Security, Strategy, and Critical Theory / / Richard Wyn Jones.
Laying out the conceptual foundations of critical security studies, Wyn Jones uses the ideas of the Frankfurt School to advance critical thought about security, strategy, and the relationship between the theory and practice of security.
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Boulder : : Lynne Rienner Publishers, , [2022] ©1999 |
Year of Publication: | 2022 |
Language: | English |
Series: | Critical Security Studies
|
Online Access: | |
Physical Description: | 1 online resource (196 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781685857110 |
---|---|
ctrlnum |
(DE-B1597)623464 |
collection |
bib_alma |
record_format |
marc |
spelling |
Wyn Jones, Richard, author. aut http://id.loc.gov/vocabulary/relators/aut Security, Strategy, and Critical Theory / Richard Wyn Jones. Boulder : Lynne Rienner Publishers, [2022] ©1999 1 online resource (196 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Critical Security Studies Frontmatter -- Contents -- Preface -- Acknowledgments -- Introduction -- PART 1 TRADITIONAL AND CRITICAL THEORY -- 1 Promise: Toward a Critical Theory of Society -- 2 Impasse: Emancipatory Politics After Auschwitz -- 3 Redemption: Renewing the Critical Project -- PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES -- 4 Theory: Reconceptualizing Security -- 5 Technology: Reconceptualizing Strategy -- 6 Emancipation: Reconceptualizing Practice -- Epilogue -- Bibliography -- Index -- About the Book restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Laying out the conceptual foundations of critical security studies, Wyn Jones uses the ideas of the Frankfurt School to advance critical thought about security, strategy, and the relationship between the theory and practice of security. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022) POLITICAL SCIENCE / Security (National & International). bisacsh Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 9783110784268 https://doi.org/10.1515/9781685857110 https://www.degruyter.com/isbn/9781685857110 Cover https://www.degruyter.com/document/cover/isbn/9781685857110/original |
language |
English |
format |
eBook |
author |
Wyn Jones, Richard, Wyn Jones, Richard, |
spellingShingle |
Wyn Jones, Richard, Wyn Jones, Richard, Security, Strategy, and Critical Theory / Critical Security Studies Frontmatter -- Contents -- Preface -- Acknowledgments -- Introduction -- PART 1 TRADITIONAL AND CRITICAL THEORY -- 1 Promise: Toward a Critical Theory of Society -- 2 Impasse: Emancipatory Politics After Auschwitz -- 3 Redemption: Renewing the Critical Project -- PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES -- 4 Theory: Reconceptualizing Security -- 5 Technology: Reconceptualizing Strategy -- 6 Emancipation: Reconceptualizing Practice -- Epilogue -- Bibliography -- Index -- About the Book |
author_facet |
Wyn Jones, Richard, Wyn Jones, Richard, |
author_variant |
j r w jr jrw j r w jr jrw |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Wyn Jones, Richard, |
title |
Security, Strategy, and Critical Theory / |
title_full |
Security, Strategy, and Critical Theory / Richard Wyn Jones. |
title_fullStr |
Security, Strategy, and Critical Theory / Richard Wyn Jones. |
title_full_unstemmed |
Security, Strategy, and Critical Theory / Richard Wyn Jones. |
title_auth |
Security, Strategy, and Critical Theory / |
title_alt |
Frontmatter -- Contents -- Preface -- Acknowledgments -- Introduction -- PART 1 TRADITIONAL AND CRITICAL THEORY -- 1 Promise: Toward a Critical Theory of Society -- 2 Impasse: Emancipatory Politics After Auschwitz -- 3 Redemption: Renewing the Critical Project -- PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES -- 4 Theory: Reconceptualizing Security -- 5 Technology: Reconceptualizing Strategy -- 6 Emancipation: Reconceptualizing Practice -- Epilogue -- Bibliography -- Index -- About the Book |
title_new |
Security, Strategy, and Critical Theory / |
title_sort |
security, strategy, and critical theory / |
series |
Critical Security Studies |
series2 |
Critical Security Studies |
publisher |
Lynne Rienner Publishers, |
publishDate |
2022 |
physical |
1 online resource (196 p.) |
contents |
Frontmatter -- Contents -- Preface -- Acknowledgments -- Introduction -- PART 1 TRADITIONAL AND CRITICAL THEORY -- 1 Promise: Toward a Critical Theory of Society -- 2 Impasse: Emancipatory Politics After Auschwitz -- 3 Redemption: Renewing the Critical Project -- PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES -- 4 Theory: Reconceptualizing Security -- 5 Technology: Reconceptualizing Strategy -- 6 Emancipation: Reconceptualizing Practice -- Epilogue -- Bibliography -- Index -- About the Book |
isbn |
9781685857110 9783110784268 |
url |
https://doi.org/10.1515/9781685857110 https://www.degruyter.com/isbn/9781685857110 https://www.degruyter.com/document/cover/isbn/9781685857110/original |
illustrated |
Not Illustrated |
doi_str_mv |
10.1515/9781685857110 |
work_keys_str_mv |
AT wynjonesrichard securitystrategyandcriticaltheory |
status_str |
n |
ids_txt_mv |
(DE-B1597)623464 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 |
is_hierarchy_title |
Security, Strategy, and Critical Theory / |
container_title |
Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 |
_version_ |
1770177232905437184 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02989nam a22006135i 4500</leader><controlfield tag="001">9781685857110</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220629043637.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220629t20221999cou fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781685857110</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781685857110</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)623464</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">cou</subfield><subfield code="c">US-CO</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wyn Jones, Richard, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, Strategy, and Critical Theory /</subfield><subfield code="c">Richard Wyn Jones.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boulder : </subfield><subfield code="b">Lynne Rienner Publishers, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (196 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Critical Security Studies</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">PART 1 TRADITIONAL AND CRITICAL THEORY -- </subfield><subfield code="t">1 Promise: Toward a Critical Theory of Society -- </subfield><subfield code="t">2 Impasse: Emancipatory Politics After Auschwitz -- </subfield><subfield code="t">3 Redemption: Renewing the Critical Project -- </subfield><subfield code="t">PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES -- </subfield><subfield code="t">4 Theory: Reconceptualizing Security -- </subfield><subfield code="t">5 Technology: Reconceptualizing Strategy -- </subfield><subfield code="t">6 Emancipation: Reconceptualizing Practice -- </subfield><subfield code="t">Epilogue -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Book</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Laying out the conceptual foundations of critical security studies, Wyn Jones uses the ideas of the Frankfurt School to advance critical thought about security, strategy, and the relationship between the theory and practice of security.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National & International).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Lynne Rienner Press Complete Archive eBook-Package Pre-2000</subfield><subfield code="z">9783110784268</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781685857110</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781685857110</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781685857110/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-078426-8 Lynne Rienner Press Complete Archive eBook-Package Pre-2000</subfield><subfield code="b">2000</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |