In this Book

Natural Security
summary
Arms races among invertebrates, intelligence gathering by the immune system and alarm calls by marmots are but a few of nature's security strategies that have been tested and modified over billions of years. This provocative book applies lessons from nature to our own toughest security problems—from global terrorism to the rise of infectious disease to natural disasters. Written by a truly multidisciplinary group including paleobiologists, anthropologists, psychologists, ecologists, and national security experts, it considers how models and ideas from evolutionary biology can improve national security strategies ranging from risk assessment, security analysis, and public policy to long-term strategic goals.

Table of Contents

  1. Cover
  2. pp. 1-1
  3. restricted access Download |
  1. Title Page, Copyright
  2. pp. 2-5
  3. restricted access Download |
  1. Contents
  2. pp. v-vi
  3. restricted access Download |
  1. Contributors
  2. pp. vii-viii
  3. restricted access Download |
  1. Acknowledgments
  2. pp. ix-11
  3. restricted access Download |
  1. Part One: Introduction
  2. pp. 1-13
  3. restricted access Download |
  1. 1. The Origins of Natural Security
  2. pp. 3-13
  3. restricted access Download |
  1. 2. Living with Risk
  2. pp. 14-22
  3. restricted access Download |
  1. Part Two: Life History and Security
  2. pp. 23-35
  3. restricted access Download |
  1. 3. Security, Unpredictability, and Evolution: Policy and the History of Life
  2. pp. 25-41
  3. restricted access Download |
  1. 4. From Bacteria to Belief: Immunity and Security
  2. pp. 42-68
  3. restricted access Download |
  1. Part Three: Security Today
  2. pp. 69-81
  3. restricted access Download |
  1. 5. Corporations and Bureaucracies under a Biological Lens
  2. pp. 71-85
  3. restricted access Download |
  1. 6. Selection, Security, and Evolutionary International Relations
  2. pp. 86-102
  3. restricted access Download |
  1. Part Four: Evolution’s Imprint: Psychology and the Roots of Terrorism
  2. pp. 103-115
  3. restricted access Download |
  1. 7. Militants and Martyrs: Evolutionary Perspectives on Religion and Terrorism
  2. pp. 105-124
  3. restricted access Download |
  1. 8. Causes of and Solutions of Islamic Fundamentalist Terrorism
  2. pp. 125-140
  3. restricted access Download |
  1. 9. The Power of Moral Belief
  2. pp. 141-144
  3. restricted access Download |
  1. Part Five: Ecology and Security
  2. pp. 145-157
  3. restricted access Download |
  1. 10. Fourteen Security Lessons from Antipredator Behavior
  2. pp. 147-158
  3. restricted access Download |
  1. 11. Population Models and Counterinsurgency Strategies
  2. pp. 159-185
  3. restricted access Download |
  1. 12. The Infectiousness of Terrorist Ideology: Insights from Ecology and Epidemiology
  2. pp. 186-206
  3. restricted access Download |
  1. Part Six: Synthesis
  2. pp. 207-219
  3. restricted access Download |
  1. 13. Paradigm Shifts in Security Strategy: Why Does It Take Disasters to Trigger Change?
  2. pp. 209-239
  3. restricted access Download |
  1. 14. Network Analysis Links Parts to the Whole
  2. pp. 240-260
  3. restricted access Download |
  1. 15. A Holistic View of Natural Security
  2. pp. 261-278
  3. restricted access Download |
  1. Index
  2. pp. 279-289
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.