|
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Discover the brand new instalment in Lizzie Lane's bestselling
Tobacco Girls series! War is fleeting, but true love last
forever...May 1944 Hope and excitement is in the air when news
breaks of the allied forces landing in Normandy. D Day has arrived.
However, the day-to-day struggles for the Tobacco Girls continue.
Carole Thomas wants her old life back. She is burdened with the
guilt of being a young single mother and considers having baby
Paula adopted, but Maisie Miles will do anything to stop her.
Phyllis Mason having found the love of her life is getting married
in Malta to Mick Fairbrother, but will the dangerous legacies of
war plague her happy day? Bridget O'Neill finds herself posted to
one of the hospitals receiving the injured from the D-Day landing
beaches. Her most fervent hope is that her husband, Lyndon, does
not become one of them. Peace is on the horizon, but will their
wishes and dreams win through and bring them a happy ever after?
Praise for Lizzie Lane: 'A gripping saga and a storyline that will
keep you hooked' Rosie Goodwin 'The Tobacco Girls is another
heartwarming tale of love and friendship and a must-read for all
saga fans.' Jean Fullerton 'Lizzie Lane opens the door to a past of
factory girls, redolent with life-affirming friendship, drama, and
choices that are as relevant today as they were then.' Catrin
Collier 'If you want an exciting, authentic historical saga then
look no further than Lizzie Lane.' Fenella J Miller
Today more than one hundred small, asymmetric, and revolutionary
wars are being waged around the world. This book provides
invaluable tools for fighting such wars by taking enemy
perspectives into consideration. The third volume of a trilogy by
Max G. Manwaring, it continues the arguments the author presented
in "Insurgency, Terrorism, and Crime" and "Gangs,
Pseudo-Militaries, and Other Modern Mercenaries." Using case
studies, Manwaring outlines vital survival lessons for leaders and
organizations concerned with national security in our contemporary
world.
The insurgencies Manwaring describes span the globe. Beginning with
conflicts in Algeria in the 1950s and 1960s and El Salvador in the
1980s, he goes on to cover the Shining Path and its resurgence in
Peru, Al Qaeda in Spain, popular militias in Cuba, Haiti, and
Brazil, the Russian youth group Nashi, and drugs and politics in
Guatemala, as well as cyber warfare.
Large, wealthy, well-armed nations such as the United States have
learned from experience that these small wars and insurgencies do
not resemble traditional wars fought between geographically
distinct nation-state adversaries by easily identified military
forces. Twenty-first-century irregular conflicts blur traditional
distinctions among crime, terrorism, subversion, insurgency,
militia, mercenary and gang activity, and warfare.
Manwaring's multidimensional paradigm offers military and civilian
leaders a much needed blueprint for achieving strategic victories
and ensuring global security now and in the future. It combines
military and police efforts with politics, diplomacy, economics,
psychology, and ethics. The challenge he presents to civilian and
military leaders is to take probable enemy perspectives into
consideration, and turn resultant conceptions into strategic
victories.
'The Art of War' is as relevant to today's warriors in business,
politics, and everyday life as it once was to the warlords of
ancient China. It is one of the most useful books ever written on
leading with wisdom, an essential tool for modern corporate
warriors battling to gain the advantage in the boardroom, and for
anyone struggling to gain the upper hand in confrontations and
competitions.
This textbook anthology of selected readings on pressing Middle
East security concerns serves as an invaluable single-volume
assessment of critical security issues in nations such as
Afghanistan, Egypt, Iran, Iraq, Israel, Lebanon, Syria, and Yemen.
The issues and current events of the Greater Middle East continue
to hold deep implications for American geopolitical interests in
the region—as they have for many decades. An ideal resource for
students in undergraduate courses on the Middle East and related
regions as well as students in graduate programs of international
studies or security studies, this textbook anthologizes recent,
insightful analyses by top scholars on trends and events in the
Middle East that bear crucially on regional and global security
considerations, covering topics like Iran's nuclear ambitions; the
rise, ebb, and resurgence of Al Qaeda; and the war in Syria. The
essays address concerns that include the re-imposition of military
rule in Egypt; the current status of Palestinian-Israeli relations;
the civil war and proposed chemical inspections in Syria;
Sunni-Shiite conflict and the revitalized al Qaeda presence in Iraq
and the Sunni resurgence in Iraq and Syria; and the
on-again-off-again international monitoring of nuclear facilities
in Iran, along with discussions of that country's connections to
the Syrian regime and Hezbollah in Lebanon. The use of drone
strikes as antiterrorist weapons and their use within U.S. and
international law also receive specific attention. Each reading is
summarized and contextualized by a concise introduction that serves
to enhance the integration of the individual readings across the
book. Original source notes are included with each chapter as
guides to further reading, and numerous maps provide an essential
sense of place. The book also includes a glossary of terms and a
register of brief biographies of significant persons.
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
 |
On War
(Hardcover)
Carl Von Clausewitz; Translated by Colonel J. J. Graham
|
R598
R552
Discovery Miles 5 520
Save R46 (8%)
|
Ships in 10 - 17 working days
|
|
|
Clausewitz, who fought in the Napoleonic wars, sought to understand
and analyze the phenomenon of war so that future leaders could win
conflicts more effectively. This abridged edition selects the books
in which the nature and theory of war are developed and explains
the originality his ideas.
Examines the causes and consequences of Saudi Arabia's current
security policy and the domestic, regional, and international
challenges the country's defense program presents to the general
welfare of the Middle East. As possessor of a quarter of the
world's oil reserves and host to two of the holiest cities in
Islam, Saudi Arabia is an integral part of the cultural, economic,
and political well-being of the Middle East. From Persian Gulf
security, to Middle Eastern politics, to the international energy
industry, events in this desert kingdom strongly impact the
stability of the region. This comprehensive resource analyzes
contemporary Saudi Arabia-its modern history, the role of Islam,
and the nature of Saudi foreign relations-and reveals how these and
other factors dictate and shape the country's current security
policies and priorities. Middle East expert and author Mathew Gray
has organized the work into six sections: the first provides an
historical overview of the region from the mid-1700s to the 1980s;
the second explores the Saudi political and security system; the
third discusses Saudi-U.S. relations; the fourth looks at Saudi
relations with the Gulf region and the wider Middle East; and the
fifth considers Saudi Arabia's role in Sunni extremism and
terrorism. The final chapter looks at emerging security threats for
Saudi Arabia. The book includes an overview of future challenges
and risks including climate change, water shortages, and problems
of Saudi identity and social dispersion. Explains the role of oil
in sustaining the state-society political bargain, and the impact
of population on its effectiveness Links Islam and Islamic
extremism to a range of influencing factors, including political
pressure, demographic changes, and the role of globalization in
fostering more extreme views Weaves together an analysis of
politics, economics, foreign relations, and social change, showing
how these all relate to and impact each other and, above all, shape
Saudi Arabia's and the Middle East's security environment
Historians of American environmentalism have long given religion
either a negligible role or a negative one in the development of
the field. According to the standard view, Christianity fostered
attitudes hostile or indifferent to nature, with Protestantism the
worst offender. While virtually all leading environmental figures
did eventually leave organized religion, a large majority however
had religious childhoods, usually in Reformed Protestant churches,
and often counted clergy as close relatives. And although popular
support for conservation and environmentalism was relatively
non-denominational, Congregationalists provided the foundational
ideas of conservation, while the rise and decline of
environmentalism as a powerful national movement coincided with the
prevalence of Presbyterian leadership. By tracing the history of
American environmentalism from a perspective that puts religion at
the center rather than the margins, Mark Stoll opens up a
fundamentally new and much needed narrative in environmental
studies. Inherit the Holy Mountain argues against the divide
between religion and American environmentalism, demonstrating how
religion necessarily provided environmentalists with
deeply-embedded moral and cultural ways of viewing the world giving
content, direction, and tone to the environmental causes they
espoused. The book demonstrates how individuals' denominational
origins corresponded with characteristic sets of ideas about nature
and the environment, with each denomination fostering a distinctive
culture with its own moral framework and its own placement of
humans within the natural world. Stoll also demonstrates how each
denomination also fostered a distinctive aesthetic reaction to
nature, beginning each chapter of the book with an analysis of a
representative work of art. Inherit the Holy Mountain also provides
insight into the possible future of environmentalism in the United
States, concluding with an examination of the current religious
scene and consideration of what it may tell us. Whatever form the
response to these problems will take in the twenty-first century,
Stoll says, it will look very different, with different values,
goals, and styles of leadership, than it did when the children of
the Reformed churches created and led it.
|
|