to overthrow or otherwise damage the state and/or targeted demographic groups through violence (such "bad actors" as the January 6 Capitol mob and bombers of abortion clinics) and acts and actors that seek to defy, reform, or improve laws and institutions of the state through nonviolent action (such "good actors" as activists in the civil rights movement). Within these pages, readers will 1) learn how to differentiate between sedition, insurrection, treason, domestic terrorism, espionage, and other acts meant to injure or overthrow the government; 2) gain a deeper understanding of laws, policies, and events that have aroused violent or nonviolent opposition; 3) gain a deeper understanding of the perspectives and motivations of both good actors and bad actors; and 4) learn about state responses to these challenges and threats, from martial law–style crackdowns to new laws and reforms.
Arguing that postmodernism has so shifted current critical paradigms that Adorno's work can best be assessed in terms of its relevance in specific localized contexts, this book pursues a course that preserves Adorno's opposition to hegemonic programs but that is also wary of Adorno's own (negative) penchant for totalizing concepts. Unlike recent works which attempt to synthesize Adorno's writings into a comprehensive system that then becomes either the focus of an overriding critique or an object of appropriation, Harding orders his book as a collection of essays whose loose association questions the structural totality of Adorno's thought. Though together the essays cover all the major issues of Adorno's thought and offer a wide critical survey of his writings, the diversity of their focus avoids a systematic reduction of Adorno's work into a reproducible technique or method. The result of this strategy is a far more dynamic analysis of Adorno than a mere critical reconstruction of his ideas. By applying Adorno's theories to works by Samuel Beckett, T.S. Eliot, Ralph Ellison, and Amiri Baraka, the book pushes critical discussion of Adorno into cultural contexts that, while perhaps new for Adorno scholars, reach out to those whose knowledge of Adorno is limited. This book is a fine introduction to the subtleties of Adorno's writing and a genuine contribution to Adorno scholarship.
Harlequin® Intrigue brings you three new edge-of-your-seat romances for one great price, available now! Enjoy these suspenseful reads packed with edge-of-your-seat intrigue and fearless romance. NAVY SEAL NEWLYWED Covert Cowboys, Inc. by Elle James Posing as wealthy newlyweds, navy SEAL "Rip" Cord Schafer and Covert Cowboy operative Tracie Kosart work together to catch the traitors supplying American guns to terrorists. But when Tracie's cover is blown, can Rip save his "wife"—or will death do them part? THE GUARDIAN The Ranger Brigade by Cindi Myers Veteran Abby Stewart has no memory of rangers lieutenant Michael Dance, the para-rescuer who saved her life in Afghanistan. But when she stumbles over a body—and into his investigation—in the Rocky Mountains, can he save her from the dangerous smugglers stalking them both? SECURITY BREACH Bayou Bonne Chance by Mallory Kane Undercover Homeland Security agent Tristan DuChaud faked his death to protect his pregnant wife, Sandy, from terrorists. But when she catches him sneaking into their home to retrieve evidence, Tristan is forced to tell her the truth—or risk both their deaths becoming reality...
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.