In this Book

summary
Arms races among invertebrates, intelligence gathering by the immune system and alarm calls by marmots are but a few of nature's security strategies that have been tested and modified over billions of years. This provocative book applies lessons from nature to our own toughest security problems—from global terrorism to the rise of infectious disease to natural disasters. Written by a truly multidisciplinary group including paleobiologists, anthropologists, psychologists, ecologists, and national security experts, it considers how models and ideas from evolutionary biology can improve national security strategies ranging from risk assessment, security analysis, and public policy to long-term strategic goals.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. p. 1
  3. restricted access
    • Download PDF Download
  1. Title Page, Copyright
  2. pp. 2-5
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-vi
  3. restricted access
    • Download PDF Download
  1. Contributors
  2. pp. vii-viii
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. ix-11
  3. restricted access
    • Download PDF Download
  1. Part One: Introduction
  2. pp. 1-13
  3. restricted access
    • Download PDF Download
  1. 1. The Origins of Natural Security
  2. pp. 3-13
  3. restricted access
    • Download PDF Download
  1. 2. Living with Risk
  2. pp. 14-22
  3. restricted access
    • Download PDF Download
  1. Part Two: Life History and Security
  2. pp. 23-35
  3. restricted access
    • Download PDF Download
  1. 3. Security, Unpredictability, and Evolution: Policy and the History of Life
  2. pp. 25-41
  3. restricted access
    • Download PDF Download
  1. 4. From Bacteria to Belief: Immunity and Security
  2. pp. 42-68
  3. restricted access
    • Download PDF Download
  1. Part Three: Security Today
  2. pp. 69-81
  3. restricted access
    • Download PDF Download
  1. 5. Corporations and Bureaucracies under a Biological Lens
  2. pp. 71-85
  3. restricted access
    • Download PDF Download
  1. 6. Selection, Security, and Evolutionary International Relations
  2. pp. 86-102
  3. restricted access
    • Download PDF Download
  1. Part Four: Evolution’s Imprint: Psychology and the Roots of Terrorism
  2. pp. 103-115
  3. restricted access
    • Download PDF Download
  1. 7. Militants and Martyrs: Evolutionary Perspectives on Religion and Terrorism
  2. pp. 105-124
  3. restricted access
    • Download PDF Download
  1. 8. Causes of and Solutions of Islamic Fundamentalist Terrorism
  2. pp. 125-140
  3. restricted access
    • Download PDF Download
  1. 9. The Power of Moral Belief
  2. pp. 141-144
  3. restricted access
    • Download PDF Download
  1. Part Five: Ecology and Security
  2. pp. 145-157
  3. restricted access
    • Download PDF Download
  1. 10. Fourteen Security Lessons from Antipredator Behavior
  2. pp. 147-158
  3. restricted access
    • Download PDF Download
  1. 11. Population Models and Counterinsurgency Strategies
  2. pp. 159-185
  3. restricted access
    • Download PDF Download
  1. 12. The Infectiousness of Terrorist Ideology: Insights from Ecology and Epidemiology
  2. pp. 186-206
  3. restricted access
    • Download PDF Download
  1. Part Six: Synthesis
  2. pp. 207-219
  3. restricted access
    • Download PDF Download
  1. 13. Paradigm Shifts in Security Strategy: Why Does It Take Disasters to Trigger Change?
  2. pp. 209-239
  3. restricted access
    • Download PDF Download
  1. 14. Network Analysis Links Parts to the Whole
  2. pp. 240-260
  3. restricted access
    • Download PDF Download
  1. 15. A Holistic View of Natural Security
  2. pp. 261-278
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 279-289
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.