Read Homeland book online. Homeland by Cory Doctorow, the book is categorize as Young Adult Fiction book. Read More »
BOOK OVERVIEWS: In Cory Doctorow's wildly successful Little Brother, young Marcus Yallow was arbitrarily detained and brutalized by the government in the wake of a terrorist attack on San Francisco—an experience that led him to become a leader of the whole movement of technologically clued-in teenagers, fighting back against the tyrannical security state. A few years later, California's economy collapses, but Marcus's hacktivist past lands him a job as webmaster for a crusading politician who promises reform. Soon his former nemesis Masha emerges from the political underground to gift him with a thumbdrive containing a Wikileaks-style cable-dump of hard evidence of corporate and governmental perfidy. It's incendiary stuff—and if Masha goes missing, Marcus is supposed to release it to the world. Then Marcus sees Masha being kidnapped by the same government agents who detained and tortured Marcus years earlier. Marcus can leak the archive Masha gave him—but he can't admit to being the leaker, because that will cost his employer the election. He's surrounded by friends who remember what he did a few years ago and regard him as a hacker hero. He can't even attend a demonstration without being dragged onstage and handed a mike. He's not at all sure that just dumping the archive onto the Internet, before he's gone through its millions of words, is the right thing to do. Meanwhile, people are beginning to shadow him, people who look like they're used to inflicting pain until they get the answers they want. Fast-moving, passionate, and as current as next week, Homeland is every bit the equal of Little Brother—a paean to activism, to courage, to the drive to make the world a better place. At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.
Read The Role of Law Enforcement in Emergency Management and Homeland Security book online. The Role of Law Enforcement in Emergency Management and Homeland Security by Mark R. Landahl,Tonya E. Thornton, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: This book examines the role and involvement of law enforcement agencies across the spectrum of homeland security and emergency management. Contributions from expert practitioners and academics are organized around the mission areas of mitigation/protection, prevention, preparedness, response and recovery.
Read Homeland book online. Homeland by R.A. Salvatore, the book is categorize as Fiction book. Read More »
BOOK OVERVIEWS: Drow ranger Drizzt Do’Urden, first introduced in The Icewind Dale Trilogy, quickly became one of the fantasy genre’s standout characters. But Homeland first reveals the startling tale of how this one lone drow walked out of the shadowy depths of the Underdark, leaving behind a society of evil and a family who want him dead. It is here that the story of this amazing dark elf truly began.
Read Foundations of Homeland Security book online. Foundations of Homeland Security by Martin J. Alperen, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: The Complete Guide to Understanding the Structure of Homeland Security Law New topics featuring leading authors cover topics on Security Threats of Separatism, Secession and Rightwing Extremism; Aviation Industry’s 'Crew Resource Management' Principles'; and Ethics, Legal, and Social Issues in Homeland Security Legal, and Social Issues in Homeland Security. In addition, the chapter devoted to the Trans-Pacific Partnership is a description of economic statecraft, what we really gain from the TPP, and what we stand to lose. The Power of Pop Culture in the Hands of ISIS describes how ISIS communicates and how pop culture is used expertly as a recruiting tool Text organized by subject with the portions of all the laws related to that particular subject in one chapter, making it easier to reference a specific statute by topic Allows the reader to recognize that homeland security involves many specialties and to view homeland security expansively and in the long-term Includes many references as a resource for professionals in various fields including: military, government, first responders, lawyers, and students Includes an Instructor Manual providing teaching suggestions, discussion questions, true/false questions, and essay questions along with the answers to all of these
Read Homeland Security Cultures book online. Homeland Security Cultures by Alexander Siedschlag,Andrea Jerkovic, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: Focusing on this broader security culture framework of analysis, this text uses a comprehensive approach to explore cultural factors empirically and pragmatically as they affect threat environment and assessment along core missions, organizational responses, and the aim of fostering safe and secure societies.
Read Homeland Security book online. Homeland Security by Charles P. Nemeth, the book is categorize as Computers book. Read More »
BOOK OVERVIEWS: Homeland security is a massive enterprise that gets larger by the moment. What was once mostly a TSA/aviation concern has evolved into a multidimensional operation covering a broad array of disciplines. These include critical infrastructure protection, border security, transportation security, intelligence and counterterrorism, emergency management, immigration and naturalization, and public health. Homeland Security: An Introduction to Principles and Practice, Second Edition provides students and practitioners alike with the latest developments on the makeup, organization, and strategic mission of the Department of Homeland Security (DHS). This new edition is fully updated with new laws, regulations, and strategies that reflect changes and developments over the last several years. The book offers unique insights into the various roles of multi-jurisdictional agencies and stakeholders at all levels of government—including law enforcement, the military, the intelligence community, emergency managers, and the private sector. Coverage includes: The history of security threats in the American experience, the events leading up to 9/11, and the formation and evolution of the DHS The legal basis and foundation for the DHS The nature of risk and threat Training and preparatory exercises for homeland security professionals How states and localities can work compatibly with federal policy makers Federal Emergency Management Agency (FEMA) in both the pre- and post-9/11 and post-Katrina world The agencies and entities entrusted with intelligence analysis Issues surrounding border security, immigration, and U.S. citizenship Homeland security practice in the airline, maritime, and mass transit industries—including national, regional, and local rail systems The interplay between public health and homeland security Each chapter contains extensive pedagogy, including learning objectives, informative sidebars, chapter summaries, end-of-chapter questions, web links, and references to aid in comprehension and retention. Homeland Security: An Introduction to Principles and Practice, Second Edition is the only book to provide an objective, balanced perspective on each of the core components that comprise the DHS’s mission and the priorities and challenges that federal and state government agencies continue to face.
Author : Ronald R. Sims,William I. Sauser,Sheri K. Bias
ISBN : 1681234572
Publisher : IAP
Number of Pages : 423
Readers : 5944
Read Transforming Government Organizations book online. Transforming Government Organizations by Ronald R. Sims,William I. Sauser,Sheri K. Bias, the book is categorize as Business & Economics book. Read More »
BOOK OVERVIEWS: In 2010 IAP released Change (Transformation) in Government Organizations, edited by Ronald R. Sims. This well-received volume described how organizational change methods can be used effectively to make government organizations more effective and efficient and better equipped to serve a demanding citizenry. The 2010 book brought together contributions by managers, practitioners, academics, and consultants in the study of international, federal, state, and local government efforts to respond to increased calls for change (transformation) in public sector organizations. Since the release of the 2010 volume, calls for government transformation have continued and intensified, and a number of fresh ideas and examples have been generated from the field. The time is now ripe for a follow-up volume laying out innovative, successful ideas for transforming government. Transforming Government Organizations: Fresh Ideas and Examples from the Field is that follow-up volume. A collection of fresh contributions such as those included in this book will add to the growing knowledge base of what does—and what does not—work when transformation efforts are attempted in government organizations. The contributors to this new volume are experts with extensive experience as change agents in government and other organizations. They provide analyses and discussions of specific cases and issues as well as practical tools, ideas, and lessons learned intended to guide those responsible for similar efforts in the years to come. The audience for the book are government managers, scholars, and others interested in undertaking or learning about such efforts.
Read National Infrastructure Advisory Council Intelligence Information Sharing Final Report and Recommendations book online. National Infrastructure Advisory Council Intelligence Information Sharing Final Report and Recommendations by Not Available, the book is categorize as Books book. Read More »
BOOK OVERVIEWS: Executive Summary The National Infrastructure Advisory Council (NIAC) set out to determine whether the right people are receiving the right intelligence information at the right time to support robust protection and resilience of the Nation’s critical infrastructure. More than 200 interviews and extensive open-source research uncovered a wealth of insights on this complex problem. First, there have been marked improvements in the sharing of intelligence information within the Federal Intelligence Community, and between the Federal Government and regions, States, and municipalities. However, this level of improvement has not been matched in the sharing of intelligence information between the Federal Government and private sector owners and operators of critical infrastructure. Despite some notable successes, this bi-directional sharing is still relatively immature, leaving a large gap between current practices and an optimal system of effective public-private intelligence information sharing. We observe that trust is the essential glue to make this public-private system work. Trust results when partner capabilities are understood and valued, processes are tailored to leverage these capabilities, and these processes are tested and proven valuable to all partners. When breakdowns in information sharing occur, it erodes trust and is counterproductive to risk management. Information sharing is perhaps the most important factor in the protection and resilience of critical infrastructure. Information on threats to infrastructure and their likely impact underlies nearly every security decision made by owners and operators, including which assets to protect, how to make operations more resilient, how to plan for potential disasters, when to ramp up to higher levels of security, and how to respond in the immediate aftermath of a disaster. We looked at intelligence information flowing from the Federal Government to critical infrastructure owners and operators as well as risk information flowing from critical infrastructure owners and operators to the government. Our study reveals the complex ways information is gathered, analyzed, packaged, and shared among government and the owners and operators of critical infrastructures. In tackling this complex subject, we examined the different stages of the intelligence cycle, including requirements generation, information collection, analysis, and dissemination. To gather a variety of perspectives, we conducted extensive interviews with security directors, chief executives, subject matter experts, and government executives and managers. Recognizing that distinct sector characteristics shape information sharing needs, we conducted case studies of five sectors: Commercial Facilities, Healthcare and Public Health, Energy (Oil and Natural Gas), Banking and Finance, and Chemical. While we found some information sharing approaches to be effective, others were not. As a result, we adopted a “capability maturity approach,” which acknowledges that different Federal agencies have different abilities to share information effectively, and we sought to build on what is working.
Author : Diana J. Mason,Adrianna Perez,Monica R. McLemore,Elizabeth Dickson
ISBN : 0323597955
Publisher : Elsevier Health Sciences
Number of Pages : 680
Readers : 8597
Read Policy & Politics in Nursing and Health Care - E-Book book online. Policy & Politics in Nursing and Health Care - E-Book by Diana J. Mason,Adrianna Perez,Monica R. McLemore,Elizabeth Dickson, the book is categorize as Medical book. Read More »
BOOK OVERVIEWS: Learn how to influence policy and become a leader in today's changing health care environment. Featuring analysis of cutting-edge healthcare issues and first-person insights, Policy & Politics in Nursing and Health Care, 8th Edition continues to be the leading text on nursing action and activism. Approximately 150 expert contributors present a wide range of topics in policies and politics, providing a more complete background than can be found in any other policy textbook on the market. This expanded 8th edition helps you develop a global understanding of nursing leadership and political activism, as well as the complex business and financial issues that drive many actions in the health system. Discussions include the latest updates on conflict management, health economics, lobbying, the use of media, and working with communities for change. With these innovative insights and strategies, you will be prepared to play a leadership role in the four spheres in which nurses are politically active: the workplace, government, professional organizations, and the community. Comprehensive coverage of healthcare policies and politics provides a broader understanding of nursing leadership and political activism, as well as complex business and financial issues. Key Points at the end of chapters helps you review important, need-to-know lesson content. Taking Action essays include personal accounts of how nurses have participated in politics and what they have accomplished. Expert authors make up a virtual Nursing Who's Who in healthcare policy, sharing information and personal perspectives gained in the crafting of healthcare policy. NEW! The latest information and perspectives are provided by nursing leaders who influenced health care reform, including the Affordable Care Act. NEW! Added information on medical marijuana presents both sides of this ongoing debate. NEW! More information on health care policy and the aging population covers the most up-do-date information on this growing population. NEW! Expanded information on the Globalization of Nursing explores international policies and procedures related to nursing around the world. NEW! Expanded focus on media strategies details proper etiquette when speaking with the press. NEW! Expanded coverage of primary care models and issues throughout text. NEW! APRN and additional Taking Action chapters reflect the most recent industry changes. NEW! Perspectives on issues and challenges in the government sphere showcase recent strategies and complications.
Read State of Recovery book online. State of Recovery by Barry Scott Zellen, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: In the decade that followed 9/11, technologies and technology policies became central to homeland security. For example, the U.S. erected new border defenses with remote sensors and biometric scanners, and deployed new autonomous air warfare capabilities, such as the drone program. Looking at efforts to restore security after 9/11, the work examines issues such as the rise in technology spending, the various scenarios of mass terror, and America's effort to ensure that future engagements will take place far from the homeland. Operation Iraqi Freedom, Iran's emergence as nuclear threat, and North Korea's acceleration of its missile program are analyzed along with the "axis of evil" and America's effort to create a ballistic missile shield to thwart this emerging threat to its security. By focusing on the technologies of homeland security rather than on cyber warfare itself, the work offers a unique and needed survey that will appeal to anyone involved with the study and development of homeland and strategic security.
Read Understanding Homeland Security book online. Understanding Homeland Security by Gus Martin, the book is categorize as Social Science book. Read More »
BOOK OVERVIEWS: Gus Martin’s Understanding Homeland Security provides students with a comprehensive introduction to U.S. homeland security in the modern world, with a focus on the post-September 11, 2001 era. This insightful resource examines the theories, agency missions, laws, and regulations governing the homeland security enterprise through the lens of threat scenarios and countermeasures related to terrorism, natural disasters, emergency management, cyber security, and much more. The Third Edition keeps readers on the forefront of homeland security with coverage of cutting-edge topics, such as the role of FEMA and preparedness planning; the role of civil liberty and countering extremism through reform; and hackings during the 2016 and 2018 U.S. elections. Readers will gain much-needed insight into the complex nature of issues surrounding today’s homeland security and learn to think critically to analyze and respond to various threat environments. INSTRUCTORS: Understanding Homeland Security is accompanied by SAGE edge for instructors and students, which includes access to SAGE Premium Video! Learn More
Read Top Ten Global Justice Law Review Articles 2007 book online. Top Ten Global Justice Law Review Articles 2007 by Amos N Guiora, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: Top Ten Global Justice Law Review Articles 2007 is a thorough and accessible review of the most salient, the most controversial, and the most illuminating essays on security law in the previous calendar year. In this edition, Professor Amos Guiora presents the ten most vital and pertinent law review articles from 2007 written by both scholars who have already gained international prominence as experts in security law as well as emerging voices in the security-law debate. These articles deal with issues of terrorism, security law, and the preservation of civil liberties in the post-9/11 world. The chosen selections derive not just from the high quality and expertise of the articles' authors, but equally from the wide diversity of legal issues addressed by those authors. Guiora combines the expertise of scholars from such accredited institutions as Harvard, Stanford, the U.S Military Academy and the U.S. Department of Defense to provide a valuable resource for scholars and experts researching this important subject area. This annual review provides researchers with more than just an authoritative discussion on the most prominent security debates of the day; it also educates researchers on new issues that have received far too little attention in the press and in academia. These expert scholars and leaders tackle and give voice to these issues that range from cyberterror to detention of suspected terrorists to France's tightening of its civil liberties policy to new restrictions on religious philanthropy and beyond. Together, the vast knowledge and independent viewpoints represented by these ten authors make this volume, of what will be an annual review within the Terrorism, 2nd Series, a valuable resource for individuals new to the realm of security law and for advanced researchers with a sophisticated understanding of the field. Top Ten Global Justice Law Review Articles 2007 serves as a one-stop guidebook on how both the U.S. and the world generally are currently waging the war on terror.
Read Terrorism and Homeland Security book online. Terrorism and Homeland Security by Philip Purpura, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive introduction to the problem of terrorism and to its solution, Homeland Security. In addition to its extensive treatment of terrorism, the book describes public and private sector counterterrorism as well as all hazards emergency management. It presents national, state, and local perspectives and up-to-date information, including the reorganization of the Department of Homeland Security, the renewed Patriot Act, and intelligence reform. This book covers a wide range of issues, including such topics as the effectiveness of terrorism; weapons of mass destruction; privatization of counterterrorism; and wars of globalization. Learning objectives and key terms outline chapter content and highlight important topics. Scenarios are placed at the beginning of each chapter to explain concepts and relate theory to practice. The book includes Reality Check sections and critical thinking boxes to help the reader to formulate alternative perspectives on issues and events in order to seek creative and improved solutions to problems. At the end of each chapter are discussion questions that reinforce content and provide an opportunity for the reader to review, synthesize, and debate the key issues; applications that use assessment center and red team techniques to help the student develop analytical and decision-making skills in the context of understanding the mindset and planning processes of terrorist; and web links that provide direction for additional resources, information, and research. This book's primary market are students attending community college homeland security programs, as well as state, federal, and private security training programs. Its secondary market are professionals of the Department of Homeland Security and security professionals belonging to ASIS. Learning objectives and key terms outline chapter content and highlight important topics. Scenarios are placed at the beginning of each chapter to explain concepts and relate theory to practice. "Reality Check" sections and critical thinking boxes help the reader to formulate alternative perspectives on issues and events in order to seek creative and improved solutions to problems. Discussion questions at the end of each chapter reinforce content and provide an opportunity for the reader to review, synthesize, and debate the key issues. Web links at the end of each chapter provide direction for additional resources, information, and research.
Author : OECD,European Union Intellectual Property Office
ISBN : 9264307850
Publisher : OECD Publishing
Number of Pages : 88
Readers : 6884
Read Illicit Trade Misuse of Small Parcels for Trade in Counterfeit Goods Facts and Trends book online. Illicit Trade Misuse of Small Parcels for Trade in Counterfeit Goods Facts and Trends by OECD,European Union Intellectual Property Office, the book is categorize as Books book. Read More »
BOOK OVERVIEWS: This study examines the potential for the misuse of small parcels for trade in counterfeit and pirated goods. It presents the legal and economic contexts of the operation of express and postal services. It also looks at the available data on volumes of small consignments, via postal and courier ...
Read Rewired book online. Rewired by Ryan Ellis,Vivek Mohan, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: Examines the governance challenges of cybersecurity through twelve, real-world case studies Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world. Rewired: Cybersecurity Governance places great emphasis on the interconnection of law, policy, and technology in cyberspace. It examines some of the competing organizational efforts and institutions that are attempting to secure cyberspace and considers the broader implications of the in-place and unfolding efforts—tracing how different notions of cybersecurity are deployed and built into stable routines and practices. Ultimately, the book explores the core tensions that sit at the center of cybersecurity efforts, highlighting the ways in which debates about cybersecurity are often inevitably about much more. Introduces the legal and policy dimensions of cybersecurity Collects contributions from an international collection of scholars and practitioners Provides a detailed "map" of the emerging cybersecurity ecosystem, covering the role that corporations, policymakers, and technologists play Uses accessible case studies to provide a non-technical description of key terms and technologies Rewired: Cybersecurity Governance is an excellent guide for all policymakers, corporate leaders, academics, students, and IT professionals responding to and engaging with ongoing cybersecurity challenges.
Read Homeland Elegies book online. Homeland Elegies by Ayad Akhtar, the book is categorize as Fiction book. Read More »
BOOK OVERVIEWS: A "profound and provocative" new work by the Pulitzer Prize-winning author of Disgraced and American Dervish: an immigrant father and his son search for belonging—in post-Trump America, and with each other (Kirkus Reviews). One of the New York Times 10 Best Books of the Year One of Barack Obama's Favorite Books of 2020 Finalist for the 2021 Andrew Carnegie Medal for Excellence in Fiction A Best Book of 2020 * Washington Post * O Magazine * New York Times Book Review * Publishers Weekly "Passionate, disturbing, unputdownable." —Salman Rushdie A deeply personal work about identity and belonging in a nation coming apart at the seams, Homeland Elegies blends fact and fiction to tell an epic story of longing and dispossession in the world that 9/11 made. Part family drama, part social essay, part picaresque novel, at its heart it is the story of a father, a son, and the country they both call home. Ayad Akhtar forges a new narrative voice to capture a country in which debt has ruined countless lives and the gods of finance rule, where immigrants live in fear, and where the nation's unhealed wounds wreak havoc around the world. Akhtar attempts to make sense of it all through the lens of a story about one family, from a heartland town in America to palatial suites in Central Europe to guerrilla lookouts in the mountains of Afghanistan, and spares no one—least of all himself—in the process.
Read National Solutions to Trans-Border Problems? book online. National Solutions to Trans-Border Problems? by Isidro Morales, the book is categorize as Business & Economics book. Read More »
BOOK OVERVIEWS: 'Triggered by the North American Free Trade Agreement (NAFTA), Canada, the United States and Mexico redefined their public policies to facilitate the regionalization of transactions. However, this volume addresses the institutional gaps that still remain focusing mainly on the cross-border governance of security aspects. It gathers interdisciplinary contributions of specialists working on continental issues within Canada, the United States and Mexico and highlights the transnational dimension of certain issues still managed under national-framed policies. Furthermore, it explores the possibilities and constraints for moving public policy into new cross-border governance strategies. Divided in three parts, the first part assesses what is at stake in cross-border governance issues and whether the integrative trend in the region will be maintained or stalled in the years to come. The second part explores the growing scope of security problems interconnected with borders, migration, energy and drug trafficking across the region. It highlights how Mexico and Canada are responding or adapting their policy choices to a continental security approach framed by the US after the terrorist attacks of September 11, and to the major concerns of the Obama administration. The third part focuses on the governance of territorial borders and bilateral affairs, i.e. Mexico-US and Canada-Mexico relations.
Read Justice on the Job book online. Justice on the Job by Richard N. Block, the book is categorize as Business & Economics book. Read More »
BOOK OVERVIEWS: The freedom to form a union has been formally recognized as a basic human right by the UnitedNations and its member states since the Universal Declaration of Human Rights was ratified in1948 (United Nations 1948). Yet in the United States today, the freedom to form unions andbargain collectively is heavily suppressed, and the law provides workers with little protection.
Read Collaborative Cyber Threat Intelligence book online. Collaborative Cyber Threat Intelligence by Florian Skopik, the book is categorize as Computers book. Read More »
BOOK OVERVIEWS: Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to single organizations only. This book provides a unique angle on the topic of national cyber threat intelligence and security information sharing. It also provides a clear view on ongoing works in research laboratories world-wide in order to address current security concerns at national level. It allows practitioners to learn about upcoming trends, researchers to share current results, and decision makers to prepare for future developments.
Read Social Media and the Transformation of Interaction in Society book online. Social Media and the Transformation of Interaction in Society by Sahlin, John P., the book is categorize as Social Science book. Read More »
BOOK OVERVIEWS: The availability of various technological platforms enables individuals to feel a deeper sense of connectivity and contribution to their social circles and the world around them. This growing dependence on social networking platforms has altered the ways in which society functions and communicates. Social Media and the Transformation of Interaction in Society is a definitive reference source for timely scholarly research evaluating the impact of social networking platforms on a variety of relationships, including those between individuals, governments, citizens, businesses, and consumers. Featuring expansive coverage on a range of topics relating to social media applications and uses across industries, this publication is a critical reference source for professionals, educators, students, and academicians seeking current research on the role and impact of new media on modern society. This publication features authoritative, research-based chapters across a range of relevant topics including, but not limited to, computer-mediated communication, nonprofit projects, disaster response management, education, cyberbullying, microblogging, digital paranoia, user interaction augmentation, and viral messaging.
Author : Genserik Reniers,Nima Khakzad,Pieter Van Gelder
ISBN : 311049776X
Publisher : Walter de Gruyter GmbH & Co KG
Number of Pages : 201
Readers : 7575
Read Security Risk Assessment book online. Security Risk Assessment by Genserik Reniers,Nima Khakzad,Pieter Van Gelder, the book is categorize as Science book. Read More »
BOOK OVERVIEWS: This book deals with the state-of-the-art of physical security knowledge and research in the chemical and process industries. Legislation differences between Europe and the USA are investigated, followed by an overview of the how, what and why of contemporary security risk assessment in this particular industrial sector. Innovative solutions such as attractiveness calculations and the use of game theory, advancing the present science of adversarial risk analysis, are discussed. The book further stands up for developing and employing dynamic security risk assessments, for instance based on Bayesian networks, and using OR methods to truly move security forward in the chemical and process industries.
Read Intergovernmental Management for the 21st Century book online. Intergovernmental Management for the 21st Century by Timothy J. Conlan,Paul L. Posner, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: America's complex system of multi-layered government faces new challenges as a result of rapidly changing economic, technological, and demographic trends. An aging population, economic globalization, and homeland security concerns are among the powerful factors testing the system's capacity and flexibility. Major policy challenges and responses are now overwhelmingly intergovernmental in nature, and as a result, the fortunes of all levels of government are more intertwined and interdependent than ever before. This volume, cosponsored by the National Academy of Public Administration (NAPA), defines an agenda for improving the performance of America's intergovernmental system. The early chapters present the current state of practice in intergovernmental relations, including discussion of trends toward centralization, devolution, and other power-sharing arrangements. The fiscal underpinnings of the system are analyzed, along with the long-term implications of current trends in financing at all levels. The authors identify the principal tools used to define intergovernmental management–grants, mandates, preemptions—in discussing emerging models and best practices in the design and management of those tools. In tergovernmental Management for the 21st Century applies these crosscutting themes to critical policy areas where intergovernmental management and cooperation are essential, such as homeland security, education, welfare, health care, and the environment. It concludes with an authoritative assessment of the system's capacity to govern, oversee, and improve. Contributors include Jocelyn Johnston (American University), Shelley Metzenbaum (University of Maryland), Richard Nathan (SUNY at Albany), Barry Rabe (University of Michigan), Beryl Radin (American University), Alice Rivlin (Brookings Institution), Ray Sheppach (National Governors Association), Frank Shafroth (George Mason University), Troy Smith (BYU–Hawaii), Carl Stenberg (University of North Carolina), Carol Weissert (Florida State University), Charles Wise (Indiana University), and Kenneth Wong (Brown University).
Read Pandemic Influenza book online. Pandemic Influenza by Jeffrey R. Ryan, the book is categorize as Medical book. Read More »
BOOK OVERVIEWS: The swine flu emergency needn’t become a crisis. This critically acclaimed work provides public health officials, doctors, responders, and emergency planners with accurate current information that will help them understand the nature of an outbreak, assess risk, answer public concerns, and develop informed strategies. Devoid of sensationalism and agenda, this CRC Press resource provides all the information needed to understand pandemic influenzas including, avian, swine, and human variations and outlines the steps needed to develop and implement prevention, stabilization, and recovery efforts as needed at the local level. "... an amazing resource ... Dr. Ryan has assembled some of the best experts in the field to guide you in understanding the threat of pandemic influenza and how it can affect you and the people you are responsible for. ..." --From the foreword by Lynn A. Slepski, Captain, United States Public Health Service Make certain your response to Swine Flu is proactive and informed Edited by Jeffrey Ryan, Institute for Emergency Preparedness, this volume — Arms planners and responders with guidance from 13 leading experts Takes lessons from past pandemics Covers biological and clinical aspects of influenza Discusses pharmaceutical and non-pharmaceutical measures Details response actions related to communication, travel, and quarantine While the swine flu outbreak has impacted Mexico; influenza has no respect for boundaries and is already being felt up north. Despite warnings from the World Health Organization, our preparedness continues to lag. Part of the problem is that the real action must occur at the local level. Triage, care, and containment, along with maintenance of infrastructure, are functions that must be carried out by local planners and responders. The first section reviews the history of pandemics. The middle chapters examine the biology of a virus and clinical aspects of influenza. The final chapters examine international and federal programs and discuss response at the local level, including service continuation planning and fatality management.
Read Road Warriors book online. Road Warriors by Daniel Byman, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: Ever since the Soviet invasion of Afghanistan in 1979, fighters from abroad have journeyed in ever-greater numbers to conflict zones in the Muslim world to defend Islam from-in their view-infidels and apostates. The phenomenon recently reached its apogee in Syria, where the foreign fighter population quickly became larger and more diverse than in any previous conflict. In Road Warriors, Daniel Byman provides a sweeping history of the jihadist foreign fighter movement. He begins by chronicling the movement's birth in Afghanistan, its growing pains in Bosnia and Chechnya, and its emergence as a major source of terrorism in the West in the 1990s, culminating in the 9/11 attacks. Since that bloody day, the foreign fighter movement has seen major ups and downs. It rode high after the 2003 US invasion of Iraq, when the ultra-violent Al Qaeda in Iraq (AQI) attracted thousands of foreign fighters. AQI overreached, however, and suffered a crushing defeat. Demonstrating the resilience of the movement, however, AQI reemerged anew during the Syrian civil war as the Islamic State, attracting tens of thousands of fighters from around the world and spawning the bloody 2015 attacks in Paris among hundreds of other strikes. Although casualty rates are usually high, the survivors of Afghanistan, Syria, and other fields of jihad often became skilled professional warriors, going from one war to the next. Still others returned to their home countries, some to peaceful retirement but a deadly few to conduct terrorist attacks. Over time, both the United States and Europe have learned to adapt. Before 9/11, volunteers went to and fro to Afghanistan and other hotspots with little interference. Today, the United States and its allies have developed a global program to identify, arrest, and kill foreign fighters. Much remains to be done, however-jihadist ideas and networks are by now deeply embedded, even as groups such as Al Qaeda and the Islamic State rise and fall. And as Byman makes abundantly clear, the problem is not likely to go away any time soon.
Read No Home in a Homeland book online. No Home in a Homeland by Julia Christensen, the book is categorize as Social Science book. Read More »
BOOK OVERVIEWS: The Dene, a traditionally nomadic people, have no word for homelessness, a rare condition in the Canadian North prior to the 1990s. Julia Christensen documents the rise of Indigenous homelessness and proposes solutions by interweaving analysis of the region’s unique history with personal narratives of homeless men and women in two cities – Yellowknife and Inuvik. What emerges is a larger story of displacement and intergenerational trauma, hope and renewal. Understanding what it means to be homeless in the North and how Indigenous people think about home and homemaking is the first step, Christensen argues, on the path to decolonizing existing approaches and practices.
Read Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection book online. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection by Laing, Christopher, the book is categorize as Computers book. Read More »
BOOK OVERVIEWS: The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.
Read A Guide to Innovative Public-Private Partnerships book online. A Guide to Innovative Public-Private Partnerships by Thomas A. Cellucci, the book is categorize as Business & Economics book. Read More »
BOOK OVERVIEWS: This book enables organizations in both the private and public sectors to develop and execute efficient and effective business partnerships. Detailed requirements and market potentials are developed which would help entice the private sector to use its own resources to develop products and services without delay and at minimal cost to taxpayers. This is a 'must read' for anyone interested in doing business with the government as well as government leaders who are being forced to trim budgets and show genuine value in their agencies.
Read Cyber Threat: The Rise of Information Geopolitics in U.S. National Security book online. Cyber Threat: The Rise of Information Geopolitics in U.S. National Security by Chris Bronk, the book is categorize as Computers book. Read More »
BOOK OVERVIEWS: This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. • Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved • Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few • Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed
Read Terrorism, an Unconventional Crime book online. Terrorism, an Unconventional Crime by Vahab Aghai Ph.D, the book is categorize as Fiction book. Read More »
BOOK OVERVIEWS: The terrorist attacks of 9 /11 opened a window on a host of questions and assumptions about terrorism. Terrorism, An Unconventional Crime, uses those questions and assumptions as a starting point to explore the history, ideology, movements, leaders, and modern methodology of what is in fact an ancient phenomenon. Chapter topics include the following: What Are the Historic Roots of Terrorism? September 11How Could It Happen Here? Who Are the Taliban? Is al Qaeda Taking Root in America? What Are the Tactics of Terrorism? Are Rebels, Guerillas, and Drug Cartels Terrorists? Is Islam a Major Threat to Europe? Can Terrorism Be Eradicated? If Terrorism Is an Unconventional Crime, What Are the Unconventional Solutions? The book's principal focus is the current war on terrorism. The book discusses the various reasons for conducting operations in Afghanistan and Iraq, examines the tactics used, and evaluates their effectiveness. It devotes multiple chapters to the Taliban and al Qaeda, allowing readers to distinguish between the two groups and their varying interests and motives. There is also a detailed, chapter-long biography of the late Osama bin Laden. One of the most important chapters is the one dedicated to the September 11 attacks. The rapid narration of the timeline of events, along with the descriptions of each of the nineteen hijackers and the modus operandi they used to succeed in the attack, transports the reader back to that fatal day. The gaps in the security system, the near misses of local authorities, the hijacker- pilot who was a near no-showthe what-ifs of the day are brought into sharp and painful focus. Finally, Terrorism, An Unconventional Crime, presents factual information to debunk the idea, all too common in some circles, that all Muslims are terrorists or potential terrorists. The book cites a wide spectrum of studies, ranging from statistical surveys of terrorist incidents to social demographics, psychological profiles, compilations of correspondence, and the views of religious scholars specializing in many faiths. The latter affirm that every faith has a fundamentalist wing that could be radicalized at any time. This kind of approach is a hallmark of Terrorism An Unconventional Crime. When dealing with contemporary material, the book carefully presents at least two different points of view, usually starting with official government reports and then comparing and contrasting the opinions of various experts. The object of the book is not to impose a particular viewpoint on readers, but to inform and involve them in what for years to come will likely be an urgent and important issue.
Read ICIW2012-Proceedings of the 7th International Conference on Information Warfare and Security book online. ICIW2012-Proceedings of the 7th International Conference on Information Warfare and Security by Volodymyr Lysenko, the book is categorize as Computer security book. Read More »
BOOK OVERVIEWS: Read ICIW2012-Proceedings of the 7th International Conference on Information Warfare and Security book online. ICIW2012-Proceedings of the 7th International Conference on Information Warfare and Security by Volodymyr Lysenko, the book is categorize as Computer security book.
Read Cyber War and Cyber Peace book online. Cyber War and Cyber Peace by Eliza Campbell,Michael Sexton, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: The Middle East is the region in which the first act of cyber warfare took place. Since then, cyber warfare has escalated and has completely altered the course of the MENA region's geopolitics. With a foreword by top national security and cyber expert, Richard A. Clarke, this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas: privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided.
Author : Harry Ward Richardson,Peter Gordon,James E. Moore II
ISBN : 1848449356
Publisher : Edward Elgar Publishing
Number of Pages : 301
Readers : 8905
Read Global Business and the Terrorist Threat book online. Global Business and the Terrorist Threat by Harry Ward Richardson,Peter Gordon,James E. Moore II, the book is categorize as Business & Economics book. Read More »
BOOK OVERVIEWS: . . . a well-organized compendium, and although there is much technical data to support the varied theories, it is a comfortable read. . . This book represents a diverse and significant contribution to our ability, as a global nation and economy, to be resilient and recover quickly and efficiently when the time comes. Kathy Anne Wood, Journal of Homeland Security and Emergency Management Global Business and the Terrorist Threat offers college-level business and security libraries a top pick charting overlapping areas of influence between business and terrorism from news effects on stock markets to the impact of terrorism on bilateral trade. . . Any advanced college-level business or social issues collection needs this unique analysis. The Midwest Book Review Global business is affected by global terrorism and the two are intricately linked on many levels. This book is an eclectic and enlightening compendium of research that explores the interrelationships between the two. A companion to and expansion on the authors previous books in the area, Global Business and the Terrorist Threat takes a closer look at practical business management, as influenced by terrorist infrastructure, networks and actions. Many overlapping areas of influence between business and terrorism are explored in depth in the book. Among other topics, the authors discuss terrorism and news flows and their effect on stock markets, as well as the effects of transitional terrorism on bilateral trade. The importance of business continuity in the face of ongoing threats is detailed, as are efforts to avoid inadvertent interactions with terrorist groups. Border issues, challenges of benefit cost analysis for terrorism security regulations, the impact of 9/11 on the travel industry and the assessment and management of global interdependent risks close out the book. This book will be a choice addition to the bookshelves of researchers and practitioners in international business, public policy, and terrorism and security.
Author : Frances L. Edwards,Friedrich Steinhäusler
ISBN : 140206277X
Publisher : Springer
Number of Pages : 262
Readers : 6891
Read NATO And Terrorism book online. NATO And Terrorism by Frances L. Edwards,Friedrich Steinhäusler, the book is categorize as Medical book. Read More »
BOOK OVERVIEWS: This book provides information about how leading agencies across the NATO membership are preparing to confront and respond to terrorists deploying Weapons of Mass Destruction (WMD), Weapons of Mass Killing (WMK) and Weapons of Mass Disruption (WMDi). Based on contributions by experts from NATO member states, Israel and the Russian Federation, this book offers information on fourth generation warfare as a new challenge to first responders.
Read Developing Safer Schools and Communities for Our Children book online. Developing Safer Schools and Communities for Our Children by Betsy Gunzelmann, the book is categorize as Education book. Read More »
BOOK OVERVIEWS: Today, children are dealing with the threat of violence in their schools and online, food insecurity, environmental risks, and many other concerns that make them feel less safe. In this book, Gunzelmann discusses the ways we can respond to these threats in order to help our children feel safer and be able to focus on their school and lives.
Read Over 40 Publications Combined: Implications Of Narco-Terrorism And Human Trafficking In Mexico and Central America On United States National Security book online. Over 40 Publications Combined: Implications Of Narco-Terrorism And Human Trafficking In Mexico and Central America On United States National Security by Not Available, the book is categorize as Books book. Read More »
BOOK OVERVIEWS: Over 3,100 total pages ... CONTENTS: The Nexus of Extremism and Trafficking: Scourge of the World or So Much Hype? Crossing Our Red Lines About Partner Engagement in Mexico Two Faces of Attrition: Analysis of a Mismatched Strategy against Mexican and Central American Drug Traffickers Combating Drug Trafficking: Variation in the United States' Military Cooperation with Colombia and Mexico Ungoverned Spaces in Mexico: Autodefensas, Failed States, and the War on Drugs in Michoacan U.S. SOUTHWEST BORDER SECURITY: AN OPERATIONAL APPROACH TWO WARS: OVERSEAS CONTINGENCY OPERATIONS AND THE WAR ON DRUGS WHAT HAVE WE LEARNED FROM THE WAR ON DRUGS? AN ASSESSMENT OF MEXICO’S COUNTERNARCOTICS STRATEGY THE DIVERSIFICATION OF MEXICAN TRANSNATIONAL CRIMINAL ORGANIZATIONS AND ITS EFFECTS ON SPILLOVER VIOLENCE IN THE UNITED STATES Mexican Drug Trafficking Organizations: Matching Strategy to Threat THE IMPACTS OF SOCIAL MEDIA ON CITIZEN SECURITY BEHAVIOR IN MEXICO Combating Transnational Organized Crime: Strategies and Metrics for the Threat Beyond Merida: A Cooperative Counternarcotics Strategy for the 21st Century MEXICAN DRUG CARTELS AND TERRORIST ORGANIZATIONS, A NEW ALLIANCE? THE EFFECTIVE BUSINESS PRACTICES OF MEXICAN DRUG TRAFFICKING ORGANIZATIONS (DTOs) DRUG TRAFFICKING AND POLICE CORRUPTION: A COMPARISON OF COLOMBIA AND MEXICO CRISIS IN MEXICO: ASSESSING THE MÉRIDA INITIATIVE AND ITS IMPACT ON US-MEXICAN SECURITY BORDER SECURITY: IS IT ACHIEVABLE ON THE RIO GRANDE? Borders and Borderlands in the Americas PREVENTING BULK CASH AND WEAPONS SMUGGLING INTO MEXICO: ESTABLISHING AN OUTBOUND POLICY ON THE SOUTHWEST BORDER FOR CUSTOMS AND BORDER PROTECTON DRUG TRAFFICKING WITHIN MEXICO: A LAW ENFORCEMENT ISSUE OR INSURGENCY? USSOCOM’s Role in Addressing Human Trafficking Southwest Border Violence: Issues in Identifying and Measuring Spillover Violence National Security Threats at the U.S.-Mexico Border Merida Initiative: Proposed U.S. Anticrime and Counterdrug Assistance for Mexico and Central America COCAINE TRAFFICKING THROUGH WEST AFRICA: THE HYBRIDIZED ILLICIT NETWORK AS AN EMERGING TRANSNATIONAL THREAT ORGANIZED CRIME AND TERRORIST ACTIVITY IN MEXICO, 1999-2002 Is the Narco-violence in Mexico an Insurgency? THE USE OF TERRORISM BY DRUG TRAFFICKING ORGANIZATIONS’ PARAMILITARY GROUPS IN MEXICO An Approach to the 40-Year Drug War EXPLOITING WEAKNESSES: AN APPROACH TO COUNTER CARTEL STRATEGY MEXICO AND THE COCAINE EPIDEMIC: THE NEW COLOMBIA OR A NEW PROBLEM? EXPLAINING VARIATION IN THE APPREHENSION OF MEXICAN DRUG TRAFFICKING CARTEL LEADERS Drug Cartels and Gangs in Mexico and Central America: A View through the Lens of Counterinsurgency The COIN Approach to Mexican Drug Cartels: Square Peg in a Round Hole Counterinsurgency and the Mexican Drug War THE UNTOLD STORY OF MEXICO’S RISE AND EVENTUAL MONOPOLY OF THE METHAMPHETAMINE TRADE Competing with the Cartels: How Mexico's Government Can Reduce Organized Crime's Economic Grip on its People FIGHTING CORRUPTION IN MEXICO: LESSONS FROM COLOMBIA Defeating Mexico's Drug Trafficking Organizations: The Range of Military Operations in Mexico Drug Trafficking as a Lethal Regional Threat in Central America What Explains the Patterns of Diversification in Drug Trafficking Organizations Evaluating the Impact of Drug Trafficking Organizations on the Stability of the Mexican State
Author : Daniel Zeng,Hsinchun Chen,Carlos Castillo-Chavez,William B. Lober,Mark Thurmond
ISBN : 144196892X
Publisher : Springer Science & Business Media
Number of Pages : 488
Readers : 5612
Read Infectious Disease Informatics and Biosurveillance book online. Infectious Disease Informatics and Biosurveillance by Daniel Zeng,Hsinchun Chen,Carlos Castillo-Chavez,William B. Lober,Mark Thurmond, the book is categorize as Medical book. Read More »
BOOK OVERVIEWS: This book on Infectious Disease Informatics (IDI) and biosurveillance is intended to provide an integrated view of the current state of the art, identify technical and policy challenges and opportunities, and promote cross-disciplinary research that takes advantage of novel methodology and what we have learned from innovative applications. This book also fills a systemic gap in the literature by emphasizing informatics driven perspectives (e.g., information system design, data standards, computational aspects of biosurveillance algorithms, and system evaluation). Finally, this book attempts to reach policy makers and practitioners through the clear and effective communication of recent research findings in the context of case studies in IDI and biosurveillance, providing “hands-on” in-depth opportunities to practitioners to increase their understanding of value, applicability, and limitations of technical solutions. This book collects the state of the art research and modern perspectives of distinguished individuals and research groups on cutting-edge IDI technical and policy research and its application in biosurveillance. The contributed chapters are grouped into three units. Unit I provides an overview of recent biosurveillance research while highlighting the relevant legal and policy structures in the context of IDI and biosurveillance ongoing activities. It also identifies IDI data sources while addressing information collection, sharing, and dissemination issues as well as ethical considerations. Unit II contains survey chapters on the types of surveillance methods used to analyze IDI data in the context of public health and bioterrorism. Specific computational techniques covered include: text mining, time series analysis, multiple data streams methods, ensembles of surveillance methods, spatial analysis and visualization, social network analysis, and agent-based simulation. Unit III examines IT and decision support for public health event response and bio-defense. Practical lessons learned in developing public health and biosurveillance systems, technology adoption, and syndromic surveillance for large events are discussed. The goal of this book is to provide an understandable interdisciplinary IDI and biosurveillance reference either used as a standalone textbook or reference for students, researchers, and practitioners in public health, veterinary medicine, biostatistics, information systems, computer science, and public administration and policy.
Read Infectious Disease and National Security book online. Infectious Disease and National Security by Gary Cecchine,Melinda Moore, the book is categorize as Political Science book. Read More »
BOOK OVERVIEWS: The pace of global travel, migration, and commerce has brought about an increased risk of a worldwide infectious disease outbreak. This report examines infectious disease within the context of national security and assesses the need for and adequacy of information that will enable U.S. policymakers to prevent and respond to such threats.
Read Two-Factor Authentication book online. Two-Factor Authentication by Mark Stanislav, the book is categorize as Computers book. Read More »
BOOK OVERVIEWS: This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.
Read Communicable Crises book online. Communicable Crises by Deborah E. Gibbons, the book is categorize as Business & Economics book. Read More »
BOOK OVERVIEWS: This volume makes a significant contribution to the crisis management literature. It also adds to our inchoate understanding of network governance: temporary teams and task forces, communities of practice, alliances, and virtual organizations. It hints that the distinction between networks and organizations may be somewhat spurious, a matter of degree rather than kind. Indeed, it seems that this distinction may derive more from mental models in which we consistently reify organizations than anything else. Finally, the volume emphasizes the functional importance of leadership in network governance and puzzles over its provision in the absence of hierarchy. As such, it adds to the contributions made by Marc Granovetter (1973), John Seeley Brown and Paul Duguid (1991), Bart Nooteboom (2000), Paul J. DiMaggio (2001), John Arquilla and David Ronfeldt (2001), Laurence O’Toole and Ken Meier (2004), and others, as well as Nancy Roberts’ seminal work on wicked problems and hastily formed teams. The result is a product the editor and the contributors can be proud of. Overall, it is one that will edify, surprise, and delight its readers.
Read Texas Tough book online. Texas Tough by Robert Perkinson, the book is categorize as Social Science book. Read More »
BOOK OVERVIEWS: A vivid history of America's biggest, baddest prison system and how it came to lead the nation's punitive revolution In the prison business, all roads lead to Texas. The most locked-down state in the nation has led the way in criminal justice severity, from assembly-line executions to isolation supermaxes, from prison privatization to sentencing juveniles as adults. Texas Tough, a sweeping history of American imprisonment from the days of slavery to the present, shows how a plantation-based penal system once dismissed as barbaric became the national template. Drawing on convict accounts, official records, and interviews with prisoners, guards, and lawmakers, historian Robert Perkinson reveals the Southern roots of our present-day prison colossus. While conventional histories emphasize the North's rehabilitative approach, he shows how the retributive and profit-driven regime of the South ultimately triumphed. Most provocatively, he argues that just as convict leasing and segregation emerged in response to Reconstruction, so today's mass incarceration, with its vast racial disparities, must be seen as a backlash against civil rights. Illuminating for the first time the origins of America's prison juggernaut, Texas Tough points toward a more just and humane future.