China's Search for Security


Book Description

Despite its impressive size and population, economic vitality, and drive to upgrade its military, China remains a vulnerable nation surrounded by powerful rivals and potential foes. Understanding ChinaÕs foreign policy means fully appreciating these geostrategic challenges, which persist even as the country gains increasing influence over its neighbors. Andrew J. Nathan and Andrew Scobell analyze ChinaÕs security concerns on four fronts: at home, with its immediate neighbors, in surrounding regional systems, and in the world beyond Asia. By illuminating the issues driving Chinese policy, they offer a new perspective on the countryÕs rise and a strategy for balancing Chinese and American interests in Asia. Though rooted in the present, Nathan and ScobellÕs study makes ample use of the past, reaching back into history to illuminate the people and institutions shaping Chinese strategy today. They also examine Chinese views of the United States; explain why China is so concerned about Japan; and uncover ChinaÕs interests in such problematic countries as North Korea, Iran, and the Sudan. The authors probe recent troubles in Tibet and Xinjiang and explore their links to forces beyond ChinaÕs borders. They consider the tactics deployed by mainland China and Taiwan, as Taiwan seeks to maintain autonomy in the face of Chinese advances toward unification. They evaluate the strengths and weaknesses of ChinaÕs three main power resourcesÑeconomic power, military power, and soft power. The authors conclude with recommendations for the United States as it seeks to manage ChinaÕs rise. Chinese policymakers understand that their nationÕs prosperity, stability, and security depend on cooperation with the United States. If handled wisely, the authors believe, relations between the two countries can produce mutually beneficial outcomes for both Asia and the world.




Securitizing Islam


Book Description

Securitizing Islam shows how views of Muslims have changed in Britain since 9/11, following debates over terrorism, identity and multiculturalism.




The Great Wall and the Empty Fortress


Book Description

Many see China and the United States on the path to confrontation. The Chinese leadership violates human rights norms. It maintains a harsh rule in Tibet, spars aggressively with Taiwan, and is clamping down on Hong Kong. A rising power with enormous assets, China increasingly considers American interests an obstacle to its own.But, the authors argue, the United States is the least of China's problems. Despite its sheer size, economic vitality, and drive to upgrade its military forces, China remains a vulnerable power, crowded on all sides by powerful rivals and potential foes. As it has throughout its history, China faces immense security challenges, and their sources are at and within China's own borders. China's foreign policy is calibrated to defend its territorial integrity against antagonists who are numerous, near, and strong.The authors trace the implications of this central point for China's relations with the United States and the rest of the world.




Southeast Asia and the Rise of China


Book Description

Since the early 1990s and the end of the Cold War, the implications of China's rising power have come to dominate the security agenda of the Asia-Pacific region. This book is the first to comprehensively chart the development of Southeast Asia’s relations with the People’s Republic of China (PRC) from 1949 to 2010, detailing each of the eleven countries’ ties to the PRC and showing how strategic concerns associated with China's regional posture have been a significant factor in shaping their foreign and defence policies. In addition to assessing bilateral ties, the book also examines the institutionalization of relations between the Association of Southeast Asian Nations (ASEAN) and China. The first part of the book covers the period 1949-2010: it examines Southeast Asian responses to the PRC in the context of the ideological and geopolitical rivalry of the Cold War; Southeast Asian countries’ policies towards the PRC in first decade of the post-Cold War era; and deepening ties between the ASEAN states and the PRC in the first decade of the twenty-first century. Part Two analyses the evolving relationships between the countries of mainland Southeast Asia - Vietnam, Thailand, Myanmar, Laos and Cambodia - and China. Part Three reviews ties between the states of maritime Southeast Asia - Indonesia, Malaysia, Singapore, the Philippines, Brunei and East Timor - and the PRC. Whilst the primary focus of the book is the security dimension of Southeast Asia-China relations, it also takes full account of political relations and the burgeoning economic ties between the two sides. This book is a timely contribution to the literature on the fast changing geopolitics of the Asia-Pacific region.




The Search for Security in Post-Taliban Afghanistan


Book Description

By the middle of 2007, Afghans had become increasingly disillusioned with a state-building process that had failed to deliver the peace dividend that they were promised. For many Afghans, the most noticeable change in their lives since the fall of the Taliban has been an acute deterioration in security conditions. Whether it is predatory warlords, the Taliban-led insurgency, the burgeoning narcotics trade or general criminality, the threats to the security and stability of Afghanistan are manifold. The response to those threats, both in terms of the international military intervention and the donor-supported process to rebuild the security architecture of the Afghan state, known as security-sector reform (SSR), has been largely insufficient to address the task at hand. NATO has struggled to find the troops and equipment it requires to complete its Afghan mission and the SSR process, from its outset, has been severely under-resourced and poorly directed. Compounding these problems, rampant corruption and factionalism in the Afghan government, particularly in the security institutions, have served as major impediments to reform and a driver of insecurity. This paper charts the evolution of the security environment in Afghanistan since the fall of the Taliban, assessing both the causes of insecurity and the responses to them. Through this analysis, it offers some suggestions on how to tackle Afghanistan’s growing security crisis.







Global Security in the Twenty-first Century


Book Description

This second edition of Global Security in the Twenty-first Century offers a thoroughly updated and balanced introduction to contemporary security studies. Sean Kay examines the relationship between globalization and international security and places traditional quests for power and national security in the context of the ongoing search for peace. Sean Kay explores a range of security challenges, including fresh analysis of the implications of the global economic crisis and current flashpoints for international security trends. Writing in an engaging style, Kay integrates traditional and emerging challenges in one easily accessible study that gives readers the tools they need to develop a thoughtful and nuanced understanding of global security.




Schneier on Security


Book Description

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level -- business, technical, or personal.




Japan Prepares for Total War


Book Description

The roots of Japan's aggressive, expansionist foreign policy have often been traced to its concern over acute economic vulnerability. Michael A. Barnhart tests this assumption by examining the events leading up to World War II in the context of Japan's quest for economic security, drawing on a wide array of Japanese and American sources.Barnhart focuses on the critical years from 1938 to 1941 as he investigates the development of Japan's drive for national economic self-sufficiency and independence and the way in which this drive shaped its internal and external policies. He also explores American economic pressure on Tokyo and assesses its impact on Japan's foreign policy and domestic economy. He concludes that Japan's internal political dynamics, especially the bitter rivalry between its army and navy, played a far greater role in propelling the nation into war with the United States than did its economic condition or even pressure from Washington. Japan Prepares for Total War sheds new light on prewar Japan and confirms the opinions of those in Washington who advocated economic pressure against Japan.




Foundations of Information Security


Book Description

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing. Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. You'll also learn the basics of topics like: Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates The laws and regulations that protect systems and data Anti-malware tools, firewalls, and intrusion detection systems Vulnerabilities such as buffer overflows and race conditions A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.