![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
The 1916 Anglo-French offensive comprising the battles of the Somme marked a change in the Allies' relationships, with the British beginning to play a more important role. From contemporaries to the present the Somme has also produced a number of controversies. This book shows the current state of historians' interpretations of the Somme. The initial section presents the historical background of the offensive, lays out the major interpretative disputes, and identifies the scholars and works in each school of thought. The second section provides a bibliography of more than 700 entries. The initial section of the book presents the historical background of the offensive and lays out the major interpretative disputes about it. The section identifies scholars and works in each school of thought, enables readers to determine where a specific work fits in the spectrum of views, and provides cross references to the bibliography. The second section provides an annotated bibliography of more than 700 entries.
India has long been motivated to modernize its military, and it now has the resources. But so far, the drive to rebuild has lacked a critical component --strategic military planning. India's approach of arming without strategic purpose remains viable, however, as it seeks great-power accommodation of its rise and does not want to appear threatening. What should we anticipate from this effort in the future, and what are the likely ramifications? Stephen Cohen and Sunil Dasgupta answer those crucial questions in a book so timely that it reached number two on the nonfiction bestseller list in India. "Two years after the publication of "Arming without Aiming," our view is that India's strategic restraint and its consequent institutional arrangement remain in place. We do not want to predict that India's military-strategic restraint will last forever, but we do expect that the deeper problems in Indian defense policy will continue to slow down military modernization." --from the preface to the paperback edition
Written in China more than 2,500 years ago, Sun Tzu's classic The Art of War is the first known study of the planning and conduct of military operations. These terse, aphoristic essays are unsurpassed in comprehensiveness and depth of understanding, examining not only battlefield maneuvers, but also relevant economic, political, and psychological factors. Indeed, the precepts outlined by Sun Tzu can be applied outside the realm of military theory. It is read avidly by Japanese businessmen and in fact was touted in the movie Wall Street as the corporate raider's bible.
Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.
The Impact of the First World War on U.S. Policymakers: American Strategic and Foreign Policy Formulation, 1938 1942 is designed to recount the formulation of foreign and defense policies through an examination of the background of the policymakers, with specific emphasis on the World War I experience. The introduction provides an analysis of the literature of the history of this American World War II policy formulation. The events and factors that led to the reorientation of priorities in 1938-1939 are examined. From that base, Michael Carew reviews the unfolding events of the European and Japanese degeneration into war through the spring of 1940, and their perception for the American policy-makers. He also recounts the tectonic shifts of the subsequent eighteen months and the scramble for an American response. The immediate consequences of Pearl Harbor brought the policymaking to a crisis, and the Casablanca conference of January 1943 signified the completion of the formulation of American foreign policy and naval-military strategy. Carew emphasizes the leadership of President Roosevelt and his cadre of planners in the policy formulation realm, the assertion of leadership of the alliance, and Roosevelt's specific tasks in managing the American war effort. These presidential tasks included the industrial mobilization of the American economy, the domestic political leadership of the war, the persuasion of the alliance to the propriety of American policy, and the defeat of the Axis."
"Desert Battle" is a study of the nature of desert warfare with special attention to the evolution of weaponry, the organization of forces, the impact of the desert environment on the ability of those forces to sustain battle, and the influences of the desert on battle tactics. The work concentrates on seven campaigns, from Bonaparte's adventure in Egypt in 1798-1799 to the 1991 Gulf War. Each campaign is discussed in relation to its political-military background, with focus on leadership, the forces available, and the weapons at their disposal. A narration of each campaign follows, ending with an evaluation in relative degrees of the leadership, weapons, and tactics and the long-run consequences of the campaign. Watson's study opens with a description and analysis of Erwin Rommel's first advance in North Africa in April of 1941, but his emphasis is not on Rommel's magnificent achievements but on the creation of the Rommel legend and its effect on our understanding of desert warfare. That opening chapter is followed by an examination of deserts as a physical context for battle--the nature of the environment and who fights in deserts and why. Napoleon Bonaparte's campaign in Egypt, 1798-1799, is discussed in the context of desert campaigns. British operations along India's Northwest Frontier from 1849-1852 follow. The Tigris campaign of World War I is particularly notable because it introduced armored cars, thereby increasing an army's mobility in desert sands. The British counterattack against the Italians in North Africa from late 1940 to early 1941 demonstrates how a small army, utilizing surprise, indirect attack, and high mobility, were able to offset the Italians' numerical superiority. Post-World War II battle is illustrated by the Yom Kippur War between the Arabs and the Israelis in 1973. The final campaign discussed is the 1991 Gulf War. Watson's original conclusions about the nature of desert battle and the constants that determine the outcome of battles in that hostile environment are surprising and illuminating. They constitute a real contribution to the study of desert warfare.
Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.
This book is a 'hidden' history of Bletchley Park during the Second World War, which explores the agency from a social and gendered perspective. It examines themes such as: the experience of wartime staff members; the town in which the agency was situated; and the cultural influences on the wartime evolution of the agency.
Schwab examines America's decision to "stand in Vietnam" with a fresh perspective provided by new archival materials and the intellectual synthesis of institutional, political, and diplomatic history. Vietnam policy is shown at many different levels, from the presidency down to the level of CIA operatives in the field and public opinion specialists on the White House staff. The views of State Department officers, foreign public opinion, editorials in major U.S. newspapers, and the powerful leaders of both Congressional houses reveal an informed and highly conflicted public leadership well before American combat troops were committed in large numbers in the summer of 1965. The study begins with John F. Kennedy's inaugural address in January of 1961 and proceeds to show the decision-making rocess regarding Vietnam and Indochina through the several critical events that led to Johnson's famous press conference speech of 1965. The author contends that responsibility for the war and its tragic consequences should not be placed upon individuals, but rather at the levels of the state, society, and the international system. This view of agency existing at a higher level than the presidency challenges the dominant view of most diplomatic historians and other writers who have focused on the blunders and misperceptions of policy makers.
The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.
The United States faces a small number of rogue states that either have or are working to acquire weapons of mass destruction. These NASTIs, or NBC-Arming Sponsors of Terrorism and Intervention, include such states as North Korea, Iraq, Iran, Libya, and Syria. U.S. nonproliferation programs and policies have helped to keep this number small, but U.S. and allied counterproliferation programs are essential to reduce the danger. It is up to deterrence, active defenses, passive defenses, decontamination, and counterforce to turn enemy weapons of mass destruction into instruments of limited destructive effect. Warfighters will also have to adopt a different strategy and concept of operations in fighting an adversary that is so heavily armed. This strategy will feature a combination of deception, dispersion, mobility and maneuver, diffused logistics, remote engagement, missile defense bubbles, non-combatant evacuation operations, and large area decontamination. It will also involve upgrades to NBC passive defense measures and equipment, as well as a counterforce capability that can find and destroy a variety of adversary targets, including mobile launchers and deeply buried and hardened underground structures.
Are the relationships that the United States forged with North and Central Europe during the Cold War still viable today? As the North Atlantic Treaty Organization (NATO) declines and the European Security and Defense Policy (ESDP) emerges, can the United States and Europe bridge the transatlantic fissures that opened when the United States prepared to go to war with Iraq? In a post-9/11 world, North and Central Europe have had to adapt their national security policies and rethink their relationship with the United States. In an in-depth look at the security policies of the states in North and Central Europe, Andrew Michta highlights how historical legacies, regional geostrategic constraints, and individual capabilities have shaped their response to the new environment. Michta raises the broad question of whether traditional alliances and NATO are still viable ways to deal with new security concerns. The two key questions that arise from this discussion are to what extent NATO still matters to the United States, beyond its political utility, and whether the European Union as a whole can become a partner for the United States in a new security environment. The Limits of Alliance argues that, although NATO will continue to exist in the coming decade, the hollowing-out of the alliance will be accompanied by a shift in transatlantic security relations toward bilateralism determined by regional security considerations.
This report is the first regional study in the CSIS Federated Defense series. The Federated Defense Project aims to shift the paradigm with key allies and partners from capacity building to a federated approach that would expand regional security and prosperity by joining regional allies and partners together in the pursuit of shared security objectives across the conflict spectrum. Federated defense should include forward-thinking strategies for how to develop and share capabilities and capacity, thereby more deeply integrating the US military with its allies and partners. In this report, the CSIS project team highlights six potential federated initiatives in the areas of humanitarian assistance and disaster relief, information and intelligence sharing, maritime security, undersea warfare, missile defense, and cyber security. Federated approaches such as these are vital to developing and integrating Asian security capabilities to manage emerging security challenges.
Are the relationships that the United States forged with North and Central Europe during the Cold War still viable today? As the North Atlantic Treaty Organization (NATO) declines and the European Security and Defense Policy (ESDP) emerges, can the United States and Europe bridge the transatlantic fissures that opened when the United States prepared to go to war with Iraq? In a post-9/11 world, North and Central Europe have had to adapt their national security policies and rethink their relationship with the United States. In an in-depth look at the security policies of the states in North and Central Europe, Andrew Michta highlights how historical legacies, regional geostrategic constraints, and individual capabilities have shaped their response to the new environment. Michta raises the broad question of whether traditional alliances and NATO are still viable ways to deal with new security concerns. The two key questions that arise from this discussion are to what extent NATO still matters to the United States, beyond its political utility, and whether the European Union as a whole can become a partner for the United States in a new security environment. The Limits of Alliance argues that, although NATO will continue to exist in the coming decade, the hollowing-out of the alliance will be accompanied by a shift in transatlantic security relations toward bilateralism determined by regional security considerations.
This book examines changes in the Persian Gulf security complex following the United States (US) invasion of Iraq in 2003, focusing on threats to the collective identities of two religious sects - Shia and Sunni. Although there is a growing body of literature examining security in the Persian Gulf, little focus has been given to the theoretical and methodological aspects of the problem. In this volume, Shayan analyses the causes behind the security changes which occurred in the region since 2003 and demonstrates how regional security dynamics are interlinked to perceived sectarian threats on the Shia and Sunni religious identities. This text is essential reading for political scientists, policy makers and scholars of international relations.
As the sole remaining superpower, shouldn't the United States be able to call the tune on establishing a secure world to our liking? While most international strategists conjure up history and theory of international relations from the past to examine such a question, Sy Deitchman, in "On Being a Superpower, " focuses on today's changing conditions and attitudes. He starts by addressing hypothetical situations that keep US international security experts awake at night. What would the United States do, he asks, if, in Saudi Arabia, an armed rebellion by Islamic fundamentalists were about to topple the House of Saud while demanding that the US get out of the Middle East? Would the United States go to war to try stop China's invasion of a democratic Taiwan that declares its independence? Could the US really win such a war against a determined country that has over a billion people and nuclear weapons? If a Central American drug cartel gained de facto control of the Panama canal and turned it into a smuggling lynchpin, what would the United States do?Deitchman examines these and other scenarios and then pictures how the US would likely respond, based on our society's current moral concerns, political rhetoric, and overall world view. After reviewing the challenges the world will present to us and examining the current state of our nation and its armed forces, Deitchman describes the strategy for preserving US security that appears to be emerging without explicit planning. He shows how trends in the armed forces parallel the trends in society, and how our argumentative political system is affecting our ability to build and use military power to support our strategy. Deitchman's synthesis of all these themes shows that the existing trends in the nation and the world are not favorable for our future security. Can they be changed? And if so, how? That's the conundrum readers of this book are invited to ponder.
In the interwar period, Red Army commanders headed by Tukhachevskii developed a new doctrine of mobile warfare and "deep operations". The military requirements of armaments and industrial production in the event of war was a central parameter in Stalinist industrialization. Based on recently opened Russian archives, the book analyzes military dimensions of Soviet long term economic and military reconstruction plans from the mid 1920s until 1941. It presents a new framework for estimating the Soviet war economic preparations, drastically underestimated by contemporaries.
The authors of this book are uniquely qualified to analyze the contemporary security landscape and promote necessary and pressing change. Each is a thought leader in his or her field. Four out of six authors are seasoned military professionals who share the view that the over-reliance on kinetic approaches over influence operations account for some of the failures of nations against extremists. Combined with civilian academic leadership this book is a practice in military civics. This collection of international perspectives, taken together, challenge commonly held assumptions and outmoded paradigms of engagement. In tribute to Co-Editor Amar Cheema, Brigadier General (R) We wish to dedicate this collaborative effort arguing for a more profitable approach to ending and pre-empting conflict as a fitting, living tribute to our Dear Friend, Colleague and Co-Editor, Brig. Amar Cheema, the consummate Soldier, Scholar and Gentleman. Brig. Cheema embodied the concept of "no one appreciates peace and stability as much as a Soldier". Editing and Co-authoring our book focused on using all elements of National Power to achieve and sustain stability is an apt legacy for our Dear Friend.
Andrew A. Michta examines the security of Poland, Czechoslovakia, and Hungary in the aftermath of the 1989 collapse of communism and the Soviet empire in Eastern Europe. He reviews the old geopolitical dilemmas in the region as well as the new conditions in Europe as it approaches the remainder of the decade, and offers a country-by-country discussion of security policies and military reforms underway in the region. The analysis is set against a background discussion of the region's history as well as a review of the key events leading to the disintegration of the Warsaw Treaty Organization, including the reformulation of Soviet security policy in the late 1980s. Michta concludes with an assessment of security challenges facing the Triangle states of Poland, Czechoslovakia, and Hungary as they work to join Western Europe by the end of the decade. He argues that the Triangle will remain in a gray security zone in Europe for the foreseeable future, with an implicit security commitment from NATO, but without explicit formal security guarantees.
These essays, written by a multinational and interdisciplinary group of contributors, seek to provide a profile of the strategic cultures of the states of the Asia Pacific region. Strategic culture consists of the traditional cultural, historical, political and societal factors that help shape the defence policies and strategic behaviour of countries. As such, it is a necessary element in understanding the security issues of this changing and increasingly significant region in world politics. In addition to contributing to a better understanding of the security problems and prospects of the Asia Pacific, the book also aims to give additional empirical weight to the developing concept of strategic culture and also relates it to the prospects for conflict management in the region, as well as military strategy.
Examining the evolving nature of national and international security in the post-Cold War era, this work focuses on non-military threat potentials and how these may best be countered. Six specific issues are discussed: terrorism, the heroin and cocaine trade, piracy, environmental degradation, the spread of disease and uncontrolled migration. The book concludes that greater national co-ordination, inter-agency co-operation and international collaboration is needed if these problems are going to be dealt with effectively. |
![]() ![]() You may like...
Positive Psychology in Second and…
Katarzyna Budzinska, Olga Majchrzak
Hardcover
R4,238
Discovery Miles 42 380
Polyelectrolytes - Thermodynamics and…
Visakh P. M., Oguz Bayraktar, …
Hardcover
Web and Wireless Geographical…
James D. Carswell, Stewart Fotheringham, …
Paperback
R1,497
Discovery Miles 14 970
Social Marketing and Behaviour Change…
Linda Brennan, Wayne Binney, …
Paperback
R1,646
Discovery Miles 16 460
|