Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Internal Security Comprehensive Text book for civil services examination Pavneet Singh

By: Material type: TextTextPublication details: Chennai Mc GrawHill 2022ISBN:
  • 9789354600470
Subject(s): DDC classification:
  • 371.26 SIN/INT
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Home library Collection Call number Status Date due Barcode
Book Book Campus Library Kariavattom Reference Campus Library Kariavattom Competitive Exam 001.2 SIN.I (Browse shelf(Opens below)) Available UCL33085
Book Book Study Centre Pandalam ,University of Kerala Study Centre Pandalam ,University of Kerala Competitive Exam 371.26 SIN/INT (Browse shelf(Opens below)) Available USCP2530

Section-1: Deconstruction Of How Nations Construct Security Narratives


• Chapter-1: Foundational Concepts In Security Studies
• Chapter-2: Fault Lines Of The Republic, COVID-19 And Non-Traditional Security Threats To India


Section-2: Various Security Forces And Their Mandate & Intelligence Tradecraft


• Chapter-1: Security Forces Of the Union And Their Operational Analysis
• Chapter-2: Revolution In Military Affairs And Indian Way of Fighting Wars
• Chapter-3: Security Forces Of the States And Law And Order Administration In India
• Chapter-4: Intelligence Tradecraft, Secrets Of Spy Warfare And Bleeding India By Thousand Cuts


Section-3: Global Fundamentalism and Its Threat To The Security of India


• Chapter-1: The Clash Of Messianic Civilisations, Secrets Of Divine Love And Cosmic Wars
• Chapter-2: The Al Qaeda And Its Threat To The Security of India
• Chapter-3: The Islamic State And Its Threat To The Security of India


Section-4: Role of External State and Non-State Actors in Creating Challenges To Internal Security: The Terrorism and Counterterrorism In Punjab


• Chapter-1: Subversion, Sabotage In Punjab And The Khalistan Terrorism
• Chapter-2: Counterterrorism Approaches, Operations And Gill Doctrine In Punjab


Section-5: Role of External State and Non-State Actors in Creating Challenges To Internal Security: Secessionist Movements, Terrorism And Counterterrorism In The Northeast


• Chapter-1: Subversion Manipur, Meghalaya, Tripura And Arunachal Pradesh And Countersubversion
• Chapter-2: Subversion In State Of Nagaland And Countersubversion Measures
• Chapter-3: Subversion In State Of Assam And Countersubversion Approaches
• Chapter-4: Subversion In State Of Mizoram And Countersubversion Strategies
• Chapter-5: Counterterrorism Approaches, Operations And Issues Of AFSPA in Northeast India


Section-6: Role of External State and Non-State Actors in Creating Challenges To Internal Security: Competitive Terrorism Industry and Counterterrorism In Jammu and Kashmir


• Chapter-1: The Operation Datta Khel And Operation Gulmarg In Jammu and Kashmir
• Chapter-2: The Subversion And Sabotage Through Master Cell And Al-Fatah In Kashmir
• Chapter-3: Competitive Terrorism Industry of Tanzeems And Over Ground Workers
• Chapter-4: Security Implications Of Abrogation Of Article-370 And Postscript Of Kashmir
• Chapter-5: Threat Of Drone Terrorism, Detection And Neutralization Measures
• Chapter-6: Counterterrorism Approaches And Operations In Jammu and Kashmir


Section-7: Home Grown Terrorism In India And Counterterrorism Strategies


• Chapter-1: The Subversive By Student Islamic Movement Of India And Indian Mujahedeen
• Chapter-2: Counterterrorism Strategies To Tackle Home Grown Terrorism


Section-8: Counterterrorism Financing, Doctrines, Laws And Counter Narrative of India


• Chapter-1: Financing Of Terrorism And Counterterrorism Financing Strategies Of India
• Chapter-2: Counterterrorism Doctrines And Counterterrorism Strategies Of India
• Chapter-3: Legal Architecture and Counterterrorism Laws In India
• Chapter-4: De-Radicalisation Models of India To Tackle Terrorism
• Chapter-5: The Indian Counter Narrative For Radical Ideologies
Section-9: Linkages Of Organised Crime With Terrorism


• Chapter-1: Origins Of Linkages Indian Underworld And Its Linkage With Terrorism
• Chapter-2: Prevention Strategies For Organised Crime In India


Section-10: Security Threats And Domestic Fault Lines


• Chapter-1: Communalism And Threat To The Security of India
• Chapter-2: Mob Lynchings And Threat To The Security of India


Section-11: Linkages Between Development And Spread of Extremism


• Chapter-1: The Naxalites And Their War Of Narrative
• Chapter-2: The Strategy, Tactics and Financing by Naxalites
• Chapter-3: Naxalite Movement In East India, Salwa Judum And Issues In Schedule V Of Constitution
• Chapter-4: Urban Naxals and Strategies For Subversion And Sabotage
• Chapter-5: Government Strategies And Approaches To Counter Naxalite Narrative


Section-12: Money Laundering and Its Prevention


• Chapter-1: Money Laundering And Methodologies Of Financial Crimes
• Chapter-2: Tax Heavens, Treasure Islands, Hawala And Loophole Games
• Chapter-3: Strategies To Counter Money Laundering: Domestic And International Approaches


Section-13: Cyberspace Threats To India’s Security In The Civilian Realm And Prevention Strategies


• Chapter-1: Basics Of Cybersecurity, Internet Governance And The Fifth Domain
• Chapter-2: Challenges To Internal Security Through Communication Networks
• Chapter-3: The World Of Cyber Crimes, Dark Net And The Digital Underworld
• Chapter-4: Role of Media and Social Networking Sites In Internal Security Challenges
• Chapter-5: India’s Cyber Space Ecosystem, Cyber Laws And Strategies For Cyber Deterrence


Section-14: Cyberspace Threats To India’s Security In The Military Realm And Prevention Strategies


• Chapter-1: Artificial Intelligence As Strategic Force Multiplier For Indian Security
• Chapter-2: Blockchain And Big Data As Enablers Of India’s National Security
• Chapter-3: India’s Strategy For Information Wars, Cyber Wars And Cyber Sabotage
• Chapter-4: Electronic Warfare, Military Operations And Network Centric War Paradigms Of India
• Chapter-5: Cyber Terrorism, Invisible Jihad And India’s Prevention Strategy For Cyber Terrorism


Section-15: Security Challenges And Their Management in Border Areas


• Chapter-1: Ceasefire Violations, Escalation Dynamics At India-Pakistan Border
• Chapter-2: The Red Fear And Salami Slicing At India-China Border
• Chapter-3: Sledgehammer Tactics And Map Machinations At India-Nepal Border
• Chapter-4: Hot Pursuit Operations And Challenges At India-Myanmar & Bangladesh Border
• Chapter-5: Samudra Manthan, Coastal Security Challenges & Necklace Of Diamonds Strategy




Appendix A: Previous year mains Qs from 1979-2020 (with QR code video discussions)
Appendix B: Sample Qs for practice

There are no comments on this title.

to post a comment.