Sorry, you do not have access to this eBook
A subscription is required to access the full text content of this book.
This volume appears just as the dust begins to settle over a period of rich, productive and stimulating transformation in the field of security studies. 1 Since the late 1980s and the receding of the Cold War, a flurry of research and scholarship has nurtured new theoretical positions, generated a treasure trove of new empirical material, and developed new methodologies to unite them. Though there are signs of a levelling-out of this flood of activity, it is unlikely that the evolution of security thinking will diminish. Indeed, much suggests that this vigorous development will continue.
A subscription is required to access the full text content of this book.
Other ways to access this content: