0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (114)
  • R250 - R500 (562)
  • R500+ (2,877)
  • -
Status
Format
Author / Contributor
Publisher

Books > Social sciences > Warfare & defence > Defence strategy, planning & research

On War (Deluxe Library Edition) (Annotated) (Hardcover): Carl Von Clausewitz On War (Deluxe Library Edition) (Annotated) (Hardcover)
Carl Von Clausewitz
R1,103 Discovery Miles 11 030 Ships in 18 - 22 working days
Evading and Escaping Capture - Urban Escape and Evasion Techniques for Civilians (Hardcover): Sam Fury Evading and Escaping Capture - Urban Escape and Evasion Techniques for Civilians (Hardcover)
Sam Fury; Illustrated by Neil Germio
R859 Discovery Miles 8 590 Ships in 18 - 22 working days
Operation Barbarossa - the Complete Organisational and Statistical Analysis, and Military Simulation, Volume IIB (Hardcover,... Operation Barbarossa - the Complete Organisational and Statistical Analysis, and Military Simulation, Volume IIB (Hardcover, Color and Hardback ed.)
Nigel Askey
R2,234 Discovery Miles 22 340 Ships in 18 - 22 working days
The Art of War (Deluxe Library Edition) (Annotated) (Hardcover): Sun Tzu The Art of War (Deluxe Library Edition) (Annotated) (Hardcover)
Sun Tzu
R741 Discovery Miles 7 410 Ships in 18 - 22 working days
Operations in Snow and Extreme Cold (FM70-15) (Paperback): U.S. War Department Operations in Snow and Extreme Cold (FM70-15) (Paperback)
U.S. War Department
R470 Discovery Miles 4 700 Ships in 10 - 15 working days
The Complexity of Modern Asymmetric Warfare (Hardcover): Max G. Manwaring The Complexity of Modern Asymmetric Warfare (Hardcover)
Max G. Manwaring; Foreword by John T. Fishel; Afterword by Edwin G Corr
R1,301 Discovery Miles 13 010 Ships in 18 - 22 working days

Today more than one hundred small, asymmetric, and revolutionary wars are being waged around the world. This book provides invaluable tools for fighting such wars by taking enemy perspectives into consideration. The third volume of a trilogy by Max G. Manwaring, it continues the arguments the author presented in "Insurgency, Terrorism, and Crime" and "Gangs, Pseudo-Militaries, and Other Modern Mercenaries." Using case studies, Manwaring outlines vital survival lessons for leaders and organizations concerned with national security in our contemporary world.
The insurgencies Manwaring describes span the globe. Beginning with conflicts in Algeria in the 1950s and 1960s and El Salvador in the 1980s, he goes on to cover the Shining Path and its resurgence in Peru, Al Qaeda in Spain, popular militias in Cuba, Haiti, and Brazil, the Russian youth group Nashi, and drugs and politics in Guatemala, as well as cyber warfare.
Large, wealthy, well-armed nations such as the United States have learned from experience that these small wars and insurgencies do not resemble traditional wars fought between geographically distinct nation-state adversaries by easily identified military forces. Twenty-first-century irregular conflicts blur traditional distinctions among crime, terrorism, subversion, insurgency, militia, mercenary and gang activity, and warfare.
Manwaring's multidimensional paradigm offers military and civilian leaders a much needed blueprint for achieving strategic victories and ensuring global security now and in the future. It combines military and police efforts with politics, diplomacy, economics, psychology, and ethics. The challenge he presents to civilian and military leaders is to take probable enemy perspectives into consideration, and turn resultant conceptions into strategic victories.

The Persian Expedition (Hardcover): Xenophon Xenophon The Persian Expedition (Hardcover)
Xenophon Xenophon
R693 Discovery Miles 6 930 Ships in 10 - 15 working days
The Art of War (Hardcover): Sun Tzu The Art of War (Hardcover)
Sun Tzu
R604 Discovery Miles 6 040 Ships in 18 - 22 working days

'The Art of War' is as relevant to today's warriors in business, politics, and everyday life as it once was to the warlords of ancient China. It is one of the most useful books ever written on leading with wisdom, an essential tool for modern corporate warriors battling to gain the advantage in the boardroom, and for anyone struggling to gain the upper hand in confrontations and competitions.

Where Away (Hardcover): George Sessions Perry Where Away (Hardcover)
George Sessions Perry
R730 Discovery Miles 7 300 Ships in 10 - 15 working days
The Year of Battles - or the Franco-German War of 1870-71 (Hardcover): L. P Brockett The Year of Battles - or the Franco-German War of 1870-71 (Hardcover)
L. P Brockett
R1,230 Discovery Miles 12 300 Ships in 18 - 22 working days
Sir John Fortescue's The Hard Learned Lesson - the British Army & the Campaigns in Flanders & the Netherlands against the... Sir John Fortescue's The Hard Learned Lesson - the British Army & the Campaigns in Flanders & the Netherlands against the French 1792-99 (Hardcover)
J.W. Fortescue
R807 Discovery Miles 8 070 Ships in 18 - 22 working days
Stratagem - Deception and Surprise in War (Hardcover): Barton Whaley Stratagem - Deception and Surprise in War (Hardcover)
Barton Whaley
R3,055 Discovery Miles 30 550 Ships in 18 - 22 working days

Out-of-print and out of the hands of military professionals for years, Artech House answers the demand, making the sought-after, classic work, "Stratagem: Deception and Surprise in War", available once again. This timeless and widely cited volume offers professionals a model and template for studying and analyzing deception operations. Readers get an historical analysis of deception and surprise, over 100 real-world case studies, and a set of methods that underlie and pervade the entire book. This unique resource takes a broad and deep look at surprise operations, presenting intriguing questions and hypotheses about the possible causes of surprise, including deception. Thoroughly referenced and supported with clear data tables, the case studies concentrate on goals, planning, expectations, security, leaks, warnings, intelligence assessments, and final results. The book concludes with analytical lists of battles from 1914 to 1968, systematically laid out in columns for cross-tabulation.

Security Issues in the Greater Middle East (Hardcover): Karl Yambert Security Issues in the Greater Middle East (Hardcover)
Karl Yambert
R2,540 R2,402 Discovery Miles 24 020 Save R138 (5%) Ships in 10 - 15 working days

This textbook anthology of selected readings on pressing Middle East security concerns serves as an invaluable single-volume assessment of critical security issues in nations such as Afghanistan, Egypt, Iran, Iraq, Israel, Lebanon, Syria, and Yemen. The issues and current events of the Greater Middle East continue to hold deep implications for American geopolitical interests in the region—as they have for many decades. An ideal resource for students in undergraduate courses on the Middle East and related regions as well as students in graduate programs of international studies or security studies, this textbook anthologizes recent, insightful analyses by top scholars on trends and events in the Middle East that bear crucially on regional and global security considerations, covering topics like Iran's nuclear ambitions; the rise, ebb, and resurgence of Al Qaeda; and the war in Syria. The essays address concerns that include the re-imposition of military rule in Egypt; the current status of Palestinian-Israeli relations; the civil war and proposed chemical inspections in Syria; Sunni-Shiite conflict and the revitalized al Qaeda presence in Iraq and the Sunni resurgence in Iraq and Syria; and the on-again-off-again international monitoring of nuclear facilities in Iran, along with discussions of that country's connections to the Syrian regime and Hezbollah in Lebanon. The use of drone strikes as antiterrorist weapons and their use within U.S. and international law also receive specific attention. Each reading is summarized and contextualized by a concise introduction that serves to enhance the integration of the individual readings across the book. Original source notes are included with each chapter as guides to further reading, and numerous maps provide an essential sense of place. The book also includes a glossary of terms and a register of brief biographies of significant persons.

Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover): Chris Bronk Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover)
Chris Bronk
R2,514 R2,377 Discovery Miles 23 770 Save R137 (5%) Ships in 10 - 15 working days

This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed

Wellington's Army - the Commanders, Organisation, Tactics and Equipage of the British Army During the Peninsular War,... Wellington's Army - the Commanders, Organisation, Tactics and Equipage of the British Army During the Peninsular War, 1809-14 (Hardcover)
Charles Oman
R859 Discovery Miles 8 590 Ships in 18 - 22 working days
Information Operations—Doctrine and Practice - A Reference Handbook (Hardcover): Christopher Paul Information Operations—Doctrine and Practice - A Reference Handbook (Hardcover)
Christopher Paul
R2,218 R2,049 Discovery Miles 20 490 Save R169 (8%) Ships in 10 - 15 working days

A no-nonsense treatment of information operations, this handbook makes clear what does and does not fall under information operations, how the military plans and executes such efforts, and what the role of IO ought to be in the "war of ideas." Paul provides detailed accounts of the doctrine and practice of the five core information operations capabilities (psychological operations, military deception, operations security, electronic warfare, and computer network operations) and the three "related" capabilities (public affairs, civil-military operations, and military support to public diplomacy). The discussion of each capability includes historical examples, explanations of tools and forces available, and current challenges faced by that community. An appendix of selected excerpts from military doctrine ties the work firmly to the military theory behind information operations. Paul argues that contemporary IO's mixing of capabilities focused on information content with those focused on information systems conflates "apples" with the "apple carts." This important study concludes that information operations would be better poised to contribute to the war of ideas if IO were reorganized, separating content capabilities from systems capabilities and separating the employment of "black" (deceptive or falsely attributed) information from "white" (wholly truthful and correctly attributed) information.

Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,286 Discovery Miles 52 860 Ships in 18 - 22 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

Why Custer Was Never Warned - The Forgotten Story of the True Genesis of America's Most Iconic Military Disaster,... Why Custer Was Never Warned - The Forgotten Story of the True Genesis of America's Most Iconic Military Disaster, Custer's Last Stand (Hardcover)
Phillip Thomas Tucker
R1,100 Discovery Miles 11 000 Ships in 18 - 22 working days
Sir John Fortescue's Thunder in the East - the British Army During the First & Second Burma Wars (Hardcover): J.W.... Sir John Fortescue's Thunder in the East - the British Army During the First & Second Burma Wars (Hardcover)
J.W. Fortescue
R749 Discovery Miles 7 490 Ships in 18 - 22 working days
The Campaigns of Field-Marshal Blucher During the Seven Years War, the Revolutionary War and the Napoleonic Wars, 1758-1815... The Campaigns of Field-Marshal Blucher During the Seven Years War, the Revolutionary War and the Napoleonic Wars, 1758-1815 (Hardcover)
August Gneisenau
R859 Discovery Miles 8 590 Ships in 18 - 22 working days
Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover): Metodi Hadji-Janev, Mitko... Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover)
Metodi Hadji-Janev, Mitko Bogdanoski
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.

Global Security Watch-Saudi Arabia (Hardcover): Matthew Gray Global Security Watch-Saudi Arabia (Hardcover)
Matthew Gray
R1,933 R1,732 Discovery Miles 17 320 Save R201 (10%) Ships in 10 - 15 working days

Examines the causes and consequences of Saudi Arabia's current security policy and the domestic, regional, and international challenges the country's defense program presents to the general welfare of the Middle East. As possessor of a quarter of the world's oil reserves and host to two of the holiest cities in Islam, Saudi Arabia is an integral part of the cultural, economic, and political well-being of the Middle East. From Persian Gulf security, to Middle Eastern politics, to the international energy industry, events in this desert kingdom strongly impact the stability of the region. This comprehensive resource analyzes contemporary Saudi Arabia-its modern history, the role of Islam, and the nature of Saudi foreign relations-and reveals how these and other factors dictate and shape the country's current security policies and priorities. Middle East expert and author Mathew Gray has organized the work into six sections: the first provides an historical overview of the region from the mid-1700s to the 1980s; the second explores the Saudi political and security system; the third discusses Saudi-U.S. relations; the fourth looks at Saudi relations with the Gulf region and the wider Middle East; and the fifth considers Saudi Arabia's role in Sunni extremism and terrorism. The final chapter looks at emerging security threats for Saudi Arabia. The book includes an overview of future challenges and risks including climate change, water shortages, and problems of Saudi identity and social dispersion. Explains the role of oil in sustaining the state-society political bargain, and the impact of population on its effectiveness Links Islam and Islamic extremism to a range of influencing factors, including political pressure, demographic changes, and the role of globalization in fostering more extreme views Weaves together an analysis of politics, economics, foreign relations, and social change, showing how these all relate to and impact each other and, above all, shape Saudi Arabia's and the Middle East's security environment

Unrestricted Warfare - China's Master Plan to Destroy America (Hardcover): Qiao Liang, Wang Xiangsui Unrestricted Warfare - China's Master Plan to Destroy America (Hardcover)
Qiao Liang, Wang Xiangsui
R588 Discovery Miles 5 880 Ships in 18 - 22 working days
Counterterrorism - Mission Critical Skills (Paperback): Leslie Adrienne Payne Counterterrorism - Mission Critical Skills (Paperback)
Leslie Adrienne Payne
R2,558 R2,169 Discovery Miles 21 690 Save R389 (15%) Ships in 10 - 15 working days

Counterterrorism: Mission Critical Skills helps current and future counterterrorism specialists develop skills that are vital for their professional success. The book provides readers with a well-researched argument as to why a particular set of soft skills are indispensable to counterterrorism specialists. It underscores the need for best practices and proficiencies among the extensive network of agencies and entities that fight terrorism. The opening chapter explores the various counterterrorism entities in the United States, highlighting their interconnectedness and illuminating the need for entities to work collaboratively toward a shared goal. Each of the remaining chapters profile a mission-critical soft skill and offer learning demands for guidance, first-person quotes from professional counterterrorism experts, and operational vignettes to demonstrate the importance of each skill. The skills presented include teamwork, imagination, strategic consciousness, cultural mindfulness, discernment, empathy, mutuality, and operational adaptability. Counterterrorism equips readers with the soft skills that, when paired with the hard skills counterterrorism specialists are required to learn, will help them develop into highly capable, well-rounded, and efficient counterterrorism professionals.

Understanding Urban Warfare (Hardcover): Liam Collins, John Spencer Understanding Urban Warfare (Hardcover)
Liam Collins, John Spencer
R1,519 Discovery Miles 15 190 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Contacts and Contrasts in Cultures and…
Barbara Lewandowska-Tomaszczyk Hardcover R2,894 Discovery Miles 28 940
Lifespace Rotisserie Braai Skewer Set
R829 R549 Discovery Miles 5 490
Nomai Dance Drama - A Surviving Spirit…
Susan M. Asai Hardcover R2,804 R2,538 Discovery Miles 25 380
Being Jewish After The Destruction Of…
Peter Beinart Paperback R435 R388 Discovery Miles 3 880
Machine Learning and Data Mining
I Kononenko, M Kukar Paperback R1,903 Discovery Miles 19 030
Raz Tech Protective Shockproof Gel Case…
R199 R89 Discovery Miles 890
Revitalizing Minority Languages - New…
Michael Hornsby Hardcover R2,407 R1,776 Discovery Miles 17 760
MacNetCover Metal Magnetic Double Sided…
A Narrative Approach to Social Media…
Korina Giaxoglou Hardcover R4,913 Discovery Miles 49 130
Lifespace Large Flat Adjustable…
R1,329 R439 Discovery Miles 4 390

 

Partners