Download e-book for kindle: Indian Foreign and Security Policy in South Asia: Regional by Sandra Destradi

By Sandra Destradi

ISBN-10: 0415721245

ISBN-13: 9780415721240

This e-book examines Indian international coverage and protection kinfolk in its japanese local neighbourhood.

Indian international and safety coverage in South Asia conducts an in-depth research into India’s overseas coverage in the direction of the 3 major nations in India’s jap neighbourhood – Sri Lanka, Nepal, and Bangladesh. specifically, it bargains with India’s function within the ultimate years of the civil warfare in Sri Lanka, its method of the peace and democratisation procedure in Nepal, and Indian overseas coverage in the direction of Bangladesh on a variety of matters together with Islamist militancy, migration, border safety, and insurgency.

Set inside of an analytical framework concentrated at the notions of ‘empire’, ‘hegemony’, and ‘leadership’, the research finds that India pursued predominantly hegemonic thoughts and used to be unable to generate actual followership between its smaller neighbours. The South Asian case for that reason exhibits the discrepancy which could exist among the ownership of strength functions and the power to workout genuine impression: a end which lifts the examine from geographical specifics, and extends its relevance to different situations and cross-regional comparisons.

This textual content might be of a lot curiosity to scholars of Indian international coverage, Asian safety, international coverage research, strategic reports and IR in general.

Show description

Read Online or Download Indian Foreign and Security Policy in South Asia: Regional Power Strategies PDF

Similar security books

Real-World Nuclear Deterrence: The Making of International - download pdf or read online

The specter of nuclear guns didn't fade away with the cave in of the Soviet Union. really, the geopolitical problems of the post-Cold battle period and the increase of world terrorism have ensured that they continue to be conspicuously current at the global level as a significant overseas quandary. With the 8 or 9 nuclear powers conserving approximately 27,000 nuclear guns of their arsenals to today, it truly is transparent that they're the following to stick for the foreseeable destiny.

Irregular Migration and Human Security in East Asia by Jiyoung Song (ed.), Alistair D. B. Cook (ed.) PDF

Throughout East Asia, intra-regional migration is extra generic than inter-regional hobbies, and the region’s varied histories, geopolitics, financial improvement, ethnic groups, and average environments make it an outstanding case examine for reading the connection among abnormal migration and human safety.

Download e-book for iPad: Security and Trust Management: 11th International Workshop, by Sara Foresti

This publication constitutes the refereed complaints of the eleventh overseas Workshop on protection and belief administration, STM 2015, held in Vienna, Austria, in September 2015, together with the 20 th ecu Symposium learn in machine safeguard, ESORICS 2015. The 15 revised complete papers have been rigorously reviewed and chosen from 38 submissions.

Extra resources for Indian Foreign and Security Policy in South Asia: Regional Power Strategies

Example text

Military infrastructure will survive a large-scale nuclear war. However, because of the roots of TCP/IP, the Internet today uses a set of protocols that can function well in an environment in which there is no centralized control and there is constant risk of partial network outages. For example, suppose that construction workers dig a trench and accidentally destroy a buried network cable that connects two parts of the country. As a result, some computers may not be able to communicate with each other.

Computers with always-on connections are a favorite target of hackers. Some computers — especially Windows-based computers with shared resources, such as shared folders or printers — announce themselves on the local network so that other users can easily find these shared resources and connect to them. This is great in a home network, but with a cable modem, these computers announce their shared resources to everyone on the same cable segment. This means that your neighbor’s printer may show up as a resource as you look for the shared printer on your spouse’s computer.

For example, if you were a hacker and intended to crash someone’s computer, you wouldn’t want your victim to trace the attack back to your computer’s IP address.

Download PDF sample

Indian Foreign and Security Policy in South Asia: Regional Power Strategies by Sandra Destradi


by Charles
4.3

Rated 4.50 of 5 – based on 10 votes