Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Political Self-Sacrifice: Agency, Body and Emotion in International Relations (Cambridge Studies in International Relations)

Buy

Over the last decade the increasing phenomenon of suicide terrorism has raised questions about how it might be rational for individuals to engage in such acts. This book examines a range of different forms of political self-sacrifice, including hunger strikes, self-burning and non-violent martyrdom, all of which have taken place in resistance to foreign interference. Karin Fierke sets out to study the strategic and emotional dynamics that arise from the image of the suffering body, including political contestation surrounding the identification of the victim as a terrorist or martyr, the meaning of the death as suicide or martyrdom and the extent to which this contributes to the reconstruction of community identity. 'Political Self-Sacrifice' offers a counterpoint to rationalist accounts of international terrorism in terrorist and security studies, and is a novel contribution to the growing literature on the role of emotion and trauma in international politics.

(HTML tags aren't allowed.)

grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
Data Analysis Using SQL and Excel
Data Analysis Using SQL and Excel
Gordon Linoff and I have written three and a half books together. (Four, if we get to count the second edition of Data Mining Techniques as a whole new book; it didn’t feel like any less work.) Neither of us has written a book without the other before, so I must admit to a tiny twinge of regret upon first seeing the cover of this one without...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...

Location and Personalisation: Delivering Online and Mobility Services (BT Communications Technology)
Location and Personalisation: Delivering Online and Mobility Services (BT Communications Technology)
The world is charging towards the new network technologies of broadband and 3G and new application technologies face the challenge of where they can be used. This book takes a pragmatic look at two particular application technologies - location and personalisation - and presents an understanding of the technical and business impact of these...
Real World Camera Raw with Adobe Photoshop CS5
Real World Camera Raw with Adobe Photoshop CS5

If you’re reading this book because you want to be told that digital really is better than film, look elsewhere. The term “digital photography” may still be in current use, but sooner rather than later, it will be replaced by the simple term “photography.” If you want to be told that shooting digital raw is...

The Unified Modeling Language User Guide Second Edition
The Unified Modeling Language User Guide Second Edition
For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the artifacts of a software-intensive system. As the de facto standard modeling language, the UML facilitates communication and reduces confusion among project stakeholders. The recent...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy