Subregional Security Cooperation in the Third World / / William T. Tow.
Tow assesses the extent to which five subregional security organizations--the Association of Southeast Asian Nations (ASEAN), the Gulf Cooperation Council (GCC), the Organization of East Caribbean States (OECS), the Southern African Development Coordination Conference (SADCC), and the South Pacific...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Boulder : : Lynne Rienner Publishers, , [2023] ©1990 |
Year of Publication: | 2023 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (155 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781685852115 |
---|---|
ctrlnum |
(DE-B1597)625180 |
collection |
bib_alma |
record_format |
marc |
spelling |
Tow, William T., author. aut http://id.loc.gov/vocabulary/relators/aut Subregional Security Cooperation in the Third World / William T. Tow. Boulder : Lynne Rienner Publishers, [2023] ©1990 1 online resource (155 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Acronyms -- Acknowledgments -- Introduction -- 1 SRSOs' Legitimacy Factors -- 2 SRSOs' Effectiveness: Case Studies -- 3 External Responses to SRSOs -- 4 Conclusions for Western Policymakers -- Bibliography -- Index -- About the Book and the Author restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Tow assesses the extent to which five subregional security organizations--the Association of Southeast Asian Nations (ASEAN), the Gulf Cooperation Council (GCC), the Organization of East Caribbean States (OECS), the Southern African Development Coordination Conference (SADCC), and the South Pacific Forum (SPF)--have succeeded in meeting commonly defined security threats, in overcoming their members' political and economic vulnerabilities, and in compelling the major powers to accept the legitimacy of their regional security agendas. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023) National security Developing countries. Regionalism (International organization). Security, International. POLITICAL SCIENCE / World / General. bisacsh Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 9783110784268 print 9781555872014 https://doi.org/10.1515/9781685852115 https://www.degruyter.com/isbn/9781685852115 Cover https://www.degruyter.com/document/cover/isbn/9781685852115/original |
language |
English |
format |
eBook |
author |
Tow, William T., Tow, William T., |
spellingShingle |
Tow, William T., Tow, William T., Subregional Security Cooperation in the Third World / Frontmatter -- Contents -- Acronyms -- Acknowledgments -- Introduction -- 1 SRSOs' Legitimacy Factors -- 2 SRSOs' Effectiveness: Case Studies -- 3 External Responses to SRSOs -- 4 Conclusions for Western Policymakers -- Bibliography -- Index -- About the Book and the Author |
author_facet |
Tow, William T., Tow, William T., |
author_variant |
w t t wt wtt w t t wt wtt |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Tow, William T., |
title |
Subregional Security Cooperation in the Third World / |
title_full |
Subregional Security Cooperation in the Third World / William T. Tow. |
title_fullStr |
Subregional Security Cooperation in the Third World / William T. Tow. |
title_full_unstemmed |
Subregional Security Cooperation in the Third World / William T. Tow. |
title_auth |
Subregional Security Cooperation in the Third World / |
title_alt |
Frontmatter -- Contents -- Acronyms -- Acknowledgments -- Introduction -- 1 SRSOs' Legitimacy Factors -- 2 SRSOs' Effectiveness: Case Studies -- 3 External Responses to SRSOs -- 4 Conclusions for Western Policymakers -- Bibliography -- Index -- About the Book and the Author |
title_new |
Subregional Security Cooperation in the Third World / |
title_sort |
subregional security cooperation in the third world / |
publisher |
Lynne Rienner Publishers, |
publishDate |
2023 |
physical |
1 online resource (155 p.) |
contents |
Frontmatter -- Contents -- Acronyms -- Acknowledgments -- Introduction -- 1 SRSOs' Legitimacy Factors -- 2 SRSOs' Effectiveness: Case Studies -- 3 External Responses to SRSOs -- 4 Conclusions for Western Policymakers -- Bibliography -- Index -- About the Book and the Author |
isbn |
9781685852115 9783110784268 9781555872014 |
callnumber-first |
U - Military Science |
callnumber-subject |
UA - Armies |
callnumber-label |
UA10 |
callnumber-sort |
UA 210.5 T68 42023 |
geographic_facet |
Developing countries. |
url |
https://doi.org/10.1515/9781685852115 https://www.degruyter.com/isbn/9781685852115 https://www.degruyter.com/document/cover/isbn/9781685852115/original |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
340 - Law |
dewey-ones |
341 - Law of nations |
dewey-full |
341.7/2091724 |
dewey-sort |
3341.7 72091724 |
dewey-raw |
341.7/2091724 |
dewey-search |
341.7/2091724 |
doi_str_mv |
10.1515/9781685852115 |
work_keys_str_mv |
AT towwilliamt subregionalsecuritycooperationinthethirdworld |
status_str |
n |
ids_txt_mv |
(DE-B1597)625180 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 |
is_hierarchy_title |
Subregional Security Cooperation in the Third World / |
container_title |
Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 |
_version_ |
1775793046757048320 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03276nam a22006735i 4500</leader><controlfield tag="001">9781685852115</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230808014301.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230808t20231990cou fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781685852115</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781685852115</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)625180</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">cou</subfield><subfield code="c">US-CO</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">UA10.5</subfield><subfield code="b">.T68 2023</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL040020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">341.7/2091724</subfield><subfield code="2">23/eng/20230721</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tow, William T., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Subregional Security Cooperation in the Third World /</subfield><subfield code="c">William T. Tow.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boulder : </subfield><subfield code="b">Lynne Rienner Publishers, </subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1990</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (155 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Acronyms -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">1 SRSOs' Legitimacy Factors -- </subfield><subfield code="t">2 SRSOs' Effectiveness: Case Studies -- </subfield><subfield code="t">3 External Responses to SRSOs -- </subfield><subfield code="t">4 Conclusions for Western Policymakers -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Book and the Author</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Tow assesses the extent to which five subregional security organizations--the Association of Southeast Asian Nations (ASEAN), the Gulf Cooperation Council (GCC), the Organization of East Caribbean States (OECS), the Southern African Development Coordination Conference (SADCC), and the South Pacific Forum (SPF)--have succeeded in meeting commonly defined security threats, in overcoming their members' political and economic vulnerabilities, and in compelling the major powers to accept the legitimacy of their regional security agendas.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="z">Developing countries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Regionalism (International organization).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security, International.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / World / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Lynne Rienner Press Complete Archive eBook-Package Pre-2000</subfield><subfield code="z">9783110784268</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781555872014</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781685852115</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781685852115</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781685852115/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-078426-8 Lynne Rienner Press Complete Archive eBook-Package Pre-2000</subfield><subfield code="b">2000</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |