Internal Security Comprehensive Text book for civil services examination Pavneet Singh
Material type: TextPublication details: Chennai Mc GrawHill 2022ISBN:- 9789354600470
- 371.26 SIN/INT
Item type | Current library | Home library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Book | Campus Library Kariavattom Reference | Campus Library Kariavattom | Competitive Exam | 001.2 SIN.I (Browse shelf(Opens below)) | Available | UCL33085 | ||
Book | Study Centre Pandalam ,University of Kerala | Study Centre Pandalam ,University of Kerala | Competitive Exam | 371.26 SIN/INT (Browse shelf(Opens below)) | Available | USCP2530 |
Section-1: Deconstruction Of How Nations Construct Security Narratives
• Chapter-1: Foundational Concepts In Security Studies
• Chapter-2: Fault Lines Of The Republic, COVID-19 And Non-Traditional Security Threats To India
Section-2: Various Security Forces And Their Mandate & Intelligence Tradecraft
• Chapter-1: Security Forces Of the Union And Their Operational Analysis
• Chapter-2: Revolution In Military Affairs And Indian Way of Fighting Wars
• Chapter-3: Security Forces Of the States And Law And Order Administration In India
• Chapter-4: Intelligence Tradecraft, Secrets Of Spy Warfare And Bleeding India By Thousand Cuts
Section-3: Global Fundamentalism and Its Threat To The Security of India
• Chapter-1: The Clash Of Messianic Civilisations, Secrets Of Divine Love And Cosmic Wars
• Chapter-2: The Al Qaeda And Its Threat To The Security of India
• Chapter-3: The Islamic State And Its Threat To The Security of India
Section-4: Role of External State and Non-State Actors in Creating Challenges To Internal Security: The Terrorism and Counterterrorism In Punjab
• Chapter-1: Subversion, Sabotage In Punjab And The Khalistan Terrorism
• Chapter-2: Counterterrorism Approaches, Operations And Gill Doctrine In Punjab
Section-5: Role of External State and Non-State Actors in Creating Challenges To Internal Security: Secessionist Movements, Terrorism And Counterterrorism In The Northeast
• Chapter-1: Subversion Manipur, Meghalaya, Tripura And Arunachal Pradesh And Countersubversion
• Chapter-2: Subversion In State Of Nagaland And Countersubversion Measures
• Chapter-3: Subversion In State Of Assam And Countersubversion Approaches
• Chapter-4: Subversion In State Of Mizoram And Countersubversion Strategies
• Chapter-5: Counterterrorism Approaches, Operations And Issues Of AFSPA in Northeast India
Section-6: Role of External State and Non-State Actors in Creating Challenges To Internal Security: Competitive Terrorism Industry and Counterterrorism In Jammu and Kashmir
• Chapter-1: The Operation Datta Khel And Operation Gulmarg In Jammu and Kashmir
• Chapter-2: The Subversion And Sabotage Through Master Cell And Al-Fatah In Kashmir
• Chapter-3: Competitive Terrorism Industry of Tanzeems And Over Ground Workers
• Chapter-4: Security Implications Of Abrogation Of Article-370 And Postscript Of Kashmir
• Chapter-5: Threat Of Drone Terrorism, Detection And Neutralization Measures
• Chapter-6: Counterterrorism Approaches And Operations In Jammu and Kashmir
Section-7: Home Grown Terrorism In India And Counterterrorism Strategies
• Chapter-1: The Subversive By Student Islamic Movement Of India And Indian Mujahedeen
• Chapter-2: Counterterrorism Strategies To Tackle Home Grown Terrorism
Section-8: Counterterrorism Financing, Doctrines, Laws And Counter Narrative of India
• Chapter-1: Financing Of Terrorism And Counterterrorism Financing Strategies Of India
• Chapter-2: Counterterrorism Doctrines And Counterterrorism Strategies Of India
• Chapter-3: Legal Architecture and Counterterrorism Laws In India
• Chapter-4: De-Radicalisation Models of India To Tackle Terrorism
• Chapter-5: The Indian Counter Narrative For Radical Ideologies
Section-9: Linkages Of Organised Crime With Terrorism
• Chapter-1: Origins Of Linkages Indian Underworld And Its Linkage With Terrorism
• Chapter-2: Prevention Strategies For Organised Crime In India
Section-10: Security Threats And Domestic Fault Lines
• Chapter-1: Communalism And Threat To The Security of India
• Chapter-2: Mob Lynchings And Threat To The Security of India
Section-11: Linkages Between Development And Spread of Extremism
• Chapter-1: The Naxalites And Their War Of Narrative
• Chapter-2: The Strategy, Tactics and Financing by Naxalites
• Chapter-3: Naxalite Movement In East India, Salwa Judum And Issues In Schedule V Of Constitution
• Chapter-4: Urban Naxals and Strategies For Subversion And Sabotage
• Chapter-5: Government Strategies And Approaches To Counter Naxalite Narrative
Section-12: Money Laundering and Its Prevention
• Chapter-1: Money Laundering And Methodologies Of Financial Crimes
• Chapter-2: Tax Heavens, Treasure Islands, Hawala And Loophole Games
• Chapter-3: Strategies To Counter Money Laundering: Domestic And International Approaches
Section-13: Cyberspace Threats To India’s Security In The Civilian Realm And Prevention Strategies
• Chapter-1: Basics Of Cybersecurity, Internet Governance And The Fifth Domain
• Chapter-2: Challenges To Internal Security Through Communication Networks
• Chapter-3: The World Of Cyber Crimes, Dark Net And The Digital Underworld
• Chapter-4: Role of Media and Social Networking Sites In Internal Security Challenges
• Chapter-5: India’s Cyber Space Ecosystem, Cyber Laws And Strategies For Cyber Deterrence
Section-14: Cyberspace Threats To India’s Security In The Military Realm And Prevention Strategies
• Chapter-1: Artificial Intelligence As Strategic Force Multiplier For Indian Security
• Chapter-2: Blockchain And Big Data As Enablers Of India’s National Security
• Chapter-3: India’s Strategy For Information Wars, Cyber Wars And Cyber Sabotage
• Chapter-4: Electronic Warfare, Military Operations And Network Centric War Paradigms Of India
• Chapter-5: Cyber Terrorism, Invisible Jihad And India’s Prevention Strategy For Cyber Terrorism
Section-15: Security Challenges And Their Management in Border Areas
• Chapter-1: Ceasefire Violations, Escalation Dynamics At India-Pakistan Border
• Chapter-2: The Red Fear And Salami Slicing At India-China Border
• Chapter-3: Sledgehammer Tactics And Map Machinations At India-Nepal Border
• Chapter-4: Hot Pursuit Operations And Challenges At India-Myanmar & Bangladesh Border
• Chapter-5: Samudra Manthan, Coastal Security Challenges & Necklace Of Diamonds Strategy
Appendix A: Previous year mains Qs from 1979-2020 (with QR code video discussions)
Appendix B: Sample Qs for practice
There are no comments on this title.