Challenges to Internal Security of India:/ (Record no. 8972)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05483nam a22001697a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240506b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 978-93-5532-255-5 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23 |
Classification number | 352.379 |
Item number | KUM |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Kumar Ashok |
245 ## - TITLE STATEMENT | |
Title | Challenges to Internal Security of India:/ |
Statement of responsibility, etc. | Ashok Kumar & Anekant Vipul |
250 ## - EDITION STATEMENT | |
Edition statement | 5 ed |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Chennai |
Name of publisher, distributor, etc. | McGraw Hill Education |
Date of publication, distribution, etc. | 2022 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | x, 312 p. ; |
Other physical details | soft bound |
Dimensions | 12x22.3 cm |
505 ## - FORMATTED CONTENTS NOTE | |
FORMATTED CONTENTS NOTE | Chapter 1 Internal Security <br/><br/>1.1 Internal and External Security <br/>1.2 Major Challenges to Internal Security <br/>1.3 Factors Responsible for Internal Security Problems <br/>1.4 Internal Security Doctrine <br/>1.5 External Security of India: Major Issues <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 2 Terrorism – Role of External State and Non-State Actors <br/><br/>2.1 Classification of Terrorism <br/>2.2 Categorisation of Terrorism in India <br/>2.3 Growth of Hinterland Terrorism <br/>2.4 Attempts to Revive Khalistan Movement <br/>2.5 Reasons for Spread of Terrorism <br/>2.6 Key Issues <br/>2.7 Analysing the Level of Preparedness Against Terrorism <br/>2.8 What More can be Done? <br/>2.9 What is the Difference Amongst Terrorism, Insurgency and Naxalism? <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 3 Jammu and Kashmir Militancy <br/><br/>3.1 Historical Background <br/>3.2 Kashmir Militancy—Low Intensity War or Proxy War by ISI <br/>3.3 Pulwama and Balakot: A Paradigm Shift in Strategy Against Terrorism <br/>3.4 Government of India’s Development-Oriented Programmes in Kashmir <br/>3.5 Key Issues <br/><br/>Probable Questions Based on this Chapter<br/><br/>Chapter 4 Insurgency in the North-East <br/><br/>4.1 North-East <br/>4.2 Historical Background of the North-East <br/>4.3 State-Wise Status <br/>4.4 Factors Responsible for Insurgency in the North-East<br/>4.5 Government’s Response to North-East Extremism <br/>4.6 Act East Policy <br/>4.7 North-East Insurgents and their Foreign Links <br/>4.8 Counter-Terrorism—Steps Being Taken/Required <br/>4.9 Key Issues <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 5 Left-Wing Extremism – A War Upon State <br/><br/>5.1 What is Left-Wing Extremism (LWE) or Naxalism (As it is Popularly Called)? <br/>5.2 Evolution of Naxalism in India <br/>5.3 Party Structure <br/>5.4 Aims and Objectives and Modus Operandi of the Naxalites <br/>5.5 Links with Other Terrorist Organisations and Foreign Countries <br/>5.6 Naxalites are not Really the Messiahs of the Downtrodden <br/>5.7 Factors Responsible for Rise of Naxalism <br/>5.8 Fight Against Naxalism <br/>5.9 Way Forward<br/>5.10 Key Issues <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 6 Linkages between Development and Spread of Extremism <br/><br/>6.1 Major Components of Development <br/>6.2 Factors Responsible for Spread of Extremism <br/>6.3 Positive Impact of Socio-Economic Development on Reducing Extremism <br/>6.4 Constitutional and Legal Safeguards for Tribal Population <br/>6.5 What Should be Done? <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 7 Communal Violence <br/><br/>7.1 Secularism—Indian Context <br/>7.2 Historical Background <br/>7.3 Factors Responsible for Communal Riots <br/>7.4 The Way Forward <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 8 Organised Crime <br/><br/>8.1 Meaning of Organised Crime <br/>8.2 Transnational Organised Crime <br/>8.3 Different Types of Organised Crimes <br/>8.4 What are the Links Between Terrorism and Organised Crime and How areThey Relevant in the Indian Context? <br/>8.5 Future of the Link Between Terrorism and Organised Crime and How They can be Broken <br/>8.6 UN Convention Against Transnational Organised Crime and the Protocols <br/>8.7 Money Laundering <br/>8.8 Black Money <br/>8.9 Maharashtra Control of Organised Crime Act (MCOCA), 1999 <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 9 Cyber Security and Role of Social Media <br/><br/>9.1 What is Cyber Security? <br/>9.2 Cyber Threats <br/>9.3 Snowden Revelations<br/>9.4 Threat to India’s Cyber Space<br/>9.5 Steps Taken by the Government of India <br/>9.6 Legal Framework <br/>9.7 International Cooperation in Cyber Security <br/>9.8 Social Media <br/>9.9 Key Issues <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 10 Security Challenges and their Management in Border Areas <br/><br/>10.1 Challenges of Border Security <br/>10.2 India’s Land Boundaries with Her Immediate Neighbours <br/>10.3 Coastal Security and Island Territories <br/>10.4 Challenges to Managing our Borders <br/>10.5 Techniques of Effective Border Management <br/>10.6 Kargil Review Committee Report and Its Observations on Border Management <br/>10.7 Securing the Coasts and Island Territories <br/>10.8 Air Space Security, Challenges and Management <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 11 Security Forces and their Mandate <br/><br/>11.1 Central Armed Police Forces (CAPF) <br/>11.2 Central Paramilitary Forces (CPMFs) <br/>11.3 Security Agencies and their Mandates <br/><br/>Probable Questions Based on this Chapter <br/><br/>Chapter 12 Disaster Management <br/><br/>12.1 Definition of Disaster <br/>12.2 Types of Disasters <br/>12.3 Phases of Disaster Management <br/>12.5 Disaster Response in India <br/>12.6 Institutional Framework <br/>12.7 National Disaster Management Plan <br/>12.8 Sendai Framework <br/>12.9 What is Needed? <br/>12.10 Key Issues <br/><br/><br/>Probable Questions Based on This Chapter <br/><br/><br/>Chapter 13 Current Issues <br/><br/><br/>13.1 Impact of Corona Virus on National Security <br/>13.2 Internet Restriction in India <br/>13.3 New Social Media Code <br/>13.4 National Investigation Agency (NIA) Act: The 2019 Amendment <br/>13.5 DRONE – A new emerging Threat<br/> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Koha issues (borrowed), all copies | 1 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Total Checkouts | Total Renewals | Full call number | Barcode | Checked out | Date last seen | Date last checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Non-fiction | Tetso College Library | Tetso College Library | Political Science | 06/05/2024 | 239.00 | 1 | 1 | 352.379 KUM | 13683 | 07/10/2024 | 03/06/2024 | 03/06/2024 | 06/05/2024 | Books |