SINGAPORE
Law
Welcome Guest | Login
SEARCH
Advanced
Outside in the Teaching Machine: Spivak, Gayatri Chakravorty: BOOKS KINOKUNIYA
Book Details
Outside in the Teaching Machine
Outside in the Teaching Machine
Publisher : Routledge
Published Date : 2008/09
Binding : Paperback
ISBN : 9780415964821

BookWeb Price : S$ 70.35
Kinokuniya Privilege Card member price : S$ 63.32

Availability Status : Available for order from suppliers.
Usually dispatches within 3 - 4 weeks.
Language : English

Book Description
Source: ENG
Academic Descriptors: A23130000 A31604846
Place of Publication: United States
Edition: Reprint
Subject Development: History
Academic Level: Undergraduate
Table of Contents
 
Foreword                                           ix
Foreword to the Routledge Classics Edition         xi
    In a Word: Interview                           1  (26)
    More on Power/Knowledge                        27 (31)
    Marginality in the Teaching Machine            58 (28)
    Woman in Difference                            86 (21)
    Limits and Openings of Marx in Derrida         107(27)
    Feminism and Deconstruction, Again:            134(24)
    Negotiations
    French Feminism Revisited                      158(35)
    Not Virgin Enough to Say That [S]he            193(7)
    Occupies the Place of the Other
    The Politics of Translation                    200(26)
    Inscriptions: Of Truth to Size                 226(18)
    Reading The Satanic Verses                     244(29)
    Sammy and Rosie Get Laid                       273(14)
    Scattered Speculations on the Question of      287(34)
    Culture Studies
Notes                                              321(44)
Index                                              365
 

Gayatri Chakravorty Spivak is one of the most pre-eminent postcolonial theorists writing today and a scholar of genuinely global reputation. This collection, first published in 1993, presents some of Spivak's most engaging essays on works of literature, such as Salman Rushdie's controversial "Satanic Verses", and twentieth century thinkers, such as Jacques Derrida and Karl Marx. Spivak relentlessly questions and deconstructs power structures where ever they operate. In doing so, she provides a voice for those who can not speak, proving that the true work of resistance takes place in the margins, "Outside in the Teaching Machine".

Contents
1. In a WordTeaching Machine 4. Woman in Differnce 5. Limits and Openings of Marx in Derrida 6. Feminism and Deconstruction, Again: Negotiations 7. French Feminism Revisited 8. Not Virgin Enough to Say That [S]he Occupies the Place of the Other 9. The Politics of Translation 10. Inscriptions: Of Truth to Size 11. Reading The Satanic Verses 12. Sammy and Rosie Get Laid 13. Scattered Speculations of the Question of Culture Studiesguidance to decision-makers in applying sometimes limited resources to reduce risk and ensure operational resiliency. Our critical infrastructure is vast and made up of many component parts. In many cases, it may not be practical or affordable to secure every infrastructure node. For years, experts-as a part of the risk assessment process-have tried to better identify and distinguish higher from lower risks through risk segmentation. In the second section of the book, the authors present examples to distinguish between high and low risks and corresponding protection measures. In some cases, protection measures do not prevent undesired events from occurring. In others, protection of all infrastructure components is not feasible. As such, this section describes how to evaluate and design resilience in these unique scenarios to manage costs while most effectively ensuring infrastructure system protection.With insight from the authors' decades of experience, this book provides a high-level, practical analytical framework that public and private sector owners and operators of critical infrastructure can use to better understand and evaluate infrastructure security strategies and policies. Strengthening the entire homeland security enterprise, the book presents a significant contribution to the science of critical infrastructure protection and resilience.

Contents
SECURITY RISK ASSESSMENT Introduction to Security Risk Assessment Security Risk Assessment Protection System Robustness Security System Resiliency System Approach for Security Risk Assessment Determine Undesired Events, Associated Critical Assets, and Available Resources Threat Analysis Assess Likelihood of Initiating Event Estimate Protection System Effectiveness Assess Consequences for Undesired Event Estimate Security Risk Upgrade the Protection System to Be Robust against Undesired Event Upgrade Security System to Be Resilient for Undesired Event Undesired Events, Associated Critical Assets, and Available Resources Critical Assets Logic Model Threat Analysis Malevolent Threats Type of Adversary Adversary Capability Design Basis Threat Natural Hazards Hurricane Earthquake Tornado Flood Accidents Likelihood of Initiating Events Malevolent Threat Outsider Threat Insider Threat Natural Hazard Threat Accident Threat Assess Consequences and Responses for Undesired Event Reference Table for Consequences Estimating Consequence Level for Undesired Events Assessment of Protection System Effectiveness Assessment of Protection System Effectiveness for Malevolent Threat Adversary Scenarios Effective Physical Protection System for the Malevolent Threat Physical Protection System Effectiveness Assessment Physical Protection System Effectiveness Assessment-Example Protection System Effectiveness against Blast Attacks Protection System Effectiveness for Blast Attacks Assessment-Example Mitigation of the Insider Threat Cyber Protection System Effectiveness Cyber Functions Cyber Protection System Effectiveness Assessment-Example Effectiveness for Natural Hazards Protection System Effectiveness Assessment for Natural Hazards-Example Protection System Effectiveness for Accidents Protection System Effectiveness Assessment for Accidents-Example Estimate Security Risk System Approach for Security Risk Assessment Determine Undesired Events, Associated Critical Assets, and Available Resources Threat Analysis Assess Likelihood of Initiating Event Estimate Protection System Effectiveness Assess Consequences for Undesired Event Estimate Security Risk Upgrade Protection System to Be Robust against Undesired Event Upgrade Security System to Be Resilient for Undesired Event EVALUATION AND DESIGN OF RESILIENT SYSTEMS Motivating Infrastructure Resilience Analysis Current State of Resilience Assessment Definitions of Resilience Domains Assessment Processes Structural Resilience Assessment Methodologies Performance-Based Measurement Hybrid Approaches Gaps and Limitations Infrastructure Resilience Analysis Methodology Definition of Resilience Measurement of Resilience Costs Systemic Impact Total Recovery Effort Resilience Cost Calculation Use and Interpretation of Recovery-Dependent Resilience Costs and Optimal Resilience Costs Quantities Additional Notes on Calculation of Resilience Costs Qualitative Structural Analysis Absorptive Capacity Adaptive Capacity Restorative Capacity Additional Notes on Resilience Capacities Applying the Infrastructure Resilience Analysis Methodology Case Studies Using the Infrastructure Resilience Analysis Framework Qualitative Resilience Analysis Case Study Define Systems Define Scenario Perform Structural Analysis Analysis Conclusions Quantitative Resilience Analysis Case Study Define Systems Define Scenario Define Metrics and Obtain Data Calculate Resilience Costs Perform Structural Analysis Case Study on Optimizing Resilient Recovery Strategies Define Systems Define Scenario Define Metrics Obtain Data and Calculate Resilience Costs Future Directions APPENDIX A: EXAMPLE USE OF FAULT TREES TO IDENTIFY CRITICAL ASSETS APPENDIX B: PHYSICAL PROTECTION FEATURES PERFORMANCE DATA