![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This book traces changes in the concept of security in Asia from realist to cooperative, comprehensive, and human security approaches, and assesses a number of policy alternatives to management of both old and new security threats. It surveys not only orthodox security threats such as tensions between regional powers or armed ethnic antagonists but also new sources of anxiety such as resource scarcity, economic instability, irregular migration, community fragmentation, and international terrorism. Security policies of major powers such as China, Japan, and the United States, and the moderating roles of regional organizations such as ASEAN, ARF, SCO, and KEDO are evaluated in historical and contemporary perspectives. Contributors proffer policy-relevant insights where appropriate. The book concludes that traditional security approaches remain valid but need to be adapted to the new challenges, and offers suggestions for incorporating fresh Asian security perceptions into the agendas of policy-makers, analysts, and scholars.
The Indian Army was one of the most important colonial institutions that the British created. From its humble origins as a mercantile police force to a modern contemporary army in the Second World War, this institution underwent many transitions. This book examines the Indian Army during the later colonial era from the First Afghan War in 1839 to Indian independence in 1947. During this period, the Indian Army developed from an internal policing force, to a frontier army, and then to a conventional western style fighting force capable of deployment to overseas' theaters. These transitions resulted in significant structural and doctrinal changes in the army. The doctrines, and tactics honed during this period would have a dramatic impact upon the post-colonial armies of India and Pakistan. From civil-military relations to fighting and structural doctrines, the Indian and Pakistani armies closely reflect the deep-seated impact of decades of evolution during the late colonial era.
This book focuses on the problems of, and prospects for, strengthening the global system of security governance in a manner consistent with the aspirations and practices of the EU. The EU approach to security governance has been successful in its immediate neighbourhood: it has successfully exported its preferred norms and principles to applicant countries, thereby 'pacifying' its immediate neighbourhood and making all of Europe more secure. The EU governance orientation ultimately seeks to enlarge the European security community and expand the geopolitical area within which armed conflicts are inconceivable, and where state and private actors converge around a set of norms and rules of behaviour and engagement. The EU's success along its immediate boundaries has not yet been replicated on a global scale; it remains an open question whether the EU system of governance can be exported globally, owing to different normative structures (for example, a tolerance of armed conflict or non-democratic governance internally), great-power competition (such as US--China), or ongoing processes of securitization that has made it difficult to find a commonly accepted definition of security. Moreover, the EU system of security governance clashes with the continuing unwillingness of other major powers to cede or pool sovereignty as well as varying preferences for unilateral as opposed to multilateral forms of statecraft. This edited volume addresses both the practical and political aspects of security governance and the barriers to the globalization of the EU system of security governance, particularly in the multipolar post-Cold War era. This book will be of great interest to students of security governance, EU politics, European Security and IR in general. James Sperling is Professor of Political Science at the University of Akron, Ohio, USA. Jan Hallenberg is Professor of Political Science at the Department of Security and Strategic Studies, Swedish National Defence College. Charlotte Wagnsson is Assistant Professor in the Department of Strategic and Security Studies at the Swedish National Defence College.
U.S. Government Counterterrorism: A Guide to Who Does What is the first readily available, unclassified guide to the many U.S. government agencies, bureau offices, and programs involved in all aspects of countering terrorism domestically and overseas. The authors, veterans of the U.S. government's counterterrorism efforts, present a rare insider's view of the counterterrorism effort, addressing such topics as government training initiatives, weapons of mass destruction, interagency coordination, research and development, and the congressional role in policy and budget issues. Includes a Foreword by Brian Michael Jenkins, Senior Advisor RAND Corporation Individual chapters describe the various agencies, their bureaus, and offices that develop and implement the counterterrorism policies and programs, providing a useful unclassified guide to government officials at all levels as well as students and others interested in how the U.S. counters terrorism. The book also discusses the challenges involved in coordinating the counterterrorism efforts at federal, state, and local levels and explains how key terror events influenced the development of programs, agencies, and counterterrorism legislation. The legislative underpinnings and tools of the U.S. counterterrorism efforts are covered as are the oft-debated issues of defining terrorism itself and efforts to counter violent extremism. In addition to outlining the specific agencies and programs, the authors provide unique insights into the broader context of counterterrorism efforts and developments in the last 10-plus years since 9/11 and they raise future considerations given recent landscape-altering global events. The authors were interviewed by National Defense Magazine in a January 23, 2012 article entitled Counterterrorism 101: Navigating the Bureaucratic Maze. They were interviewed on April 30, 2012 by Federal News Radio. Michael Kraft was also interviewed on June 27, 2014 by Federal News Radio.
This report tracks and analyzes trends in Chinese military strategy, force structure, and regional activity. Open source material is used to detail how each branch of the People's Liberation Army has pursued modernization. Chinese perspectives on their military's role and development are featured, as well as the views of other relevant regional actors. The purpose of this report is to provide the basis for an unclassified dialogue on the military developments in China. By presenting data on the regional military balance alongside perspectives on China's military development, the Burke Chair hopes that readers can better understand how China's strategic goals, military development, and regional views interact with each other.
In Arsenal of Democracy , historian and public intellectual Julian Zelizer shows how internal politics have influenced American foreign policy since the Cold War. Rejecting the notion that, prior to the presidency of George W. Bush, politics stopped at the water's edge," Zelizer exposes the partisan fighting that shaped the foreign policies of presidents from FDR to Kennedy to Reagan, revealing the extent to which the GOP and Democratic party have alternately sought to define themselves as the party of war and the party of peace as the political mood shifted. Republicans, he shows, have not always been hawks during World War II, it was the Democratic party that took the lead not only in entering war, but in ensuring that the national security apparatus that emerged would remain a fixture of the American political landscape even after the war was over. A definitive account of the complex interaction between domestic politics and foreign affairs over the last six decades, Arsenal of Democracy is essential reading for anyone interested in the politics of national security.
The Security Governance of Regional Organizations assesses the effectiveness of regional organizations as regional or global security providers, and examines how policy preferences, resources, capabilities, institutional mechanisms and economic and political cohesion link with collective action behaviour in four security policy functions. It investigates how regional organizations meet the new security threats or respond to strategic geopolitical changes and what adaptations they make in the process. Divided into three parts and using a common analytical framework, the book explains the changing security agenda in ten key regional organizations, each organizational chapter:
This collection contributes to the ongoing reconceptualization of security and definition of security governance, and explores whether regional security governance processes are unique or similar and whether some organizational experiences can be seen as models for others to follow. It combines a coherent theoretical framework with strong comparative case studies, making it ideal reading for all students of security studies.
This edited book examines the East German foreign intelligence service (Hauptverwaltung Aufklarung, or HVA) as a historical problem, covering politics, scientific-technical and military intelligence and counterintelligence. The contributors broaden the conventional view of East German foreign intelligence as driven by the inter-German conflict to include its targeting of the United States, northern European and Scandinavian countries, highlighting areas that have previously received scant attention, like scientific-technical and military intelligence. The CIA's underestimation of the HVA was a major intelligence failure. As a result, East German intelligence served as a stealth weapon against the US, West German and NATO targets, acquiring the lion's share of critical Warsaw Pact intelligence gathered during the Cold War. This book explores how though all of the CIA's East German sources were double agents controlled by the Ministry of State Security, the CIA was still able to declare victory in the Cold War. Themes and topics that run through the volume include the espionage wars; the HVA's relationship with the Russian KGB; successes and failures of the BND (West German Federal Intelligence Service) in East Germany; the CIA and the HVA; the HVA in countries outside of West Germany; disinformation and the role and importance of intelligence gathering in East Germany. This book will be of much interest to students of East Germany, Intelligence Studies, Cold War History and German politics in general. Kristie Macrakis is Professor at the Georgia Institute of Technology, Atlanta. Thomas Wegener Friis is an Assistant Professor at the University of Southern Denmark's Centre for Cold War Studies. Helmut Muller-Enbergs is currently a Visiting Professor at the University of Southern Denmark and holds a tenured senior staff position at the German Federal Commission for the STASI Archives in Berlin.
During the past twenty-five years, U.S. strategists have argued that avoiding nuclear war depends on deterring a Soviet first strike by ensuring that U.S. forces could survive a surprise attack in numbers sufficient to inflict unacceptable damage in retaliation. U.S. military and political leaders have thus emphasized acquiring more powerful and accurate weaponry and providing better protection for it, while defense analysts have focused on assessing the relative strength and survivability of U.S. and Soviet forces. In the process neither has given sufficient attention to the vulnerability of the U.S. command, control, and communications system that would coordinate warning of an attack in progress and the response to it. In this study Bruce G. Blair examines accepted assumptions about mutual deterrence, force strength, and survivability, and concludes that the vulnerability of command, control, and communications not only precludes an effective retaliatory strike but also invites a preemptive Soviet first strike. After summarizing the assumptions and evaluative methodology behind mainstream strategic theory, the study describes the current decentralized command and control system that, under conditions of surprise attack, could be unable to communicate with decisionmakers or with units responsible for executing the decisions. Blair traces in detail the development of the system over three decades; the attempts to improve it through the use of procedural guidelines, alternative and redundant communications channels, and survival tactics; and the continuing vulnerabilities from improved Soviet weapons and the environmental forces engendered by massive nuclear detonations. Blair also analyzes the probable effects of proposals by the Reagan administration to strengthen command, control, and communications systems and provides recommendations for further strengthening and for altering related policies, deployments, and strategies to improve the stability of deterrence.
This book offers an examination of the role of emancipation in the study and practice of security, focusing on the issue of environmental change. The end of the Cold War created a context in which traditional approaches to security could be systematically questioned. This period also saw a concerted attempt in IR to argue that environmental change constituted a threat to security. This book argues that such a notion is problematic as it suggests that a universal definition of security is possible, which prevents a recognition of security as a site of contestation, in which a range of actors articulate alternative visions of who or what is in need of being secured. If security is understood and approached in traditional terms - as the territorial preservation of the nation-state from external threat - then it is indeed difficult to see how environmental issues would benefit from being placed on states' security agenda. If, however, security is defined in terms of the emancipation of the most vulnerable individuals from contingent structural oppressions, then drawing a relationship between environmental change and security may be beneficial for redressing those environmental issues and prioritising the needs of those most at risk from the manifestations of global environmental change. This book takes the limitations of contemporary approaches to the relationship between the environment and security as its starting point, and seeks to do two things. First, it aims to illustrate the ways in which arguments over approaches to environmental issues can be viewed as contestation over the meaning of 'security' in particular political contexts. Central here is the composition and assumptions of the dominant security discourse to emerge regarding those issues: a framework of meaning for the most important forms of action on behalf of a particular group, defining the terms for meaningful contestation and negotiation about security itself within that group. As such, the book attempts to illustrate the dynamics of competition over the meaning of security with reference to environmental issues, particularly focusing on instances of political change in the dominant security discourse through which that issue is approached. In the process the author points to the central role of these dominant security discourses in underpinning the most practically significant actions regarding environmental issues such as deforestation and global climate change. The book employs methodological tools that enable a focus on how particular frameworks of meaning are constituted and become dominant; how they provide a lens through which various issues are approached; and how discourses most consistent with redressing environmental change and the suffering of the most vulnerable might come to provide the framework through which security is viewed in particular contexts. This book will be of much interest to students of Critical Security Studies, geography, sociology, IR and Political Science in general.
This book offers an examination of the role of emancipation in the study and practice of security, focusing on the issue of environmental change. The end of the Cold War created a context in which traditional approaches to security could be systematically questioned. This period also saw a concerted attempt in IR to argue that environmental change constituted a threat to security. This book argues that such a notion is problematic as it suggests that a universal definition of security is possible, which prevents a recognition of security as a site of contestation, in which a range of actors articulate alternative visions of who or what is in need of being secured. If security is understood and approached in traditional terms - as the territorial preservation of the nation-state from external threat - then it is indeed difficult to see how environmental issues would benefit from being placed on states' security agenda. If, however, security is defined in terms of the emancipation of the most vulnerable individuals from contingent structural oppressions, then drawing a relationship between environmental change and security may be beneficial for redressing those environmental issues and prioritising the needs of those most at risk from the manifestations of global environmental change. This book takes the limitations of contemporary approaches to the relationship between the environment and security as its starting point, and seeks to do two things. First, it aims to illustrate the ways in which arguments over approaches to environmental issues can be viewed as contestation over the meaning of 'security' in particular political contexts. Central here is the composition and assumptions of the dominant security discourse to emerge regarding those issues: a framework of meaning for the most important forms of action on behalf of a particular group, defining the terms for meaningful contestation and negotiation about security itself within that group. As such, the book attempts to illustrate the dynamics of competition over the meaning of security with reference to environmental issues, particularly focusing on instances of political change in the dominant security discourse through which that issue is approached. In the process the author points to the central role of these dominant security discourses in underpinning the most practically significant actions regarding environmental issues such as deforestation and global climate change. The book employs methodological tools that enable a focus on how particular frameworks of meaning are constituted and become dominant; how they provide a lens through which various issues are approached; and how discourses most consistent with redressing environmental change and the suffering of the most vulnerable might come to provide the framework through which security is viewed in particular contexts. This book will be of much interest to students of Critical Security Studies, geography, sociology, IR and Political Science in general.
Of German stock dating back to 1530 in Saxony, Eric George Ackermann GM was born on the Isle of Wight in 1919 and became a leading figure in the world of signals and electronic intelligence. As a Junior Scientific Officer at the Telecommunication Research Establishment, Boscombe Down, with an honorary commission in the Royal Air Force, he made numerous flights over occupied territory searching for, monitoring and destroying Germany's Wuerzburg, Knickebein and X Band radar systems. Much of his research was passed to the highest levels of wartime government, and was highly prized, ensuring that tactical plans could be executed that took full advantage of known, top secret German intelligence. A host of secret missions to assess the enemy's radar capabilities were carried out in North Africa, Gibraltar and Italy. This new and engaging biography explores the various highs and lows of his operational deployment at the vanguard of tactical intelligence operations in these exciting theaters of war. Winner of the George Medal for conspicuous gallantry, his efforts weren't confined to the offices of war. He saw conflict up close and personal, and was therefore aware of the urgency of his endeavours, and the extent to which his findings made a difference. The end of the war was a cause of great celebration, but it did not signal the end of Ackermann's role, far from it. He was to play a major part in the setting up and implementation of a string of listening stations built along the borders of Soviet Bloc countries which were destined to glean a wealth of invaluable post-war intelligence. Further work in aeronautics and satellite construction in the States followed, meaning the reach of Ackermann's influence could be allowed to stretch yet further. Yet despite the might and scale of his achievement, he has never before been the subject of a book-length study. The authors, Peter Jackson and David Haysom, have made every effort to rectify that in this new publication which is sure to appeal to aviation enthusiasts, as well as the more general reader curious to gain new insights into twentieth century intelligence practices and their often far-reaching consequences.
This book explores the mythology woven around the Soviet secret police and the Russian cult of state security that has emerged from it. Tracing the history of this mythology from the Soviet period through to its revival in contemporary post-Soviet Russia, the volume argues that successive Russian regimes have sponsored a cult' of state security, whereby security organs are held up as something to be worshipped. The book approaches the history of this cult as an ongoing struggle to legitimise and sacralise the Russian state security apparatus, and to negotiate its violent and dramatic past. It explores the ways in which, during the Soviet period, this mythology sought to make the existence of the most radically intrusive and powerful secret police in history appear natural'. It also documents the contemporary post-Soviet re-emergence of the cult of state security, examining the ways in which elements of the old Soviet mythology have been revised and reclaimed as the cornerstone of a new state ideology. The Russian cult of state security is of ongoing contemporary relevance, and is crucial for understanding not only the tragedies of Russia's twentieth-century history, but also the ambiguities of Russia's post-Soviet transition, and the current struggle to define Russia's national identity and future development. The book examines the ways in which contemporary Russian life continues to be shaped by the legacy of Soviet attitudes to state-society relations, as expressed in the reconstituted cult of state security. It investigates the shadow which the figure of the secret policeman continues to cast over Russia today. The book will be of great interest to students of modern Russian history and politics, intelligence studies and security studies, as well as readers with an interest in the KGB and its successors.
William Blair's Virginia's Private War is a close study of the home front in the Confederacy and a significant contribution to our understanding of the Confederate defeat. Blair challenges and effectively overturns the dominant assumption that internal stresses and conflicts, particularly along lines of class and race, undermined the Confederacy. Rather, he shows that for most of the South the centripetal forces of Confederate nationalism and defence of home and hearth against an invading enemy were more powerful. Internal problems, including dissent, wracked the state of Virginia, yet these private wars actually helped prolong the conflict as they forced authorities to turn the war into more of a rich man's fight.
Despite Timor-Leste's high expectations when it became independent from Indonesia in 2002, the country is ranked among the least developed countries in the world. It has found itself at the centre of international attention in the last decade, with one of the biggest interventions in UN history, as well as receiving amongst the highest per capita rates of bilateral assistance in the Asia-Pacific region. This book draws together the perspectives of practitioners, policy-makers and academics on the international efforts to rebuild one of the world's newest nations. The contributors consider issues of peace-building, security and justice sector reform as well as human security in Timor-Leste, locating these in the broader context of building nation, stability and development. The book includes two demographic studies that can be used to critically examine the nation's possible future. Engaging in deliberate consideration of both practical and theoretical complexities of international interventions, this book will be of interest to academics and students in the fields of Development, Security and Southeast Asian Studies.
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.
This book offers a systematic examination, analysis and evaluation of Israeli national security statecraft in terms of challenges and responses. Providing an in-depth analysis of Israeli statecraft challenges and responses, this interdisciplinary book integrates social science and security studies with public policy approaches within a long-term historical perspective on the Arab-Israeli conflict. These scholarly approaches are synthesized with extensive personal knowledge of the author based on involvement in Israeli political-security policy making. This book makes use of conceptualizations of statecraft such as 'fuzzy gambling' and interventions with critical mass in ultra-dynamic historical processes to help clarify Israel's main statecraft successes and failures, alongside the wider theoretical apparatuses these concepts represent. While focused on Israel, these theoretical frameworks have important implications for the academic study of statecraft and statecraft praxis worldwide. This book will be of much interest to both statecraft practitioners and to students of Israeli politics and security, the Middle Eastern conflict, strategic studies and IR/security studies in general.
As the U.S. Navy enters the twenty-first century, many of the ships, aircraft, weapons, and tactics it employed so successfully during the Cold War will no longer be cost-effective or even effective. Future battlefields will shift the locus of naval action from the high seas into littoral waters, demanding sustained operations in relatively narrow, shallow waters. Naval forces in the twenty-first century must not only meet the traditional requirements of command of the sea--ships, planes, troops, and bases--carrying out forward presence, crisis response, strategic deterrence, and sealift. They must now put these together to obtain the four key operational capabilities of littoral warfare: command, control, intelligence and surveillance, and communication; battlespace dominance; power projection; and force sustainment. The core of the new U.S. strategic concept is power projection, and it envisions naval forces directly leading Army and Air Force elements to influence events ashore, most probably in the Third World. And this navy must be cost effective.
Waging Peace is a re-examination of President Eisenhower's "New Look" program of national security, the foundation for American Cold War policy for the next thirty years. In a turbulent and dangerous stage of East-West relations, with an untested and erratic Soviet leadership and a changing world environment, Eisenhower managed a succession of crises and set a course which ultimately preserved both security and peace. Only now, in the aftermath of the Cold War, can his achievement be fully appreciated.
The book interrogates the disciplinary biases and firewalls that inform mainstream international relations today, and problematises the several tropes that have come to typify the strategic histories of post-colonial societies such as India. Questioning a range of long-held cultural representations on India, the book challenges such portrayals and underscores the centrality of context and contingency in any cultural explanation of state behaviour. It argues for a historico-cultural understanding of power and critiques IR's tendency to usher in a selective 'return of history'. Taking two contrasting case studies from medieval Indian history, the book assesses the success and failure of the grand strategy pursued by the Mughal empire under Akbar. The study emphasises his grand strategy of accommodation, defined by the interplay of critical variables such as distance and the vast military labour market. The book also looks at his conscious attempt to indigenise power by projecting himself as the personification of the ideal Hindu king. This case study helps to contextualise the many critical transitions that occurred in international relations: from medieval empires to the modern state system, and from an indigenised, experiential understanding of power to its absolute, abstract manifestations in the colonial state.
A noted theorist of globalization offers a complete reconstruction of our national security institutions and strategies to better match today s realities. David A. Westbrook shows how deploying ourselves as statesmen and -women, as citizens can better achieve U.S. national security. Westbrook explains why today s national security establishment is outdated, entrenched in a model of defense befitting the post World War II Cold War era. Today, without military peers, the U.S. must re-create its institutions around wielding influence globally, based on the cooperation of other states and groups. Even when we deploy troops today, our goal is the construction of order, not defense. Westbrook explores radical (including Jihadist) challenges, the long war on terror, and other current topics to show how defense institutions could be reconceived in order to become both more responsible and more effective. His measures include a wholesale revision of the National Security Act of 1947 to radically reform intelligence work by reintegrating it into democratically responsible military and diplomatic bureaucracies."
First published in 1990, this is an authoritative account of defence spending and policy in both developing and developed countries. The book provides case-studies and comparitive materiel for policy-makers, civil servants, and military staffs throughout hte world. It will also be of great use to students of economics, politics, international relations, and policy studies.
This book examines Russia s external security policy under the
presidencies of Vladimir Putin, Dmitry Medvedev and beyond. This book will be of much interest to students of Russian politics and foreign policy, European politics and Security Studies and IR in general.
Any state at war attempts to steer the conflict to the point where it can demonstrate its relative advantage. Thus underlying each war is a struggle over its particular nature, and in a dynamic process each side attempts to shape a war paradigm that suits its own relative strengths, while the adversary attempts to impose its preferred paradigm on the conflict. Israel, for example, seemingly has an edge in military effectiveness, and has therefore always preferred short, decisive wars. Its enemies, however, have an overall advantage in stamina and ability to leverage the international system. They therefore strive to lengthen the war and bring Israel to the point of defeat through attrition of the Israeli political-civilian system. ... In The Nature of War: Conflicting Paradigms and Israeli Military Effectiveness, Ron Tira examines the different aspects that characterize a war, from the center of gravity to be attacked to the elements constituting military decision, as they are manifested in 'simple' symmetrical wars; asymmetrical wars versus a state opponent; guerilla warfare; parallel warfare; and next generation warfare. ... The author first surveys types of war and the circumstances whereby the classical doctrine of war is progressively less valid, and then devises additional analytical tools necessary to understand these more complex conflicts. The study examines the relevance of classical doctrine and applies these new tools and concepts to a range of historical examples, from the Second Punic War to World War II to some of Israel's main wars. The final case evaluated is the next generation of wars that Israel and other Western countries may find themselves fighting - wars against states that have adopted the guerilla paradigm. Published in association with the Institute for National Security Studies, Israel
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats. |
![]() ![]() You may like...
Design and Optimization of Sensors and…
Vinod Kumar Singh, Ratnesh Tiwari, …
Hardcover
R6,390
Discovery Miles 63 900
Developments in Tissue Engineered and…
Joydeep Basu, John W Ludlow
Hardcover
R4,291
Discovery Miles 42 910
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,467
Discovery Miles 44 670
Digital Interactive TV and Metadata…
Arthur Lugmayr, Samuli Niiranen, …
Hardcover
R4,385
Discovery Miles 43 850
|