Description : A moving, eye-opening polemic about the US-Mexico border and what happens to the tens of thousands of unaccompanied Mexican and Central American children arriving in the US without papers
Description : After a series of disastrous missteps in its conduct of the war, the White House in 2006 appointed General David Petraeus as the Commanding General of the coalition forces. Tell Me How This Ends is an inside account of his attempt to turn around a failing war. Linda Robinson conducted extensive interviews with Petraeus and his subordinate commanders and spent weeks with key U.S. and Iraqi divisions. The result is the only book that ties together military operations in Iraq and the internecine political drama that is at the heart of the civil war. Replete with dramatic battles, behind-doors confrontations, and astute analysis, the book tells the full story of the Iraq War's endgame, and lays out the options that will be facing the next president when he or she takes office in January 2009.
Description : After 18 years post-9/11, the United States is still in Afghanistan having achieved at best a stalemate. This CSIS report concludes that the mission in Afghanistan expanded from a limited focus on counterterrorism to a broad nation-building effort without discussions about the implications for the duration and intensity of the military campaign.
Description : This Handbook offers a comprehensive examination of the peace, security, and development nexus from a global perspective, and investigates the interfaces of these issues in a context characterised by many new challenges. By bringing together more than 40 leading experts and commentators from across the world, the Handbook maps the various research agendas related to these three themes, taking stock of existing work and debates, while outlining areas for further engagement. In doing so, the chapters may serve as a primer for new researchers while also informing the wider scholarly community about the latest research trends and innovations. The volume is split into three thematic parts: Concepts and approaches New drivers of conflict, insecurity, and developmental challenges Actors, institutions, and processes. For ease of use and organisational consistency, each chapter provides readers with an overview of each research area, a review of the state of the literature, a summary of the major debates, and promising directions for future research. This Handbook will be of much interest to students of peace and conflict studies, development studies, security studies, and International Relations.
Description : Pre-order this compelling, transfixing novel about the bond between three sisters from the author of The Poison Bed Three sisters. Three secrets. Three ways to fall . . . England, 1628. Forcibly seduced by the powerful George Villiers, doctor's daughter Hester is cast aside to raise her son alone and in secret. She hopes never to see Villiers again. Melis's visions cause disquiet and talk. She sees what others can't - and what has yet to be. She'd be denounced as a witch if Hester wasn't so carefully protective. Young Hope's beauty marks her out, drawing unwelcome attention to the family. Yet she cannot always resist others' advances. And her sisters cannot always be on their guard. When Villiers decides to claim his son against Hester's wishes, the sisters find themselves almost friendless and at his mercy. But the women hold a grave secret - will it be their undoing or their salvation? Because in the right hands, a secret is the deadliest weapon of all . . .
Description : One of the first ethnographic studies to explore use of social media in the everyday lives of people in Tamil Nadu, Social Media in South India provides an understanding of this subject in a region experiencing rapid transformation. The influx of IT companies over the past decade into what was once a space dominated by agriculture has resulted in a complex juxtaposition between an evolving knowledge economy and the traditions of rural life. While certain class tensions have emerged in response to this juxtaposition, a study of social media in the region suggests that similarities have also transpired, observed most clearly in the blurring of boundaries between work and life for both the old residents and the new. Venkatraman explores the impact of social media at home, work and school, and analyses the influence of class, caste, age and gender on how, and which, social media platforms are used in different contexts. These factors, he argues, have a significant effect on social media use, suggesting that social media in South India, while seeming to induce societal change, actually remains bound by local traditions and practices.
Description : An essential anti-phishing desk reference for anyone with anemail address Phishing Dark Waters addresses the growing and continuingscourge of phishing emails, and provides actionable defensivetechniques and tools to help you steer clear of malicious emails.Phishing is analyzed from the viewpoint of human decision-makingand the impact of deliberate influence and manipulation on therecipient. With expert guidance, this book provides insight intothe financial, corporate espionage, nation state, and identitytheft goals of the attackers, and teaches you how to spot a spoofede-mail or cloned website. Included are detailed examples of highprofile breaches at Target, RSA, Coca Cola, and the AP, as well asan examination of sample scams including the Nigerian 419,financial themes, and post high-profile event attacks. Learn how toprotect yourself and your organization using anti-phishing tools,and how to create your own phish to use as part of a securityawareness program. Phishing is a social engineering technique through email thatdeceives users into taking an action that is not in their bestinterest, but usually with the goal of disclosing information orinstalling malware on the victim's computer. Phishing DarkWaters explains the phishing process and techniques, and thedefenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've beenused Understand decision-making, and the sneaky ways phishers reelyou in Recognize different types of phish, and know what to do whenyou catch one Use phishing as part of your security awareness program forheightened protection Attempts to deal with the growing number of phishing incidentsinclude legislation, user training, public awareness, and technicalsecurity, but phishing still exploits the natural way humansrespond to certain situations. Phishing Dark Waters is anindispensible guide to recognizing and blocking the phish, keepingyou, your organization, and your finances safe.