|
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Today more than one hundred small, asymmetric, and revolutionary
wars are being waged around the world. This book provides
invaluable tools for fighting such wars by taking enemy
perspectives into consideration. The third volume of a trilogy by
Max G. Manwaring, it continues the arguments the author presented
in "Insurgency, Terrorism, and Crime" and "Gangs,
Pseudo-Militaries, and Other Modern Mercenaries." Using case
studies, Manwaring outlines vital survival lessons for leaders and
organizations concerned with national security in our contemporary
world.
The insurgencies Manwaring describes span the globe. Beginning with
conflicts in Algeria in the 1950s and 1960s and El Salvador in the
1980s, he goes on to cover the Shining Path and its resurgence in
Peru, Al Qaeda in Spain, popular militias in Cuba, Haiti, and
Brazil, the Russian youth group Nashi, and drugs and politics in
Guatemala, as well as cyber warfare.
Large, wealthy, well-armed nations such as the United States have
learned from experience that these small wars and insurgencies do
not resemble traditional wars fought between geographically
distinct nation-state adversaries by easily identified military
forces. Twenty-first-century irregular conflicts blur traditional
distinctions among crime, terrorism, subversion, insurgency,
militia, mercenary and gang activity, and warfare.
Manwaring's multidimensional paradigm offers military and civilian
leaders a much needed blueprint for achieving strategic victories
and ensuring global security now and in the future. It combines
military and police efforts with politics, diplomacy, economics,
psychology, and ethics. The challenge he presents to civilian and
military leaders is to take probable enemy perspectives into
consideration, and turn resultant conceptions into strategic
victories.
If you know your enemies and know yourself, you can win numerous
battles without a single loss. - Sun Tzu, The Art of War Written in
the 6th century BC, Sun Tzu's The Art of War is still used as a
book of military strategy today. Napoleon, Mae Zedong and Douglas
MacArthur all claimed to have drawn inspiration from it. And beyond
the world of war, modern-era business and management gurus have
also applied Sun Tzu's ideas to politics and corporate strategy.
This illustrated dual-language edition not only presents the
original Chinese characters with James Trapp's translation on the
facing page, it also tests Sun Tzu's ideas against history. Each of
the 13 chapters includes a new commentary giving examples of how
Sun Tzu's wisdom has been borne out on the world's battlefields.
When, for example, has information provided by spies changed the
course of a battle? How has history shown Sun Tzu's ideas on the
importance of terrain in conflict to be true? And where can we best
find examples of strategic warfare being waged? From the ancient
world to the 20th century, the battles featured will be illustrated
with colour battle maps, paintings and artworks. Of immense
influence to leaders across millennia, The Art of War Illustrated
is a classic text richly deserving this illustrated and expanded
dual-language edition.
'The Art of War' is as relevant to today's warriors in business,
politics, and everyday life as it once was to the warlords of
ancient China. It is one of the most useful books ever written on
leading with wisdom, an essential tool for modern corporate
warriors battling to gain the advantage in the boardroom, and for
anyone struggling to gain the upper hand in confrontations and
competitions.
Out-of-print and out of the hands of military professionals for
years, Artech House answers the demand, making the sought-after,
classic work, "Stratagem: Deception and Surprise in War", available
once again. This timeless and widely cited volume offers
professionals a model and template for studying and analyzing
deception operations. Readers get an historical analysis of
deception and surprise, over 100 real-world case studies, and a set
of methods that underlie and pervade the entire book. This unique
resource takes a broad and deep look at surprise operations,
presenting intriguing questions and hypotheses about the possible
causes of surprise, including deception. Thoroughly referenced and
supported with clear data tables, the case studies concentrate on
goals, planning, expectations, security, leaks, warnings,
intelligence assessments, and final results. The book concludes
with analytical lists of battles from 1914 to 1968, systematically
laid out in columns for cross-tabulation.
This textbook anthology of selected readings on pressing Middle
East security concerns serves as an invaluable single-volume
assessment of critical security issues in nations such as
Afghanistan, Egypt, Iran, Iraq, Israel, Lebanon, Syria, and Yemen.
The issues and current events of the Greater Middle East continue
to hold deep implications for American geopolitical interests in
the region—as they have for many decades. An ideal resource for
students in undergraduate courses on the Middle East and related
regions as well as students in graduate programs of international
studies or security studies, this textbook anthologizes recent,
insightful analyses by top scholars on trends and events in the
Middle East that bear crucially on regional and global security
considerations, covering topics like Iran's nuclear ambitions; the
rise, ebb, and resurgence of Al Qaeda; and the war in Syria. The
essays address concerns that include the re-imposition of military
rule in Egypt; the current status of Palestinian-Israeli relations;
the civil war and proposed chemical inspections in Syria;
Sunni-Shiite conflict and the revitalized al Qaeda presence in Iraq
and the Sunni resurgence in Iraq and Syria; and the
on-again-off-again international monitoring of nuclear facilities
in Iran, along with discussions of that country's connections to
the Syrian regime and Hezbollah in Lebanon. The use of drone
strikes as antiterrorist weapons and their use within U.S. and
international law also receive specific attention. Each reading is
summarized and contextualized by a concise introduction that serves
to enhance the integration of the individual readings across the
book. Original source notes are included with each chapter as
guides to further reading, and numerous maps provide an essential
sense of place. The book also includes a glossary of terms and a
register of brief biographies of significant persons.
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
Understanding the complex history of US fossil fuel use can help us
build a sustainable future. In Hydrocarbon Nation, Thor Hogan looks
at how four technological revolutions-industrial, agricultural,
transportation, and electrification-drew upon the enormous
hydrocarbon wealth of the United States, transforming the young
country into a nation with unparalleled economic and military
potential. Each of these advances engendered new government
policies aimed at strengthening national and economic security. The
result was unprecedented energy security and the creation of a
nation nearly impervious to outside threats. However, when this
position weakened in the decades after the peaking of domestic
conventional oil supplies in 1970, the American political and
economic systems were severely debilitated. At the same time,
climate change was becoming a major concern. Fossil fuels created
the modern world, yet burning them created a climate crisis. Hogan
argues that everyday Americans and policymakers alike must embrace
the complexity of this contradiction in order to help society chart
a path forward. Doing so, Hogan explains, will allow us to launch a
critically important sustainability revolution capable of providing
energy and climate security in the future. Hydrocarbon Nation
provides reasons to believe that we can succeed in expanding on the
benefits of the Hydrocarbon Age in order to build a sustainable
future.
The culmination of 25 years of research, Alex Bennett's
groundbreaking English translation of Miyamoto Musashi's The Book
of Five Rings reveals the true meaning of the original work. Plus,
definitive translations of five more known works of Musashi! This
piece of writing by famed samurai Musashi (1584-1645) is the
single-most influential work on samurai swordsmanship, offering
insights into samurai history, the Zen Buddhist state of "no-mind"
that enables warriors to triumph and the philosophical meaning of
Bushido--"the way of the warrior." Until now, English translations
of The Book of Five Rings have been based on inaccurate copies of
Musashi's long-lost original manuscript. Bennett's translation is
the first to be based on a careful reconstruction of the original
text by Japan's foremost Musashi scholar. By identifying
discrepancies among the existing copies, adding missing texts and
correcting over 150 incorrect characters, this source is the
closest representation of Musashi's original work possible.
Utilizing this new source, Bennett captures the subtle nuance of
the classic Japanese text, resulting in the most accurate English
translation of The Book of Five Rings available Enjoy complete,
richly annotated translations of Musashi's most-known works: The
Book of Five Rings Mirror on the Way of Combat Notes on Combat
Strategy Combat Strategy in 35 Articles The Five-Direction Sword
Pathways The Path Walked Alone The texts are richly annotated by
Bennett, who includes an extensive introduction on Musashi's life
and legacy. This paperback edition also includes a new introduction
by Kendo Kyoshi 7th Dan Graham Sayer, who talks about the influence
Musashi's writings have had on him as a person and martial artist.
The Complete Musashi: The Book of Five Rings and Other Works will
be widely read by those interested in Japanese culture, Samurai
history and martial arts--setting a new standard against which all
other translations will be measured.
Examines the causes and consequences of Saudi Arabia's current
security policy and the domestic, regional, and international
challenges the country's defense program presents to the general
welfare of the Middle East. As possessor of a quarter of the
world's oil reserves and host to two of the holiest cities in
Islam, Saudi Arabia is an integral part of the cultural, economic,
and political well-being of the Middle East. From Persian Gulf
security, to Middle Eastern politics, to the international energy
industry, events in this desert kingdom strongly impact the
stability of the region. This comprehensive resource analyzes
contemporary Saudi Arabia-its modern history, the role of Islam,
and the nature of Saudi foreign relations-and reveals how these and
other factors dictate and shape the country's current security
policies and priorities. Middle East expert and author Mathew Gray
has organized the work into six sections: the first provides an
historical overview of the region from the mid-1700s to the 1980s;
the second explores the Saudi political and security system; the
third discusses Saudi-U.S. relations; the fourth looks at Saudi
relations with the Gulf region and the wider Middle East; and the
fifth considers Saudi Arabia's role in Sunni extremism and
terrorism. The final chapter looks at emerging security threats for
Saudi Arabia. The book includes an overview of future challenges
and risks including climate change, water shortages, and problems
of Saudi identity and social dispersion. Explains the role of oil
in sustaining the state-society political bargain, and the impact
of population on its effectiveness Links Islam and Islamic
extremism to a range of influencing factors, including political
pressure, demographic changes, and the role of globalization in
fostering more extreme views Weaves together an analysis of
politics, economics, foreign relations, and social change, showing
how these all relate to and impact each other and, above all, shape
Saudi Arabia's and the Middle East's security environment
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
The history of the last days of Napoleonic France
In 1812 Napoleon set out with his greatest army upon his most
ambitious campaign-the invasion of Imperial Russia. It became a
disaster that cost him an entire army-a body of men and material
that could never be replaced and by the time this disaster was
compounded by the defeat of the 'Battle of the Nations' at Leipzig
the decline of the First Empire was irreversible. What followed was
a hard fought campaign as the French Army was driven back to and
over it's borders and which would only end in the streets of Paris
itself. Now with his back to the wall Napoleon would fight some of
his final engagements and demonstrate once again the magnitude of
his military genius. This is the history of that campaign and an
essential book for students of the Napoleonic era.
|
You may like...
Raaiselklip
Troula Goosen
Paperback
R225
R201
Discovery Miles 2 010
|