|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Discover the brand new instalment in Lizzie Lane's bestselling
Tobacco Girls series! War is fleeting, but true love last
forever...May 1944 Hope and excitement is in the air when news
breaks of the allied forces landing in Normandy. D Day has arrived.
However, the day-to-day struggles for the Tobacco Girls continue.
Carole Thomas wants her old life back. She is burdened with the
guilt of being a young single mother and considers having baby
Paula adopted, but Maisie Miles will do anything to stop her.
Phyllis Mason having found the love of her life is getting married
in Malta to Mick Fairbrother, but will the dangerous legacies of
war plague her happy day? Bridget O'Neill finds herself posted to
one of the hospitals receiving the injured from the D-Day landing
beaches. Her most fervent hope is that her husband, Lyndon, does
not become one of them. Peace is on the horizon, but will their
wishes and dreams win through and bring them a happy ever after?
Praise for Lizzie Lane: 'A gripping saga and a storyline that will
keep you hooked' Rosie Goodwin 'The Tobacco Girls is another
heartwarming tale of love and friendship and a must-read for all
saga fans.' Jean Fullerton 'Lizzie Lane opens the door to a past of
factory girls, redolent with life-affirming friendship, drama, and
choices that are as relevant today as they were then.' Catrin
Collier 'If you want an exciting, authentic historical saga then
look no further than Lizzie Lane.' Fenella J Miller
Today more than one hundred small, asymmetric, and revolutionary
wars are being waged around the world. This book provides
invaluable tools for fighting such wars by taking enemy
perspectives into consideration. The third volume of a trilogy by
Max G. Manwaring, it continues the arguments the author presented
in "Insurgency, Terrorism, and Crime" and "Gangs,
Pseudo-Militaries, and Other Modern Mercenaries." Using case
studies, Manwaring outlines vital survival lessons for leaders and
organizations concerned with national security in our contemporary
world.
The insurgencies Manwaring describes span the globe. Beginning with
conflicts in Algeria in the 1950s and 1960s and El Salvador in the
1980s, he goes on to cover the Shining Path and its resurgence in
Peru, Al Qaeda in Spain, popular militias in Cuba, Haiti, and
Brazil, the Russian youth group Nashi, and drugs and politics in
Guatemala, as well as cyber warfare.
Large, wealthy, well-armed nations such as the United States have
learned from experience that these small wars and insurgencies do
not resemble traditional wars fought between geographically
distinct nation-state adversaries by easily identified military
forces. Twenty-first-century irregular conflicts blur traditional
distinctions among crime, terrorism, subversion, insurgency,
militia, mercenary and gang activity, and warfare.
Manwaring's multidimensional paradigm offers military and civilian
leaders a much needed blueprint for achieving strategic victories
and ensuring global security now and in the future. It combines
military and police efforts with politics, diplomacy, economics,
psychology, and ethics. The challenge he presents to civilian and
military leaders is to take probable enemy perspectives into
consideration, and turn resultant conceptions into strategic
victories.
'The Art of War' is as relevant to today's warriors in business,
politics, and everyday life as it once was to the warlords of
ancient China. It is one of the most useful books ever written on
leading with wisdom, an essential tool for modern corporate
warriors battling to gain the advantage in the boardroom, and for
anyone struggling to gain the upper hand in confrontations and
competitions.
This textbook anthology of selected readings on pressing Middle
East security concerns serves as an invaluable single-volume
assessment of critical security issues in nations such as
Afghanistan, Egypt, Iran, Iraq, Israel, Lebanon, Syria, and Yemen.
The issues and current events of the Greater Middle East continue
to hold deep implications for American geopolitical interests in
the region—as they have for many decades. An ideal resource for
students in undergraduate courses on the Middle East and related
regions as well as students in graduate programs of international
studies or security studies, this textbook anthologizes recent,
insightful analyses by top scholars on trends and events in the
Middle East that bear crucially on regional and global security
considerations, covering topics like Iran's nuclear ambitions; the
rise, ebb, and resurgence of Al Qaeda; and the war in Syria. The
essays address concerns that include the re-imposition of military
rule in Egypt; the current status of Palestinian-Israeli relations;
the civil war and proposed chemical inspections in Syria;
Sunni-Shiite conflict and the revitalized al Qaeda presence in Iraq
and the Sunni resurgence in Iraq and Syria; and the
on-again-off-again international monitoring of nuclear facilities
in Iran, along with discussions of that country's connections to
the Syrian regime and Hezbollah in Lebanon. The use of drone
strikes as antiterrorist weapons and their use within U.S. and
international law also receive specific attention. Each reading is
summarized and contextualized by a concise introduction that serves
to enhance the integration of the individual readings across the
book. Original source notes are included with each chapter as
guides to further reading, and numerous maps provide an essential
sense of place. The book also includes a glossary of terms and a
register of brief biographies of significant persons.
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
This book critically conceptualises positive security and explores
multiple areas in global politics where positive security can be
studied as an alternative to the existing understandings and
practices of security. Structured through a framework on the
practice and ethics of everyday security, the book defines positive
security as a focal point of contextual and spatiotemporal moments
that emerge through encounters with 'the other' in everyday
politics. In these moments, an actor can show attentiveness and
humility towards 'the other'. In this book, the authors present
their own understandings of positive security, offering an in-depth
discussion and analysis of the Global North and South divides,
delving into many aspects such as human security, migration,
gender, Indigenous issues and perceptions of security in the
Arctic, and challenges and tensions for and within NATO. The book
concludes by reflecting on the significance of positive security,
looking at its application for other current issues, including how
to understand and manage new (in)security challenges including
hybrid threats and warfare. This book will be of interest to
students and scholars of international relations, critical
security, and peace studies.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
|
|