Security, Strategy, and Critical Theory / / Richard Wyn Jones.

Laying out the conceptual foundations of critical security studies, Wyn Jones uses the ideas of the Frankfurt School to advance critical thought about security, strategy, and the relationship between the theory and practice of security.

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000
VerfasserIn:
Place / Publishing House:Boulder : : Lynne Rienner Publishers, , [2022]
©1999
Year of Publication:2022
Language:English
Series:Critical Security Studies
Online Access:
Physical Description:1 online resource (196 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781685857110
ctrlnum (DE-B1597)623464
collection bib_alma
record_format marc
spelling Wyn Jones, Richard, author. aut http://id.loc.gov/vocabulary/relators/aut
Security, Strategy, and Critical Theory / Richard Wyn Jones.
Boulder : Lynne Rienner Publishers, [2022]
©1999
1 online resource (196 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Critical Security Studies
Frontmatter -- Contents -- Preface -- Acknowledgments -- Introduction -- PART 1 TRADITIONAL AND CRITICAL THEORY -- 1 Promise: Toward a Critical Theory of Society -- 2 Impasse: Emancipatory Politics After Auschwitz -- 3 Redemption: Renewing the Critical Project -- PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES -- 4 Theory: Reconceptualizing Security -- 5 Technology: Reconceptualizing Strategy -- 6 Emancipation: Reconceptualizing Practice -- Epilogue -- Bibliography -- Index -- About the Book
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Laying out the conceptual foundations of critical security studies, Wyn Jones uses the ideas of the Frankfurt School to advance critical thought about security, strategy, and the relationship between the theory and practice of security.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022)
POLITICAL SCIENCE / Security (National & International). bisacsh
Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000 9783110784268
https://doi.org/10.1515/9781685857110
https://www.degruyter.com/isbn/9781685857110
Cover https://www.degruyter.com/document/cover/isbn/9781685857110/original
language English
format eBook
author Wyn Jones, Richard,
Wyn Jones, Richard,
spellingShingle Wyn Jones, Richard,
Wyn Jones, Richard,
Security, Strategy, and Critical Theory /
Critical Security Studies
Frontmatter --
Contents --
Preface --
Acknowledgments --
Introduction --
PART 1 TRADITIONAL AND CRITICAL THEORY --
1 Promise: Toward a Critical Theory of Society --
2 Impasse: Emancipatory Politics After Auschwitz --
3 Redemption: Renewing the Critical Project --
PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES --
4 Theory: Reconceptualizing Security --
5 Technology: Reconceptualizing Strategy --
6 Emancipation: Reconceptualizing Practice --
Epilogue --
Bibliography --
Index --
About the Book
author_facet Wyn Jones, Richard,
Wyn Jones, Richard,
author_variant j r w jr jrw
j r w jr jrw
author_role VerfasserIn
VerfasserIn
author_sort Wyn Jones, Richard,
title Security, Strategy, and Critical Theory /
title_full Security, Strategy, and Critical Theory / Richard Wyn Jones.
title_fullStr Security, Strategy, and Critical Theory / Richard Wyn Jones.
title_full_unstemmed Security, Strategy, and Critical Theory / Richard Wyn Jones.
title_auth Security, Strategy, and Critical Theory /
title_alt Frontmatter --
Contents --
Preface --
Acknowledgments --
Introduction --
PART 1 TRADITIONAL AND CRITICAL THEORY --
1 Promise: Toward a Critical Theory of Society --
2 Impasse: Emancipatory Politics After Auschwitz --
3 Redemption: Renewing the Critical Project --
PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES --
4 Theory: Reconceptualizing Security --
5 Technology: Reconceptualizing Strategy --
6 Emancipation: Reconceptualizing Practice --
Epilogue --
Bibliography --
Index --
About the Book
title_new Security, Strategy, and Critical Theory /
title_sort security, strategy, and critical theory /
series Critical Security Studies
series2 Critical Security Studies
publisher Lynne Rienner Publishers,
publishDate 2022
physical 1 online resource (196 p.)
contents Frontmatter --
Contents --
Preface --
Acknowledgments --
Introduction --
PART 1 TRADITIONAL AND CRITICAL THEORY --
1 Promise: Toward a Critical Theory of Society --
2 Impasse: Emancipatory Politics After Auschwitz --
3 Redemption: Renewing the Critical Project --
PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES --
4 Theory: Reconceptualizing Security --
5 Technology: Reconceptualizing Strategy --
6 Emancipation: Reconceptualizing Practice --
Epilogue --
Bibliography --
Index --
About the Book
isbn 9781685857110
9783110784268
url https://doi.org/10.1515/9781685857110
https://www.degruyter.com/isbn/9781685857110
https://www.degruyter.com/document/cover/isbn/9781685857110/original
illustrated Not Illustrated
doi_str_mv 10.1515/9781685857110
work_keys_str_mv AT wynjonesrichard securitystrategyandcriticaltheory
status_str n
ids_txt_mv (DE-B1597)623464
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000
is_hierarchy_title Security, Strategy, and Critical Theory /
container_title Title is part of eBook package: De Gruyter Lynne Rienner Press Complete Archive eBook-Package Pre-2000
_version_ 1770177232905437184
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02989nam a22006135i 4500</leader><controlfield tag="001">9781685857110</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220629043637.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220629t20221999cou fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781685857110</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781685857110</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)623464</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">cou</subfield><subfield code="c">US-CO</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wyn Jones, Richard, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, Strategy, and Critical Theory /</subfield><subfield code="c">Richard Wyn Jones.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boulder : </subfield><subfield code="b">Lynne Rienner Publishers, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (196 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Critical Security Studies</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">PART 1 TRADITIONAL AND CRITICAL THEORY -- </subfield><subfield code="t">1 Promise: Toward a Critical Theory of Society -- </subfield><subfield code="t">2 Impasse: Emancipatory Politics After Auschwitz -- </subfield><subfield code="t">3 Redemption: Renewing the Critical Project -- </subfield><subfield code="t">PART 2 TRADITIONAL AND CRITICAL SECURITY STUDIES -- </subfield><subfield code="t">4 Theory: Reconceptualizing Security -- </subfield><subfield code="t">5 Technology: Reconceptualizing Strategy -- </subfield><subfield code="t">6 Emancipation: Reconceptualizing Practice -- </subfield><subfield code="t">Epilogue -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index -- </subfield><subfield code="t">About the Book</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Laying out the conceptual foundations of critical security studies, Wyn Jones uses the ideas of the Frankfurt School to advance critical thought about security, strategy, and the relationship between the theory and practice of security.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 29. Jun 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National &amp; International).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Lynne Rienner Press Complete Archive eBook-Package Pre-2000</subfield><subfield code="z">9783110784268</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781685857110</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781685857110</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781685857110/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-078426-8 Lynne Rienner Press Complete Archive eBook-Package Pre-2000</subfield><subfield code="b">2000</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>