|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Today more than one hundred small, asymmetric, and revolutionary
wars are being waged around the world. This book provides
invaluable tools for fighting such wars by taking enemy
perspectives into consideration. The third volume of a trilogy by
Max G. Manwaring, it continues the arguments the author presented
in "Insurgency, Terrorism, and Crime" and "Gangs,
Pseudo-Militaries, and Other Modern Mercenaries." Using case
studies, Manwaring outlines vital survival lessons for leaders and
organizations concerned with national security in our contemporary
world.
The insurgencies Manwaring describes span the globe. Beginning with
conflicts in Algeria in the 1950s and 1960s and El Salvador in the
1980s, he goes on to cover the Shining Path and its resurgence in
Peru, Al Qaeda in Spain, popular militias in Cuba, Haiti, and
Brazil, the Russian youth group Nashi, and drugs and politics in
Guatemala, as well as cyber warfare.
Large, wealthy, well-armed nations such as the United States have
learned from experience that these small wars and insurgencies do
not resemble traditional wars fought between geographically
distinct nation-state adversaries by easily identified military
forces. Twenty-first-century irregular conflicts blur traditional
distinctions among crime, terrorism, subversion, insurgency,
militia, mercenary and gang activity, and warfare.
Manwaring's multidimensional paradigm offers military and civilian
leaders a much needed blueprint for achieving strategic victories
and ensuring global security now and in the future. It combines
military and police efforts with politics, diplomacy, economics,
psychology, and ethics. The challenge he presents to civilian and
military leaders is to take probable enemy perspectives into
consideration, and turn resultant conceptions into strategic
victories.
Almost half a century ago, the Australian National University's TB
Millar penned a seminal book on Australian defence policy in the
lead up to the Vietnam War. Today, Australia's defence forces are
returning from long conflicts overseas, while the rise of China and
the economic integration in the Indo-Pacific presents a complex mix
of challenges and opportunities. Drawing inspiration from Millar's
original volume, Australia's Defence: Towards a New Era? brings
together leading experts to examine the domestic and international
context of Australia's defence policy, Australian strategy and the
size and state of our armed forces. As the country heads towards a
new era, this book provides an in-depth overview and key insights
into the past, present and future of Australia's defence.
These are extraordinary times in U.S. national security policy.
America remains engaged in both Iraq and Afghanistan while facing a
global economic downturn. Homeland security concerns still abound
in the wake of the September 11 attacks. Even as the financial
crisis places considerable pressure on the U.S. budget, President
Obama will have to spend a great deal of time and money on national
security, hard power, and war. How should these competing demands
be prioritized? How much money will be needed? How much will be
available, and how should it be spent?
"Budgeting for Hard Power" continues the long and proud
tradition of Brookings analysis on defense spending. As with
previous volumes, this book examines the budgets of the Pentagon
and the Department of Energy's nuclear weapons programs. But
Michael O'Hanlon takes his analysis further, addressing the wide
range of activities crucial for American security as a result of
9/11 and the ongoing wars. He considers homeland security resources
and selected parts of the State Department and foreign operations
budgets --offering a more complete overall look at the elements
that make up America's "hard power" budget, a concept that he and
Kurt Campbell wrote about in "Hard Power: The New Politics of
National Security" (2006).
With future federal deficits projected to top $1 trillion,
O'Hanlon calls for Defense, State, and Homeland Security budgets to
be as frugal as possible. At the same time, he recognizes that
resources should be selectively increased in certain areas to
compensate for years of systematic underfunding, especially in
certain areas of homeland security, diplomacy, and foreign
assistance. In his typically clear and concise manner, O'Hanlon
shows policymakers how to wrestle with the resource allocation
decisions affecting the national security of the United States.
'The Art of War' is as relevant to today's warriors in business,
politics, and everyday life as it once was to the warlords of
ancient China. It is one of the most useful books ever written on
leading with wisdom, an essential tool for modern corporate
warriors battling to gain the advantage in the boardroom, and for
anyone struggling to gain the upper hand in confrontations and
competitions.
This textbook anthology of selected readings on pressing Middle
East security concerns serves as an invaluable single-volume
assessment of critical security issues in nations such as
Afghanistan, Egypt, Iran, Iraq, Israel, Lebanon, Syria, and Yemen.
The issues and current events of the Greater Middle East continue
to hold deep implications for American geopolitical interests in
the region—as they have for many decades. An ideal resource for
students in undergraduate courses on the Middle East and related
regions as well as students in graduate programs of international
studies or security studies, this textbook anthologizes recent,
insightful analyses by top scholars on trends and events in the
Middle East that bear crucially on regional and global security
considerations, covering topics like Iran's nuclear ambitions; the
rise, ebb, and resurgence of Al Qaeda; and the war in Syria. The
essays address concerns that include the re-imposition of military
rule in Egypt; the current status of Palestinian-Israeli relations;
the civil war and proposed chemical inspections in Syria;
Sunni-Shiite conflict and the revitalized al Qaeda presence in Iraq
and the Sunni resurgence in Iraq and Syria; and the
on-again-off-again international monitoring of nuclear facilities
in Iran, along with discussions of that country's connections to
the Syrian regime and Hezbollah in Lebanon. The use of drone
strikes as antiterrorist weapons and their use within U.S. and
international law also receive specific attention. Each reading is
summarized and contextualized by a concise introduction that serves
to enhance the integration of the individual readings across the
book. Original source notes are included with each chapter as
guides to further reading, and numerous maps provide an essential
sense of place. The book also includes a glossary of terms and a
register of brief biographies of significant persons.
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
This book critically conceptualises positive security and explores
multiple areas in global politics where positive security can be
studied as an alternative to the existing understandings and
practices of security. Structured through a framework on the
practice and ethics of everyday security, the book defines positive
security as a focal point of contextual and spatiotemporal moments
that emerge through encounters with 'the other' in everyday
politics. In these moments, an actor can show attentiveness and
humility towards 'the other'. In this book, the authors present
their own understandings of positive security, offering an in-depth
discussion and analysis of the Global North and South divides,
delving into many aspects such as human security, migration,
gender, Indigenous issues and perceptions of security in the
Arctic, and challenges and tensions for and within NATO. The book
concludes by reflecting on the significance of positive security,
looking at its application for other current issues, including how
to understand and manage new (in)security challenges including
hybrid threats and warfare. This book will be of interest to
students and scholars of international relations, critical
security, and peace studies.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
|
You may like...
DNA Computing Models
Zoya Ignatova, Israel Martinez-Perez, …
Hardcover
R4,382
Discovery Miles 43 820
|