@article{Bagby_1994, title={The Use and Abuse of Thucydides in International Relations}, volume={48}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2706917}, number={1}, journal={International Organization}, publisher={The MIT PressInternational Organization Foundation}, author={Bagby, Laurie M. Johnson}, year={1994}, pages={131–153} }
@article{Bajpai_2003, title={The Idea of Human Security}, volume={40}, DOI={10.1177/002088170304000301}, number={3}, journal={International Studies}, author={Bajpai, K.}, year={2003}, month={Aug}, pages={195–228} }
@article{Baldwin_1997, title={The Concept of Security}, volume={23}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/20097464}, number={1}, journal={Review of International Studies}, publisher={Cambridge University PressCambridge University Press}, author={Baldwin, David A.}, year={1997}, pages={5–26} }
@article{Baldwin, title={Clausewitz in Nazi Germany}, volume={16}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://search.proquest.com/docview/1297330175?pq-origsite=summon}, number={1}, journal={Journal of Contemporary History}, author={Baldwin, P M}, pages={5–26} }
@article{Balzacq_2005, title={The Three Faces of Securitization: Political Agency, Audience and Context}, volume={11}, DOI={10.1177/1354066105052960}, number={2}, journal={European Journal of International Relations}, author={Balzacq, T.}, year={2005}, month={Jun}, pages={171–201} }
@article{Bell_2006, title={Surveillance Strategies and Populations at Risk: Biopolitical Governance in Canada’s National Security Policy}, volume={37}, DOI={10.1177/0967010606066168}, number={2}, journal={Security Dialogue}, author={Bell, C.}, year={2006}, month={Jun}, pages={147–165} }
@book{Bellamy_2008, address={London}, title={Security and the war on terror}, volume={Contemporary security studies}, publisher={Routledge}, author={Bellamy, Alex J.}, year={2008} }
@article{Bennett_Elman_Owen_2014, title={Security Studies and Recent Developments in Qualitative and Multi-Method Research}, volume={23}, DOI={10.1080/09636412.2014.970832}, number={4}, journal={Security Studies}, author={Bennett, Andrew and Elman, Colin and Owen, John M.}, year={2014}, month={Oct}, pages={657–662} }
@book{Bigo_Centre d’études sur les conflits (Paris, France)_2006, address={Paris}, title={Illiberal practices of liberal regimes: the (in)security games}, volume={Collection Cultures&conflits}, publisher={L’Harmattan}, author={Bigo, Didier and Centre d’études sur les conflits (Paris, France)}, year={2006} }
@book{Bigo_Tsoukala_2008, address={London}, title={Terror, insecurity and liberty: illiberal practices of liberal regimes after 9/11}, volume={Routledge studies in liberty and security}, publisher={Routledge}, author={Bigo, Didier and Tsoukala, Anastassia}, year={2008} }
@article{Bilgic_2015, title={‘Real people in real places’: Conceptualizing power for emancipatory security through Tahrir}, volume={46}, DOI={10.1177/0967010615575360}, number={3}, journal={Security Dialogue}, author={Bilgic, A.}, year={2015}, month={Jun}, pages={272–290} }
@article{Booth_1991, title={Security and Emancipation}, volume={17}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/20097269}, number={4}, journal={Review of International Studies}, publisher={Cambridge University PressCambridge University Press}, author={Booth, Ken}, year={1991}, pages={313–326} }
@book{Booth_2005, address={Boulder, Colo}, title={Critical security studies and world politics}, volume={Critical security studies}, publisher={Lynne Rienner Publishers}, author={Booth, Ken}, year={2005} }
@book{Booth_2007, address={Cambridge}, title={Theory of world security}, volume={Cambridge Studies in International Relations}, url={https://www.vlebooks.com/vleweb/product/openreader?id=GlasgowUni&isbn=9781107174818}, publisher={Cambridge University Press}, author={Booth, Ken}, year={2007} }
@article{Booth_2011, title={Anchored in Tahrir Square}, volume={20}, DOI={10.1080/09662839.2011.609169}, number={3}, journal={European Security}, author={Booth, Ken}, year={2011}, month={Sep}, pages={473–479} }
@book{Booth_Askews & Holts Library Services_2007, address={Cambridge}, title={Theory of world security}, volume={Cambridge Studies in International Relations}, url={https://www.vlebooks.com/vleweb/product/openreader?id=GlasgowUni&isbn=9781107174818}, publisher={Cambridge University Press}, author={Booth, Ken and Askews & Holts Library Services}, year={2007} }
@book{Booth_Wheeler_2008, address={Basingstoke}, title={The security dilemma: fear, cooperation and trust in world politics}, publisher={Palgrave Macmillan}, author={Booth, Ken and Wheeler, Nicholas J.}, year={2008} }
@article{Bourne_Bulley_2011, title={Securing the human in critical security studies: the insecurity of a secure ethics}, volume={20}, DOI={10.1080/09662839.2011.572070}, number={3}, journal={European Security}, author={Bourne, Mike and Bulley, Dan}, year={2011}, month={Sep}, pages={453–471} }
@book{Buzan_1991, address={Harlow}, edition={2nd ed}, title={People, states and fear: an agenda for international security studies in the post-cold war era}, publisher={Pearson Education Ltd}, author={Buzan, Barry}, year={1991} }
@book{Buzan_Hansen_Askews & Holts Library Services_2009, address={Cambridge}, title={The evolution of international security studies}, url={https://www.vlebooks.com/vleweb/product/openreader?id=GlasgowUni&isbn=9781107197817}, publisher={Cambridge University Press}, author={Buzan, Barry and Hansen, Lene and Askews & Holts Library Services}, year={2009} }
@book{Buzan_Wæver_Wilde_1998, address={Boulder, Colo}, title={Security: a new framework for analysis}, publisher={Lynne Rienner Pub}, author={Buzan, Barry and Wæver, Ole and Wilde, Jaap de}, year={1998} }
@book{Campbell_Ebooks Corporation Limited_1998, address={Manchester}, edition={Revised edition}, title={Writing security: United States foreign policy and the politics of identity}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=310792}, publisher={Manchester University Press}, author={Campbell, David and Ebooks Corporation Limited}, year={1998} }
@book{Clausewitz_Howard_Paret_Dawson Books_1984, address={Princeton, NJ}, title={On war}, url={https://www.vlebooks.com/vleweb/product/openreader?id=GlasgowUni&isbn=9781400837403}, publisher={Princeton University Press}, author={Clausewitz, Carl von and Howard, Michael Eliot and Paret, Peter and Dawson Books}, year={1984} }
@article{Collective_2006, title={Critical Approaches to Security in Europe: A Networked Manifesto}, volume={37}, DOI={10.1177/0967010606073085}, number={4}, journal={Security Dialogue}, author={Collective, C.A.S.E.}, year={2006}, month={Dec}, pages={443–487} }
@article{Cox_1981, title={Social Forces, States and World Orders: Beyond International Relations Theory}, volume={10}, DOI={10.1177/03058298810100020501}, number={2}, journal={Millennium - Journal of International Studies}, author={Cox, R. W.}, year={1981}, month={Jun}, pages={126–155} }
@book{Craig_Ebooks Corporation Limited_2003, address={New York, NY}, title={Glimmer of a new Leviathan: total war in the realism of Niebuhr, Morgenthau, and Waltz}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=909145}, publisher={Columbia University Press}, author={Craig, Campbell and Ebooks Corporation Limited}, year={2003} }
@article{van Creveld_1986, title={The eternal Clausewitz}, volume={9}, DOI={10.1080/01402398608437258}, number={2–3}, journal={Journal of Strategic Studies}, author={van Creveld, Martin}, year={1986}, month={Jun}, pages={35–50} }
@article{De Larrinaga_Doucet_2008, title={Sovereign Power and the Biopolitics of Human Security}, volume={39}, DOI={10.1177/0967010608096148}, number={5}, journal={Security Dialogue}, author={De Larrinaga, M. and Doucet, M. G.}, year={2008}, month={Oct}, pages={517–537} }
@book{Dillon_1996, address={London}, title={Politics of security: towards a political philosophy of continental thought}, publisher={Routledge}, author={Dillon, Michael}, year={1996} }
@article{Doty_2007, title={States of Exception on the Mexico?U.S. Border: Security, ‘Decisions,’ and Civilian Border Patrols}, volume={1}, DOI={10.1111/j.1749-5687.2007.00008.x}, number={2}, journal={International Political Sociology}, author={Doty, Roxanne Lynn}, year={2007}, month={Jun}, pages={113–137} }
@article{Esposito, title={War as a continuation of politics}, volume={18}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://search.proquest.com/docview/1296714832?pq-origsite=summon}, number={1}, journal={Military Affairs}, author={Esposito, Vincent J.} }
@book{Fierke_Ebooks Corporation Limited_2015, address={Cambridge}, edition={Second edition}, title={Critical approaches to international security}, url={http://GLA.eblib.com/patron/FullRecord.aspx?p=1986959}, publisher={Polity Press}, author={Fierke, K. M. and Ebooks Corporation Limited}, year={2015} }
@book{Finlayson_Valentine_2002, address={Edinburgh}, title={Politics and post-structuralism: an introduction}, publisher={Edinburgh University Press}, author={Finlayson, Alan and Valentine, Jeremy}, year={2002} }
@book{Freedman_2004, address={Cambridge}, title={Deterrence}, publisher={Polity Press}, author={Freedman, Lawrence}, year={2004} }
@book{Freedman_Ebooks Corporation Limited_2003, address={Basingstoke, Hampshire}, edition={3rd ed}, title={The evolution of nuclear strategy}, url={http://www.GLA.eblib.com/patron/FullRecord.aspx?p=1040395}, publisher={Palgrave Macmillan}, author={Freedman, Lawrence and Ebooks Corporation Limited}, year={2003} }
@article{Gad, title={Special Issue: The Politics of Securitization}, volume={42}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://sdi.sagepub.com/content/42/4-5.toc}, author={Gad, Ulrik Pram}, pages={315–328} }
@article{Herz_1950, title={Idealist Internationalism and the Security Dilemma}, volume={2}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2009187}, DOI={10.2307/2009187}, number={02}, journal={World Politics}, author={Herz, John H.}, year={1950}, month={Jan}, pages={157–180} }
@book{Howard_2002, address={Oxford}, title={Clausewitz: a very short introduction}, volume={Very short introductions}, url={http://lib.myilibrary.com/browse/open.asp?id=176975&entityid=https://idp.gla.ac.uk/shibboleth}, publisher={Oxford University Press}, author={Howard, Michael Eliot}, year={2002} }
@article{Huysmans_1998, title={Security! What Do You Mean?: From Concept to Thick Signifier}, volume={4}, DOI={10.1177/1354066198004002004}, number={2}, journal={European Journal of International Relations}, author={Huysmans, J.}, year={1998}, month={Jun}, pages={226–255} }
@article{Jervis_1978, title={Cooperation Under the Security Dilemma}, volume={30}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2009958}, number={2}, journal={World Politics}, publisher={Cambridge University PressTrustees of Princeton University}, author={Jervis, Robert}, year={1978}, pages={167–214} }
@article{Jones_1995, title={‘Message in a bottle’? Theory and praxis in critical security studies}, volume={16}, DOI={10.1080/13523269508404119}, number={3}, journal={Contemporary Security Policy}, author={Jones, Richard Wyn}, year={1995}, month={Dec}, pages={299–319} }
@article{KNUDSEN_2001, title={Post-Copenhagen Security Studies: Desecuritizing Securitization}, volume={32}, DOI={10.1177/0967010601032003007}, number={3}, journal={Security Dialogue}, author={KNUDSEN, O. F.}, year={2001}, month={Sep}, pages={355–368} }
@book{Krause_Williams_1997a, address={London}, title={Critical security studies: concepts and cases}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=315340}, publisher={Routledge}, author={Krause, Keith and Williams, Michael C.}, year={1997} }
@book{Krause_Williams_1997b, address={London}, title={Critical security studies: concepts and cases}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=315340}, publisher={Routledge}, author={Krause, Keith and Williams, Michael C.}, year={1997} }
@book{Lebow_2003a, address={Cambridge}, title={The tragic vision of politics: ethics, interests, and orders}, publisher={Cambridge University Press}, author={Lebow, Richard Ned}, year={2003} }
@book{Lebow_2003b, address={Cambridge}, title={The tragic vision of politics: ethics, interests, and orders}, publisher={Cambridge University Press}, author={Lebow, Richard Ned}, year={2003} }
@article{Legro_Moravcsik_1999, title={Is Anybody Still a Realist?}, volume={24}, DOI={10.1162/016228899560130}, number={2}, journal={International Security}, author={Legro, Jeffrey W. and Moravcsik, Andrew}, year={1999}, month={Oct}, pages={5–55} }
@book{Lipschutz_1995, address={New York, N.Y.}, title={On security}, volume={New directions in world politics}, publisher={Columbia University Press}, author={Lipschutz, Ronnie D.}, year={1995} }
@book{Mapel_Nardin_1992a, address={Cambridge}, title={Traditions of international ethics}, volume={Cambridge studies in international relations}, publisher={Cambridge University Press}, author={Mapel, David R. and Nardin, Terry}, year={1992} }
@book{Mapel_Nardin_1992b, address={Cambridge}, title={Traditions of international ethics}, volume={Cambridge studies in international relations}, publisher={Cambridge University Press}, author={Mapel, David R. and Nardin, Terry}, year={1992} }
@article{McDonald_2008, title={Securitization and the Construction of Security}, volume={14}, DOI={10.1177/1354066108097553}, number={4}, journal={European Journal of International Relations}, author={McDonald, M.}, year={2008}, month={Dec}, pages={563–587} }
@article{McInnes_Rushton_2013, title={HIV/AIDS and securitization theory}, volume={19}, DOI={10.1177/1354066111425258}, number={1}, journal={European Journal of International Relations}, author={McInnes, C. and Rushton, S.}, year={2013}, month={Mar}, pages={115–138} }
@article{Mcsweeney_1996, title={Identity and security: Buzan and the Copenhagen school}, volume={22}, DOI={10.1017/S0260210500118467}, number={01}, journal={Review of International Studies}, author={Mcsweeney, Bill}, year={1996}, month={Jan} }
@book{Mearsheimer_2014, address={New York}, edition={Updated edition}, title={The tragedy of great power politics}, volume={The Norton series in world politics}, publisher={W.W. Norton & Company}, author={Mearsheimer, John J.}, year={2014} }
@article{Monten_2006, title={Thucydides and Modern Realism}, volume={50}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/3693549}, number={1}, journal={International Studies Quarterly}, publisher={WileyThe International Studies AssociationOxford University Press}, author={Monten, Jonathan}, year={2006}, pages={3–25} }
@article{Montgomery_2006, title={Breaking Out of the Security Dilemma: Realism, Reassurance, and the Problem of Uncertainty}, volume={31}, DOI={10.1162/isec.2006.31.2.151}, number={2}, journal={International Security}, author={Montgomery, Evan Braden}, year={2006}, month={Oct}, pages={151–185} }
@article{Morgenthau_1945, title={The Evil of Politics and the Ethics of Evil}, volume={56}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2988705}, number={1}, journal={Ethics}, publisher={The University of Chicago PressThe University of Chicago Press}, author={Morgenthau, Hans J.}, year={1945}, pages={1–18} }
@book{Mynott_Thucydides_2013, address={Cambridge}, title={The war of the Peloponnesians and the Athenians}, volume={Cambridge texts in the history of political thought}, publisher={Cambridge University Press}, author={Mynott, Jeremy and Thucydides}, year={2013} }
@article{Neal_2006, title={Foucault in Guantanamo: Towards an Archaeology of the Exception}, volume={37}, DOI={10.1177/0967010606064135}, number={1}, journal={Security Dialogue}, author={Neal, A. W.}, year={2006}, month={Mar}, pages={31–46} }
@book{Paret_1992, address={Princeton, N.J.}, title={Understanding war: essays on Clausewitz and the history of military power}, publisher={Princeton University Press}, author={Paret, Peter}, year={1992} }
@article{Paris_2001, title={Human Security: Paradigm Shift or Hot Air?}, volume={26}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://muse.jhu.edu/article/14359}, number={2}, publisher={The MIT Press}, author={Paris, R}, year={2001}, month={Jan}, pages={87–102} }
@book{Peoples_Vaughan-Williams_Ebooks Corporation Limited_2010a, address={London}, title={Critical security studies: an introduction}, url={http://www.GLA.eblib.com/patron/FullRecord.aspx?p=547344}, publisher={Routledge}, author={Peoples, Columba and Vaughan-Williams, Nick and Ebooks Corporation Limited}, year={2010} }
@book{Peoples_Vaughan-Williams_Ebooks Corporation Limited_2010b, address={London}, title={Critical security studies: an introduction}, url={http://www.GLA.eblib.com/patron/FullRecord.aspx?p=547344}, publisher={Routledge}, author={Peoples, Columba and Vaughan-Williams, Nick and Ebooks Corporation Limited}, year={2010} }
@book{Peoples_Vaughan-Williams_Ebooks Corporation Limited_2010c, address={London}, title={Critical security studies: an introduction}, url={http://www.GLA.eblib.com/patron/FullRecord.aspx?p=547344}, publisher={Routledge}, author={Peoples, Columba and Vaughan-Williams, Nick and Ebooks Corporation Limited}, year={2010} }
@book{Peoples_Vaughan-Williams_Ebooks Corporation Limited_2010d, address={London}, title={Critical security studies: an introduction}, url={http://www.GLA.eblib.com/patron/FullRecord.aspx?p=547344}, publisher={Routledge}, author={Peoples, Columba and Vaughan-Williams, Nick and Ebooks Corporation Limited}, year={2010} }
@article{Rowley_Weldes_2012, title={The evolution of international security studies and the everyday: Suggestions from the Buffyverse}, volume={43}, DOI={10.1177/0967010612463490}, number={6}, journal={Security Dialogue}, author={Rowley, C. and Weldes, J.}, year={2012}, month={Dec}, pages={513–530} }
@book{Sagan_Waltz_2013, address={New York}, edition={Third edition}, title={The spread of nuclear weapons: an enduring debate}, publisher={W.W. Norton & Co}, author={Sagan, Scott Douglas and Waltz, Kenneth N.}, year={2013} }
@book{Smith_1990, address={Baton Rouge}, edition={Paperback ed}, title={Realist thought from Weber to Kissinger}, volume={Political traditions in foreign policy series}, publisher={Louisiana State University Press}, author={Smith, Michael Joseph}, year={1990} }
@article{Snyder_1984, title={The Security Dilemma in Alliance Politics}, volume={36}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2010183}, DOI={10.2307/2010183}, number={04}, journal={World Politics}, author={Snyder, Glenn H.}, year={1984}, month={Jul}, pages={461–495} }
@article{Stritzel_2007, title={Towards a Theory of Securitization: Copenhagen and Beyond}, volume={13}, DOI={10.1177/1354066107080128}, number={3}, journal={European Journal of International Relations}, author={Stritzel, H.}, year={2007}, month={Sep}, pages={357–383} }
@book{Tadjbakhsh_Chenoy_2007, address={London}, title={Human security: concepts and implications}, volume={Routledge advances in international relations and global politics}, publisher={Routledge}, author={Tadjbakhsh, Shahrbanou and Chenoy, Anuradha M.}, year={2007} }
@article{Tang_2009, title={The Security Dilemma: A Conceptual Analysis}, volume={18}, DOI={10.1080/09636410903133050}, number={3}, journal={Security Studies}, author={Tang, Shiping}, year={2009}, month={Sep}, pages={587–623} }
@book{Terriff_1999, address={Cambridge, UK}, title={Security studies today}, publisher={Polity Press}, author={Terriff, Terry}, year={1999} }
@misc{ title={The Melian Dialogue excerpted from The War of the Peloponnesians against the Athenians}, url={https://www.mtholyoke.edu/acad/intrel/melian.htm}, author={Thucydides} }
@article{TRACHTENBERG_2003, title={The Question of Realism:}, volume={13}, DOI={10.1080/09636410490493877}, number={1}, journal={Security Studies}, author={TRACHTENBERG, MARC}, year={2003}, month={Oct}, pages={156–194} }
@article{Walker_2006, title={Lines of Insecurity: International, Imperial, Exceptional}, volume={37}, DOI={10.1177/0967010606064137}, number={1}, journal={Security Dialogue}, author={Walker, R. B. J.}, year={2006}, month={Mar}, pages={65–82} }
@article{Walt_1991, title={The Renaissance of Security Studies}, volume={35}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2600471}, DOI={10.2307/2600471}, number={2}, journal={International Studies Quarterly}, author={Walt, Stephen M.}, year={1991}, month={Jun} }
@article{Waltz_2000, title={Structural Realism after the Cold War}, volume={25}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2626772}, number={1}, journal={International Security}, publisher={The MIT PressThe MIT Press}, author={Waltz, Kenneth N}, year={2000}, pages={5–41} }
@book{Waltz_1959, address={New York}, title={Man, the state and war: a theoretical analysis}, volume={Topical studies in international relations}, publisher={Columbia University Press}, author={Waltz, Kenneth Neal}, year={1959} }
@book{Walzer_2015, address={New York}, edition={Fifth edition}, title={Just and unjust wars: a moral argument with historical illustrations}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=2083288}, publisher={Basic Books, a member of the Perseus Books Group}, author={Walzer, Michael}, year={2015} }
@article{Welch_2003, title={Why International Relations Theorists Should Stop Reading Thucydides}, volume={29}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/20097856}, number={3}, journal={Review of International Studies}, publisher={Cambridge University PressCambridge University Press}, author={Welch, David A.}, year={2003}, pages={301–319} }
@book{Williams_2005, address={Cambridge}, title={The Realist Tradition and the Limits of International Relations}, volume={Cambridge Studies in International Relations}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1017/CBO9780511491771}, publisher={Cambridge University Press}, author={Williams, Michael C.}, year={2005} }
@book{Wyn Jones_1999, address={Boulder, Colo}, title={Security, strategy, and critical theory}, volume={Critical security studies}, publisher={Lynne Rienner Publishers}, author={Wyn Jones, Richard}, year={1999} }
@article{Security Dialogue -- Collected Resources : September 2004 : Special section on what is ‘human security’?_2004, volume={35}, url={https://ezproxy.lib.gla.ac.uk/login?url=https://journals.sagepub.com/toc/sdib/35/3}, number={3}, year={2004} }
@book{Williams_2013a, address={London}, edition={Second edition}, title={Security studies: an introduction}, url={https://www.dawsonera.com/guard/protected/dawson.jsp?name=https://idp.gla.ac.uk/shibboleth&dest=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780203122570}, publisher={Routledge}, year={2013} }
@book{Williams_2013b, address={London}, edition={Second edition}, title={Security studies: an introduction}, url={https://www.dawsonera.com/guard/protected/dawson.jsp?name=https://idp.gla.ac.uk/shibboleth&dest=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780203122570}, publisher={Routledge}, year={2013} }
@book{Collins_2016a, address={Oxford, United Kingdom}, edition={Fourth edition}, title={Contemporary security studies}, publisher={Oxford University Press}, year={2016} }
@book{Baylis_Wirtz_Gray_2016, address={Oxford}, edition={Fifth edition}, title={Strategy in the contemporary world: an introduction to strategic studies}, publisher={Oxford University Press}, year={2016} }
@book{Collins_2016b, address={Oxford, United Kingdom}, edition={Fourth edition}, title={Contemporary security studies}, publisher={Oxford University Press}, year={2016} }
@book{Collins_2016c, address={Oxford, United Kingdom}, edition={Fourth edition}, title={Contemporary security studies}, publisher={Oxford University Press}, year={2016} }
@book{Collins_2016d, address={Oxford, United Kingdom}, edition={Fourth edition}, title={Contemporary security studies}, publisher={Oxford University Press}, year={2016} }
@book{Collins_2016e, address={Oxford, United Kingdom}, edition={Fourth edition}, title={Contemporary security studies}, publisher={Oxford University Press}, year={2016} }
@book{Collins_2016f, address={Oxford, United Kingdom}, edition={Fourth edition}, title={Contemporary security studies}, publisher={Oxford University Press}, year={2016} }
@book{Williams_McDonald_2018a, address={London}, edition={Third edition}, title={Security studies: an introduction}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090}, publisher={Routledge}, year={2018} }
@book{Williams_McDonald_2018b, address={London}, edition={Third edition}, title={Security studies: an introduction}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090}, publisher={Routledge}, year={2018} }
@book{Williams_McDonald_2018c, address={London}, edition={Third edition}, title={Security studies: an introduction}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090}, publisher={Routledge}, year={2018} }
@book{Williams_McDonald_2018d, address={London}, edition={Third edition}, title={Security studies: an introduction}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090}, publisher={Routledge}, year={2018} }
@book{Williams_McDonald_2018e, address={London}, edition={Third edition}, title={Security studies: an introduction}, url={https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090}, publisher={Routledge}, year={2018} }