![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This is the first book to appear on British intelligence operations based in both India and London, which defended the Indian Empire against subversion during the first two decades of the twentieth century. It is concerned with the threat to the British Raj posed by the Indian revolutionary movement, the resulting development of the imperial intelligence service and the role it played during the First World War.
This is an analysis of the proliferation of chemical and biological weapons, which examines the attractions and utility of these weapons for some developing states, the difficulties encountered in trying to control their spread and the lessons from the Rabta controversy and the Gulf War. It reviews the evolution of American chemical weapons policy under the Bush administration, the implications of the Chemical Weapons Convention and the problems posed by the inherently dynamic nature of these weapons and their tactical flexibility.
Many aspects of the Tet offensive of 1968 are brought to light here. The offensive is acknowledged as the turning point of the Vietnam War. Using Communist Vietnamese documents combined with Western sources, the author provides a more accurate version of the events, their significance, and reveals the crucial role played by US intelligence. This book illustrates that in the 1960s the Communist Vietnamese were well aware of the political and diplomatic nature of a People's War.
Does the proliferation of security communities around the world presage a new era of competition between regions or an era of intensified global integration? This important new study assesses the relationship between security communities and their neighbours and asks whether processes of regional integration will contribute to a global 'clash of civilizations'. Drawing on four detailed case studies (Western Europe, Southeast Asia, the Persian Gulf and North America), Alex J. Bellamy argues that the more mature a security community becomes, the less likely it is to become a 'regional fortress'. Postgraduates and Undergraduates studying International Relations; Security Studies; Strategic Studies
The Truman administration's decision to embark on an arms build-up in 1950 was a critical event. For the first time other than a World War, the United States became a global military presence. Unlike the World Wars, in this instance the deployment lasted decades, altering the nature of the Cold War and the United States' global role. Such a decision deserves a book dedicated to understanding the strategy and politics behind it. The Beginnings of the Cold War Arms Race serves that purpose. The Beginnings of the Cold War Arms Race reviews the state of American military affairs in the late 1940s and describes the role of atomic power in American strategy. It also outlines the factional fighting within the Truman administration over military spending and deployments and considers the Truman administration's perceptions of Soviet military power and intentions. The author presents a fascinating account of the strategy and politics behind the Truman administration's decision to engage in a massive arms build-up that initiated the Cold War arms race.
For much of the post war era, the substance and scope of international security was defined by the parameters of the Cold War. But the end of the Cold War has created a new global context. This text seeks to map out the nature of post Cold War security by exploring the patterns of international conflict, weighing non state challenges to security, examining inter state cooperation in the security field and evaluating the security dynamics of the Asia Pacific region.
Steven Woodworth's previous book, the critically acclaimed "Jefferson Davis and His Generals," won the prestigious Fletcher Pratt Award and was a main selection of the History Book Club. In that book he showed how the failures of Davis and his military leaders in the west paved the way for Confederate defeat. In Davis and Lee at War, he concludes his study of Davis as rebel commander-in-chief and shows how the lack of a unified purpose and strategy in the east sealed the Confederacy's fate. Woodworth argues that Davis and Robert E. Lee, the South's greatest military leader, had sharply conflicting views over the proper conduct of the war. Davis was convinced that the South should fight a defensive war, to simply outlast the North's political and popular support for the war. By contrast, Lee and the other eastern generals-notably P.G.T. Beauregard, Gustavus Smith, and Stonewall Jackson-were eager for the offensive. They were convinced that only quick and decisive battlefield victories would prevent the North from eventually defeating them with its overwhelming advantage in men and materials. Davis and Lee, Woodworth shows, shared a mutual respect for each other for most of the war. But it was respect mixed with a stubborn resistance to the other's influence. The result of this tense tug-of-war was Davis's misguided pursuit of a middle ground that gave neither strategy its best chance for success. The war finally ground to a bloody conclusion with Davis as indecisive as ever and virtually blind to how little confidence his generals had in his leadership. Drawing extensively upon the papers of Jefferson Davis and the works of leading Civil War historians, Woodworth places the eastern military campaigns in an entirely new light and expands our understanding of Davis as leader of the Confederacy.
After 1945, Britain maintained a great chain of overseas military outposts stretching from the Suez Canal to Singapore. Commonly termed the 'east of Suez' role, this chain had long been thought to be crucial for the country's security and its vitality. Nonetheless, British leaders eventually decided to abandon this network of bases. This study provides a comprehensive explanation of this pivotal decision, while also offering insight into the processes of foreign policy change and the decline of great powers.
This book contains a probing and comprehensive theoretical analysis of the emerging notion of national security in light of the dramatic post-Cold War transformation of the international system. It begins with a discussion of the nature of this change, emphasizing declining national sovereignty, escalating international interdependence, and proliferating anarchic conflict. After developing a framework of the conceptual components of national security, this study focuses on analyzing change--both in priorities and tradeoffs--in military security, economic security, resource/environmental security, and political/cultural security. Brief case studies of the 1991 Gulf War, the 1991 Maastricht Treaty, the 1992 Earth Summit, and the ongoing Yugoslavia conflict illustrate the theoretical contentions. Finally, a set of crucial, fundamental security policy challenges and responses conclude the book.
This volume presents often sharply contrasting views on the future of NATO. Its contributors, mainly security specialists, cover structural reform of NATO and its relationship with the European Union; evidence or arguments in support of the Alliance taking on new tasks like peacekeeping and enlarging eastward to include countries of the former Soviet bloc; and a variety of arguments against enlargement, ranging from concerns about Russia's reaction to questions about whether the US should remain involved in Europe.
Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare. Covers in detail one of the defining forms of conflict of the 21st century-cyber warfare will significantly impact virtually every American citizen over the next two decades Provides more than 90 primary source documents and matching analysis, allowing readers to investigate the underpinnings of cyber warfare Enables readers to see the development of different concepts of cyber warfare through its chronological organization Reflects the deep knowledge of an editor who is a noted expert in cyber warfare and has taught for the United States Air Force for more than a decade
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
On Operations: Operational Art and Military Disciplines traces the history of the development of military staffs and ideas on the operational level of war and operational art from the Napoleonic Wars to today, viewing them through the lens of Prussia/Germany, the Soviet Union, and the United States. B. A. Friedman concludes that the operational level of war should be rejected as fundamentally flawed, but that operational art is an accurate description of the activities of the military staff, an organization developed to provide the brainpower necessary to manage the complexity of modern military operations. Rather than simply serve as an intercession between levels, the military staff exists as an enabler and supporting organization to tacticians and strategists alike. On Operations examines the organization of military staffs, which has changed little since Napoleon's time. Historical examinations of the functions staffs provided to commanders, and the disciplines of the staff officers themselves, leads to conclusions about how best to organize staffs in the future. Friedman demonstrates these ideas through case studies of historical campaigns based on the military discipline system developed.
The proliferation of advanced weapons to volatile regions of the world has become a major issue in the post Cold War era. It was thought that no Third World nation could ever pose a technologically-based threat to the great powers by acquiring advanced weaponry. But this has proved to be wrong. The Persian Gulf War changed the worldwide perception of the spread of ballistic missiles to countries like Iraq. Access to a new type of weapon--cruise missiles--poses an even greater threat. With technology that is accessible, affordable, and relatively simple to produce, Third World countries could acquire highly accurate, long-range cruise missile forces to escalate local conflicts and threaten the forces and even the territories of the industrial powers. This book is a warning to policymakers. It is not too late to confront the realities of cruise missile proliferation and to devise international responses that could contain the worst possible consequences. Carus proposes a new regime of technology controls, security-building measures, and conflict resolution that need to be considered, and acted on, by policymakers and international relations experts everywhere.
* divergencies between practice and policy in NATO US-European
positions
This major comparative study examines the challenges faced by countries of postcommunist Europe in reforming and professionalizing their armed forces. It explores how the interaction of the common challenges of postcommunism and the diverse circumstances of individual countries shape professionalization processes in this changing region. The detailed country case studies in this volume, written by leading experts to a common analytical framework, compare the experiences of Poland, the Czech Republic, Slovakia, Hungary, Latvia, Lithuania, Romania, Bulgaria, Slovenia, Croatia, FRY, Russia, and Ukraine.
ALEXANDER, HANNIBAL, CAESAR--each was a master of war. Each had to
look beyond the battlefield to decide whom to fight, when, and why;
to know what victory was and when to end the war; to determine how
to bring stability to the lands he conquered. Each general had to
be a battlefield tactician and more: a statesman, a strategist, a
leader.
During the decade that preceded Mikhail Gorbachev's era of glasnost
and perestroika, the KGB headquarters in Moscow was putting out a
constant stream of instructions to its Residencies abroad. These
top secret documents were principally concerned with agent
recruitment, infiltration of key foreign organizations,
intelligence collection and interpretation, and influence
operations, while endeavouring at all times to promote and protect
the interests of the Soviet Union against countries seen as
enemies.
Drawing from military geography's spatial roots, its embrace of dynamic systems, and integration of human and biophysical environments, this book helps in understanding the value of analyzing patterns, processes and systems, and cross-scale and multi-disciplinary ways of acting in a complex world, while making the case for a resurgence of strategic and military geography in Australia. Here, leading experts demonstrate that geography retains its relevance in clarifying the scale and dynamics of defense activities in assessments of the international, regional, national, and site impacts of changes in physical, cyber and human geographies. The cases presented show Australia contributing to a growing strategic and military geography.
This book is the only full-scale account of the strategic air offensive against Germany published in the last twenty years, and is the only one that treats the British and the Americans with parity. Much of what Levine writes about British operations will be unfamiliar to American readers. He has stressed the importance of winning air superiority and the role of escort fighters in strategic bombing, and has given more attention to the German side than most writers on air warfare have. Levine gets past a simple account of what we did to them and describes the target systems and German countermeasures in detail, providing exact yet dramatic accounts of the great bomber operations--the Ruhr dams, Ploesti, and Regensburg and Schweinfurt. The book is broad-guaged, touching many matters, from the development of bombing doctrine before the war to the technical development of the Luftwaffe and the RAF, jets and V-weapons, to the role of the heavy bombers in supporting land and sea operations. Levine stresses the impact of bombing on the war, and generally endorses the strategic air campaign as worthwhile and effective. But he concludes that many mistakes were made by the Allies--both the British and the Americans--in tactics, the development of equipment, and in the selection of targets. Levine sees strategic bombing as a powerful tool that was often misused, particularly when the doctrine of area bombing flourished. Scholars, students, and buffs interested in World War II and/or the history of aviation will find this study of great interest.
"The King's Finest" exposes the social roots of the generalcy and defines the major factors, both social and military, in a successful career. Hughes places the generalcy in its social context and demonstrates how the entire military structure was designed to preserve an exclusive social homogeneity. He shows exactly how the Prussian army selected, trained, and promoted these preferred types of men to its highest positions. Hughes' evidence suggests that the most fundamental group characteristic of these men was their strong, constant ties to the state apparatus rather than enduring connections with landed interests, industrial circles, or business pressure groups.
This book analyzes changing national preferences towards the EU CFSP and ESDP by providing detailed accounts of British, French and German crisis decision-making in FYROM, Afghanistan, Lebanon and DR Congo. While transatlantic relations remain important, crisis management under the EU label is increasingly accepted in national capitals.
This text is the second of three volumes written by Colonel Glantz on the contribution of intelligence and deception operations to the Soviet victory over Nazi Germany. It examines the area where intelligence and operations overlap; the nature of co-ordination between the two; and the support provided by intelligence to operational planning and execution (or the absence of such support). This is not a study of intelligence work as such, but of how intelligence can improve the chances of success on the battlefield by facilitating the more effective and economical use of troops. |
You may like...
The Lawyer's Guide to Legal Process…
Catherine Alman MacDonagh, JD, Kim R Craig, …
Paperback
R4,589
Discovery Miles 45 890
Muslim Youth - Challenges, Opportunities…
Mohammad Siddique Seddon, Fauzia Ahmad
Hardcover
R4,634
Discovery Miles 46 340
|