ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Internal Security for Civil Services Main Examination GS Paper III

دانلود کتاب امنیت داخلی برای خدمات ملکی آزمون اصلی GS Paper III

Internal Security for Civil Services Main Examination GS Paper III

مشخصات کتاب

Internal Security for Civil Services Main Examination GS Paper III

ویرایش: 3 
نویسندگان:   
سری:  
ISBN (شابک) : 9789353437701 
ناشر: Pearson Education 
سال نشر: 2019 
تعداد صفحات: 337 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 10 مگابایت 

قیمت کتاب (تومان) : 44,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Internal Security for Civil Services Main Examination GS Paper III به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب امنیت داخلی برای خدمات ملکی آزمون اصلی GS Paper III نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
About Pearson
Tittle
Copyright
Dedication
Brief Contents
Contents
Preface
Acknowledgements
About the Author
Chapter 1 Introduction
	Introduction
	Definition
	Attributes of Internal Security
	Major Reasons/Causes/Sources of Internal Security Disturbance
	Traditional Internal Security Challenges
	Non-Traditional Internal Security Challenges
	India’s Internal Security Challenges
	Unstable Neighborhood
	Insurgency in the Northeast
	Threat of Communalism
	Caste Conflicts
	Regional and Ethnic Conflicts in Various Parts of the Country
	Left Wing Extremist Movement
	Situation in Jammu and Kashmir
	Trans-border Migration from Bangladesh
	Misuse of IT Tools
	China’s Interest in the Northeast
	Factors Responsible for Internal Security Problems
	Poverty and Unemployment
	Governance Deficit
	Communal Tension
	Unequal Growth
	Unstable Neighborhood
	Corruption
	Prolonged Judicial Processes
	Caste Consciousness
	India’s Defence and Security Policy
	India’s Security Objective
	India’s Security Interests
	Present Security Policy Situation
	Lacunae in the Present Policy
	Key Elements of Internal Security Doctrine
	Political Situation
	Socio-economic Consideration
	Governance
	Police and Other Security Forces
	Co-ordination between the Centre and State
	lntelligence
	Border Area Management
	Cyber Security Management
	Internal Policy Doctrine – Essential Aspects
	Physical Component
	Psychological Component
	Development and Spread of Extremism
	Underdevelopment and Extremism
	Practice Questions
Chapter 2 Terrorism
	Introduction
	Terrorism – Definition
	Types of Terrorism
	Ethno-nationalist Terrorism
	Religious Terrorism
	Rise of ISIS
	What Is ISIS?
	Where do they Operate From?
	What are Global Powers Doing to Counter ISIS?
	Do They Still Pose a Threat to Global Peace?
	Leftist Terrorism
	Rightist Terrorism
	State Terrorism
	State-Sponsored Terrorism
	Causes of Terrorism
	Ethno-Nationalism
	Alienation/Discrimination
	Religion
	Socio-economic Status
	Political Grievances
	Means of Terrorism
	Environmental Terrorism
	Weapons of Mass Destruction
	Chemical Weapons
	Nuclear Weapons
	Biological Weapons
	Cyber Terrorism
	Suicide Terrorism
	Effects of Terrorism
	Terrorism in India
	Forms of Terrorism in India
	Anti-Terror Laws in India
	Anti-Hijacking Act,
	Positive Aspects of the Act
	Areas for improvement
	Prevention of Terrorism Act,
	Noted Terrorist Attacks in India
	Pathankot Attack,
	Uri Attack
	Steps to Counter Terrorism
	Surgical Strikes
	Global Terror Database
	Benefits of MoU
	Role of Passive Stakeholders
	Educational Institutions
	Civil Society
	Media
	Role of Social Media in Terrorism
	Practice Questions
Chapter 3 Naxalism
	Naxalism – The Genesis
	Telangana Struggle
	Post-Telangana Struggle
	A Violent Dawn – Emergence of Naxalism
	Naxalism – An Evolution
	Causes for the Rise of Naxalism
	Initiatives by Individual States
	Reason for its Survival
	Strategy of the Naxals
	Recruitment Process of the Naxals
	Naxal Training and Structure
	Urban Naxalism
	The Government of India’s Approach
	Government Response
	Left Wing Extremism
	About the Division
	Review and Monitoring Mechanisms
	Other Initiatives
	Andhra Pradesh Model
	Practice Questions
Chapter 4 North East India
	Introduction
	Historical Background
	Political Integration
	Geography
	Interdependence
	Political Unrest
	Insurgency in the Northeast
	Assam
	History
	Location
	History
	ULFA
	ULFA’s Claim
	The Government’s Stand
	Negotiations
	Present Situation
	NDFB
	Ceasefire
	Arunachal Pradesh
	History
	The McMahon Line
	Insurgency
	Meghalaya
	History
	Insurgency Groups
	Mizoram
	History
	Insurgency
	Tripura
	History
	Insurgency
	Terrorist/Insurgent Groups – Tripura
	Manipur
	History
	Inner Line Permit
	Manipur’s Demand for ILP
	Reason for Manipur’s ILP Demand
	Nagaland
	History
	Road to Statehood
	Later Insurgency Movement
	Peace Process
	Insurgency Groups
	Naga Peace Accord
	Active Terrorist/Insurgent Groups
	Inactive Terrorist/Insurgent Groups
	Factors Responsible for Insurgency in the Northeast
	Government’s Response to Northeast Extremism
	Counter Insurgency – Steps Being Taken
	Recommendations of Bezberua Committee
	Development of Northeast Region
	Gross State Domestic Product
	Unemployment Higher in Urban Areas
	Poverty Levels
	Transport Sector
	Power Production
	Literacy
	Infant Mortality
	Ease of Doing Business
	Practice Questions
Chapter 5 Role of External State and Non-State Actors in Creating Challenges to Internal  Security
	Threats from External State Actors
	Threat from China
	China not a Threat
	China as a Threat
	China’s Role in the Northeast
	Threats from Pakistan
	Threats from External Non-State Actors
	Terrorist Organisations
	Drug Cartels
	Human-trafficking Cartels
	Fake Currency Rackets
	Cyber Attacks
	Maoists/Naxalites
	Insurgents/Cross-Border Ethnic Groups
	Illegal Immigrants
	Multi-National Corporations
	Civil Society Organisations/NGOs
	Pirates
	Anti-Piracy Operations by the Indian Navy
	Practice Questions
Chapter 6 Coastal Security
	Introduction
	The Coastal Security Threat
	Coastal Security Scheme
	Coastal Security System
	Inadequacies in Coastal Security Architecture
	Coastal Security-Steps to Improve
	Inter-agency Cooperation
	Technological Strengthening
	The National Command Control Centre and Intelligence Network
	Fishermen and Coastal Security
	Maritime Training to State Police
	Practice Questions
Chapter 7 Cyber Security
	Introduction
	Types of Attacks
	Cyber Terrorism
	Tools of Cyber Terrorism/Crime
	Cyber Warfare
	Types of Cyber Warfare
	Challenges to India’s Cyber Security
	Cyber Attacks against India
	Cyber War by Pakistan
	Cyber War by China
	Existing Cyber Security Initiatives
	Information Technology Act,
	Cyber Appellate Tribunal (CAT)
	Indian Computer Emergency Response Team (CERT-In)
	National Information Board (NIB)
	National Crisis Management Committee (NCMC)
	National Information Infrastructure Protection Centre (NIIPC)
	Challenges and Concerns of Cyber Security
	Government of India’s Encryption Policy (Repealed)
	What Is Encryption?
	How did Encryption Originate?
	What was the Draft Encryption Policy?
	Concerns Regarding the Draft Encryption Policy
	National Cyber Security Policy
	Key Highlights
	Standing Committee Report on Cyber Crime, Cyber Security and Right to Privacy
	National Cyber Security Agency
	Aadhaar and its Judgement
	Wannacry Attack –  2017
	Hemachandra Committee –  2017
	Forensic DNA Profiling
	How DNA Profiling Works?
	Draft of DNA Technology (Use and Application) Regulation Bill,
	Issues with DNA Bill
	Srikrishna Committee
	Major Highlights of the Report
	Top Breaches in
	Practice Questions
Chapter 8 Money Laundering
	Definitions
	Impact on Global Economy
	Terrorism Financing
	Definition
	Difference in Perspective
	Money Laundering and Terrorist Financing
	Methods of Money Laundering
	Placement
	Layering
	Integration
	Adverse Effects of Money Laundering
	Need for Combating Money Laundering
	Global Initiatives
	Financial Action Task Force
	Financial Action Task Force Recommendations
	Extent of Problem of Money Laundering in India
	High Profile Money Laundering Cases in India
	Prevention of Money Laundering—Indian Initiatives
	Prevention of Money Laundering Act
	The Undisclosed Foreign Income and Assets (Imposition of Tax) Act, 2015
	Important Provisions of the Act
	Penalty
	Prosecutions
	Safeguards
	One-Time Compliance Opportunity
	Amendment to Prevention of Money Laundering Act
	Benami Transactions (Prohibition) Amendment Act,
	What Is Benami?
	Amendments
	Second ARC Recommendations on Prevention of Money Laundering
	Anti-Money Laundering Standards
	Enforcement Directorate
	Financial Intelligence Unit
	Central Economic Intelligence Bureau
	White Paper on Black Money—Government of India
	Special Investigation Team Recommends Steps to Curb Money Laundering
	View of the Supreme Court on the Subject
	Conclusion
	Practice Questions
Chapter 9 Security Challenges and Their Management in Border Areas
	Introduction
	Challenges In India’s Borders
	Problems Faced by the People Living in Border Areas
	India’s International Borders
	The Indo-Pakistan Border
	The Sino-Indian Border
	The Indo-Nepal and Indo-Bhutan Border
	The Indo-Myanmar Border
	The Indo-Bangladesh Border
	Border Management
	Border Area Development Programme (BADP)
	Lacunae in India’s Border Management
	The Way Forward
	Practice Questions
Chapter 10 Organised Crime
	Introduction
	Characteristics of Organised Crime
	Types of Organised Crime
	Drug Trafficking
	Smuggling
	Money Laundering
	Terrorism
	Contract Killings
	Kidnapping for Ransom
	Migrant Trafficking
	Flesh Trade
	Arms Proliferation
	Cyber Crime
	Wildlife Trafficking
	Problems in Control Efforts
	Inadequate Legal Structure
	Difficulties in Obtaining Proof
	Lack of Resources and Training
	Lack of Co-ordination
	Criminal, Political and Bureaucratic Nexus
	Dual Criminality
	Transnational Organised Crime
	United Nations Convention against Transnational Organized Crime
	Differences between Terrorism and Organised Crime
	Linkage between Organised Crime and Terrorism
	The Way Forward
	Enhancing International Co-operation
	Practice Questions
Chapter 11 Various Security Forces, Agencies and Their Mandates
	Armed Forces
	Indian Army
	Indian Navy
	Indian Air Force
	Central Armed Police Forces
	Assam Rifles
	Border Security Force
	The Central Industrial Security Force
	Central Reserve Police Force (CRPF)
	Indo-Tibetan Border Police
	National Security Guard
	Sashastra Seema Bal
	Paramilitary Forces
	Indian Coast Guard
	Home Guard
	Railway Protection Force
	Central Intelligence and Investigating Agencies
	National Investigation Agency (NIA)
	Federal Questions Regarding NIA’s Power
	Central Bureau of Investigation
	Research and Analysis Wing
	Intelligence Bureau
	Enforcement Directorate
	Directorate General of Income Tax Investigation
	Narcotics Control Bureau
	National Technical Research Organisation
	Crime and Criminal Tracking Network System
	NATGRID
	Criticisms
	National Fingerprints Database
	Benefits of the Move
	Practice Questions
Chapter 12 Changed Security Situation in Jammu and Kashmir—The Road Ahead
	Introduction
	The External Dimension
	Internal Dynamics in Jammu and Kashmir
	1953: The Assertion of Indian Nationalism
	1989: The Politics of Violence
	Peace Process – 1999-2007
	2008-2013: Breakdown of Internal Peace Process and Emergence of Protests/Agitation Politics
	Build-up to Present Situation
	Jammu and Kashmir and Pakistan: Decoupled
	The Way Ahead
	1. Decoupling Pakistan from Kashmir
	2. Addressing Kashmir Therapeutically
	3. Political Matters and Personal Grievances
	4. Dialogue
	5. Administrative Measures
	6. Youth
	7. Return and Rehabilitation of Kashmiri Migrants
	8. The Rejuvenation of Police Force
	9. Security Forces
	10. Study Reports
	Conclusion
ANNEXURE 1 Summary of 5th Report of 2nd ARC on Public Order National Security, Economic Development and Social Harmony
ANNEXURE 2 Extracts of Volume 5 on Internal Security, Criminal Justice and Centre State Cooperation of Commission on Central State Relationship Headed by Justice M. M. Punnchi
ANNEXURE 3 Extracts of Report of Supreme Court Appointed Commission on AFSPA Headed by Justice Santhosh Hedge
ANNEXURE 4 Extracts of Guidelines on Communal Harmony
ANNEXURE 5 Extracts of the Report of the Committee Under the Chairmanship of Shri M.P. Bezbaruah to Look into the Concerns of the People of the North East Living in Other Parts of the Country
ANNEXURE 6 National Cyber Security Policy –  Ministry of Communication and Information Technology
ANNEXURE 7 Role of Naxal Management Division
ANNEXURE 8 Role of Left Wing Extremism (LWE) Division
ANNEXURE 9 Role of Ministry of Home Affairs in Border Management
Index




نظرات کاربران