Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Alliances have shaped grand strategy and warfare since the dawn of civilization. Indeed, it is doubtful that the United States of America would have gained its independence without its Revolutionary War alliance with France. Such alliances may prove even more important to international security in the twenty-first century. Economic and financial difficulties alone will ensure that policy makers attempt to spread the burden of securing vital interests onto other nations through alliances, both formal organizations such as NATO and informal alliances of convenience as developed to wage the Gulf War in 1991. A team of leading historians examine the problems inherent in alliance politics and relationships in the framework of grand strategy through the lens of history. Aimed at not just the military aspects of alliances, the book uncovers the myriad factors that have made such coalitions succeed or fail in the past.
THE EXTRAORDINARY SUNDAY TIMES BESTSELLER. Take control of your life, build resilience and learn to thrive in any situation with the powerful and inspiring new book from the number one bestselling author of Battle Scars. In Life Under Fire, ex-Special Forces Sergeant Jason Fox shows you how to build the strength of mind and the resilience of an elite soldier. Recounting stories from high-stakes operations and expeditions, Foxy draws on the practices of the British military and the skills he developed during his career to show how to respond positively to life's challenges. Using battle-tested techniques, he explains how to find true grit in life's difficult moments, and how to ensure you have the inner strength to thrive in any environment. Whether you're under emotional pressure or facing physical challenges, this book will equip you with the tools you need to overcome obstacles and excel in adversity.
Adored by many, loathed by some, General George S. Patton, Jr., was one of the most brilliant military strategists in history. War As I Knew It is the personal and candid account of his celebrated, relentless crusade across western Europe during World War II. First published in 1947, this absorbing narrative draws on Patton's vivid memories of battle and his detailed diaries, from the moment the Third Army exploded onto the Brittany Peninsula to the final Allied casualty report. The result is not only a grueling, human account of daily combat and heroic feats - including a riveting look at the Battle of the Bulge - but a valuable chronicle of the strategies and fiery personality of a legendary warrior. Patton's letters from earlier military campaigns in North Africa and Sicily, complemented by a powerful retrospective of his guiding philosophies, further reveal a man of uncompromising will and uncommon character, which made "Georgie" a household name in mid-century America. With a new introduction.
This classic text provides a rich and nuanced discussion of American national security policymaking. American National Security remains the ideal foundational text for courses in national security, foreign policy, and security studies. Every chapter in this edition has been extensively revised, and the book includes discussion of recent security policy changes in the Trump administration. Highlights include: * An updated look at national security threats, military operations, and homeland security challenges * An analysis of the evolving roles of the president, Congress, the intelligence community, the military, and other institutions involved in national security * A revised consideration of the strengths, limitations, and employment of instruments of national power, including diplomacy, information, economic tools, and armed forces * An exploration of the economic and national security implications of globalization * An enhanced examination of the proliferation of transnational threats, including security challenges in space and in cyberspace * A new assessment of how international, political, and economic trends may change US leadership of the post-World War II international order * A comprehensive update on changing dynamics in key states and regions, including Russia, China, East Asia, the Middle East, South Asia, Europe, Sub-Saharan Africa, and Latin America An authoritative book that explains US national security policy, actors, and processes in a wide-ranging yet understandable way, American National Security addresses key issues, including challenges to the free and open international order, the reemergence of strategic competition among great powers, terrorism, economic and fiscal constraints, and rapid advances in information and technology.
The breaking of the Enigma machine is one of the most heroic stories of the Second World War. But there was another German cipher machine, used by Hitler himself to convey messages to his top generals in the field. A machine more complex and secure than Enigma. A machine that could never be broken. For sixty years, no one knew about about Lorenz or 'Tunny', or the determined group of men who finally broke the code and thus changed the course of the war. Many of them went to their deaths without anyone knowing of their achievements. Here, for the first time, codebreaker. Captain Jerry Roberts tells the complete story of this extraordinary feat of intellect and of his struggle to get his wartime colleagues the recognition they deserve. The work they carried out at Bletchley Park was groundbreaking and is recognised as having kick-started the modern computer age.
"If you want peace, prepare for war." "A buildup of offensive weapons can be purely defensive." "The worst road may be the best route to battle." Strategy is made of such seemingly self-contradictory propositions, Edward Luttwak shows-they exemplify the paradoxical logic that pervades the entire realm of conflict. In this widely acclaimed work, now revised and expanded, Luttwak unveils the peculiar logic of strategy level by level, from grand strategy down to combat tactics. Having participated in its planning, Luttwak examines the role of air power in the 1991 Gulf War, then detects the emergence of "post-heroic" war in Kosovo in 1999-an American war in which not a single American soldier was killed. In the tradition of Carl von Clausewitz, Strategy goes beyond paradox to expose the dynamics of reversal at work in the crucible of conflict. As victory is turned into defeat by over-extension, as war brings peace by exhaustion, ordinary linear logic is overthrown. Citing examples from ancient Rome to our own days, from Barbarossa and Pearl Harbor down to minor combat affrays, from the strategy of peace to the latest operational methods of war, this book by one of the world's foremost authorities reveals the ultimate logic of military failure and success, of war and peace.
This book examines a series of questions associated with the increasing application and implications of biometrics in contemporary everyday life. In the wake of the events of 9/11, the reliance on increasingly sophisticated and invasive technologies across a burgeoning field of applications has accelerated, giving rise to the term 'biometric state'. This book explores how these 'virtual borders' are created and the effect they have upon the politics of citizenship and immigration, especially how they contribute to the treatment of citizens as suspects. Finally and most importantly, this text argues that the rationale of 'governing through risk' facilitates pre-emptory logics, a negligent attitude towards 'false positives', and an overall proliferation of borders and ubiquitous risk, which becomes integral to contemporary everyday life, far beyond the confined politics of national borders and frontiers. By focusing on specific sites, such as virtual borders in airports, trusted traveller programs like the NEXUS program and those delivered by airlines and supported by governmental authorities (TSA and CATSA respectively), this book raises critical questions about the emerging biometric state and its commitment and constitution vis-a-vis technology of 'governing through risk'. This book will be of interest to students of biopolitics, critical security, surveillance studies and International Relations in general. Benjamin J. Muller is assistant professor in International Relations at Simon Fraser University, Burnaby, Canada. He completed his PhD in the School of Politics and International Studies at Queen's University Belfast, Northern Ireland, in 2005."
A strategically important natural harbor in the Orkney Islands,
Scapa Flow served as Britain's main fleet anchorage during World
Wars I and II. It held Jellicoe's Grand Fleet from 1914-18, and it
was from here that it sailed out to do battle with the Germans at
Jutland in 1916. In 1914 the British began building a comprehensive
defensive network by fortifying the entrances to Scapa Flow and
then extending these defenses to cover most of Orkney. These static
defenses were augmented with boom nets, naval patrols and
minefields, creating the largest fortified naval base in the world.
CHRISTOPHER PIKE's first book in his trilogy Making Sense of War examined war as a social phenomenon. About War (2021) explained why war, organised violence, happens. War in Context shows - through examples from history - how the state legitimises war and how war legitimises the state, and how Britain has used military force in the past. Pike asks: is war necessary? Can it be predicted? Is terrorism war? Is terrorism effective and how should it be countered? What were the implications of al Qaeda's attacks on the Twin Towers and the Pentagon in September 2001? What then might be the effect on world stability of America's less assertive leadership? War in Context looks at deterrence, the basis for nuclear strategy; and the strategic implications of such modern phenomena as cyborgs, Artificial Intelligence and Drones. But the human factor is emphasised - the moral and physical pressure on commanders of robots and hypersonic missiles. Above all, it is humans who decide how and when death is delivered. Science increases the intensity of battle, but man, not the machine, controls the outcome. The book ends with an assessment of Putin's invasion of Ukraine.
Based on many years of applied research, modeling and educating future decision makers, the authors have selected the critical set of mathematical modeling skills for decision analysis to include in this book. The book focuses on the model formulation and modeling building skills, as well as the technology to support decision analysis. The authors cover many of the main techniques that have been incorporated into their three-course sequence in mathematical modeling for decision making in the Department of Defense Analysis at the Naval Postgraduate School. The primary objective of this book is illustrative in nature. It begins with an introduction to mathematical modeling and a process for formally thinking about difficult problems, illustrating many scenarios and illustrative examples. The book incorporates the necessary mathematical foundations for solving these problems with military applications and related military processes to reinforce the applied nature of the mathematical modeling process.
During the last decade, 'Hybrid Warfare' has become a novel yet controversial term in academic, political and professional military lexicons, intended to suggest some sort of mix between different military and non-military means and methods of confrontation. Enthusiastic discussion of the notion has been undermined by conceptual vagueness and political manipulation, particularly since the onset of the Ukrainian Crisis in early 2014, as ideas about Hybrid Warfare engulf Russia and the West, especially in the media. Western defence and political specialists analysing Russian responses to the crisis have been quick to confirm that Hybrid Warfare is the Kremlin's main strategy in the twenty-first century. But many respected Russian strategists and political observers contend that it is the West that has been waging Hybrid War, Gibridnaya Voyna, since the end of the Cold War. In this highly topical book, Ofer Fridman offers a clear delineation of the conceptual debates about Hybrid Warfare. What leads Russian experts to say that the West is conducting a Gibridnaya Voyna against Russia, and what do they mean by it? Why do Western observers claim that the Kremlin engages in Hybrid Warfare? And, beyond terminology, is this something genuinely new?
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
When NATO took charge of the International Security Assistance
Force (ISAF) for Afghanistan in 2003, ISAF conceptualized its
mission largely as a stabilization and reconstruction deployment.
However, as the campaign has evolved and the insurgency has proved
to more resistant and capable, key operational imperatives have
emerged, including military support to the civilian development
effort, closer partnering with Afghan security forces, and greater
military restraint. All participating militaries have adapted, to
varying extents, to these campaign imperatives and pressures.
'Cyber security' is a recent addition to the global security agenda, concerned with protecting states and citizens from the misuse of computer networks for war, terrorism, economic espionage and criminal gain. Many argue that the ubiquity of computer networks calls for robust and pervasive countermeasures, not least governments concerned about their potential effects on national and economic security. Drawing on critical literature in international relations, security studies, political theory and social theory, this is the first book that describes how these visions of future cyber security are sustained in the communities that articulate them. Specifically, it shows that conceptions of time and temporality are foundational to the politics of cyber security. It explores how cyber security communities understand the past, present and future, thereby shaping cyber security as a political practice. Integrating a wide range of conceptual and empirical resources, this innovative book provides insight for scholars, practitioners and policymakers.
This edited volume analyses siege warfare as a discrete type of military engagement, in the face of which civilians are particularly vulnerable. Siege warfare is a form of combat that has usually had devastating effects on civilian populations. From the near-contemporary Siege of Sarajevo to the real and mythical sieges of the ancient Mediterranean, this has been a recurring type of military engagement which, through bombardment, starvation, disease and massacre, places non-combatants at the heart of battle. To date, however, there has been little recognition of the effects of siege warfare on civilians. This edited volume addresses this gap. Using a distinctive regressive method, it begins with the present and works backwards, avoiding teleological interpretations that suggest the targeting of civilians in war is a modern phenomenon. Its contributors interrogate civilians' roles during sieges, both as victims and active participants; the laws and customs of siege warfare; its place in historical memory, and the ways civilian survivors have dealt with trauma. Its scope and content ensure that the collection is essential reading for all those interested in the place of civilians in war. Chapter 2 of this book is available open access under a CC BY 4.0 license at link.springer.com
When NATO took charge of the International Security Assistance
Force (ISAF) for Afghanistan in 2003, ISAF conceptualized its
mission largely as a stabilization and reconstruction deployment.
However, as the campaign has evolved and the insurgency has proved
to more resistant and capable, key operational imperatives have
emerged, including military support to the civilian development
effort, closer partnering with Afghan security forces, and greater
military restraint. All participating militaries have adapted, to
varying extents, to these campaign imperatives and pressures.
ACCLAIM FOR ENIGMA "CRACKING STUFF...VIVID AND HITHERTO UNKNOWN DETAILS." -Sunday Times (London) "IN A CROWD OF BOOKS DEALING WITH THE ALLIED BREAKING OF THE WORLD WAR II CIPHER MACHINE ENIGMA, HUGH SEBAG-MONTEFIORE HAS SCORED A SCOOP." -Washington Post Winston Churchill called the cracking of the German Enigma Code "the secret weapon that won the war." Now, for the first time, noted British journalist Hugh-Sebag-Montefiore reveals the c"omplete" story of the breaking of the code by the Allies--the breaking that played a crucial role in the outcome of World War II. This fascinating account relates the never-before-told, hair-raising stories of the heroic British and American sailors, spies, and secret agents who faced death in order to capture vital codebooks from sinking ships and snatch them from under the noses of Nazi officials. Sebag-Montefiore also relates new details about the genesis of the code, little-known facts about how the Poles first cracked the Luftwaffe's version of the code (and then passed it along to the British), and the feverish activities at Bletchley Park, Based in part on documents recently unearthed from American and British archives--including previously confidential government files--and in part on unforgettable, firsthand accounts of surviving witnesses, "Enigma" unearths the stunning truth about the brilliant piece of decryption that changed history.
Throughout history, the concept of command -- as both a way to achieve objectives and as an assertion of authority -- has been essential to military action and leadership. But, as Sir Lawrence Freedman shows, it is also deeply political. Military command has been reconstructed and revolutionized since the Second World War by nuclear warfare, small-scale guerrilla land operations and cyber interference. Freedman takes a global perspective, systematically investigating its practice and politics since 1945 through a wide range of conflicts from the French Colonial Wars, the Cuban Missile Crisis and the Bangladesh Liberation War to North Vietnam's Easter Offensive of 1972, the Falklands War, the Iraq War and Russia's wars in Chechnya and Ukraine. By highlighting the political nature of strategy, Freedman shows that military decision-making cannot be separated from civilian priorities and that commanders must now have the sensibility to navigate politics as well as warfare.
Winner of the Helen and Howard Marraro Prize A Times Literary Supplement Book of the Year A bold, revisionist account of the political thought of the Italian Renaissance-from Petrarch to Machiavelli-that reveals the all-important role of character in shaping society, both in citizens and in their leaders. Convulsed by a civilizational crisis, the great thinkers of the Renaissance set out to reconceive the nature of society. Everywhere they saw problems. Corrupt and reckless tyrants sowing discord and ruling through fear; elites who prized wealth and status over the common good; military leaders waging endless wars. Their solution was at once simple and radical. "Men, not walls, make a city," as Thucydides so memorably said. They would rebuild their city, and their civilization, by transforming the moral character of its citizens. Soulcraft, they believed, was a precondition of successful statecraft. A dazzlingly ambitious reappraisal of Renaissance political thought by one of our generation's foremost intellectual historians, Virtue Politics challenges the traditional narrative that looks to the Renaissance as the seedbed of modern republicanism and sees Machiavelli as its exemplary thinker. James Hankins reveals that what most concerned the humanists was not reforming laws or institutions so much as shaping citizens. If character mattered more than constitutions, it would have to be nurtured through a new program of education they called the studia humanitatis: the humanities. We owe liberal arts education and much else besides to the bold experiment of these passionate and principled thinkers. The questions they asked-Should a good man serve a corrupt regime? What virtues are necessary in a leader? What is the source of political legitimacy? Is wealth concentration detrimental to social cohesion? Should citizens be expected to fight for their country?-would have a profound impact on later debates about good government and seem as vital today as they did then.
David Glantz examines the Soviet study of war, the re-emergence of the operation level and its connection with deep battle, the evolution of the Soviet theory of operations in depth before 1941, and its refinement and application in the European theatre and the Far East between 1941 and 1945.
This book contains a collection of projects and scenarios dealing with new risks from emerging technologies, future peace keeping operations, and water distribution issues by combining analysis with dialogue. Special attention is paid to the methodology of narrative scenarios, and the role of imagination in the generation of these scenarios. Appearing as short stories, narrative scenarios include a great amount of explicit and implicit knowledge and they need story telling skills to become consistent, coherent as well as compelling and convincing pictures of the future.
This book includes a selection of articles from The 2018 Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS'18), held in Salinas, Peninsula de Santa Elena, Ecuador, from April 18 to 20, 2018. MICRADS is an international forum for researchers and practitioners to present and discuss the most recent innovations, trends, results, experiences and concerns in the various areas of defense and security, together with their technological development and applications. The main topics covered are: Information and Communication Technology in Education; Computer Vision in Military Applications; Engineering Analysis and Signal Processing; Cybersecurity and Cyberdefense; Maritime Security and Safety; Strategy, Geopolitics and Oceanopolitics; Defense planning; Leadership (e-leadership); Defense Economics; Defense Logistics; Health Informatics in Military Applications; Simulation in Military Applications; Computer Networks, Mobility and Pervasive Systems; Military Marketing; Military Physical Training; Assistive Devices and Wearable Technology; Naval and Military Engineering; Weapons and Combat Systems; Operational Oceanography. The book is aimed at all those dealing with defense and security issues, including practitioners, researchers and teachers as well as undergraduate, graduate, master's and doctorate students.
What makes a good missionary makes a good American spy, or so thought Office of Special Services (OSS) founder "Wild" Bill Donovan when he recruited religious activists into the first ranks of American espionage. Called upon to serve Uncle Sam, Donovan's recruits saw the war as a means of expanding their godly mission, believing an American victory would guarantee the safety of their fellow missionaries and their coreligionists abroad. Drawing on never-before-seen archival materials, acclaimed historian Matthew Sutton shows how religious activists proved to be true believers in Franklin Roosevelt's crusade for global freedom of religion. Sutton focuses on William Eddy, a warrior for Protestantism who was fluent in Arabic; Stewart Herman, a young Lutheran minister rounded up by the Nazis while pastoring in Berlin; Stephen B. L. Penrose, Jr., who left his directorship over missionary schools in the Middle East to join the military rank and file; and John Birch, a fundamentalist missionary in China. Donovan chose these men because they already had the requisite skills for good intelligence analysis, espionage, and covert operations, skills that allowed them to seamlessly blend into different environments. Working for eternal rewards rather than temporal spoils, they proved willing to sacrifice and even to die for their country during the conflict, becoming some of the United States' most loyal secret soldiers. Acutely aware of how their actions conflicted with their spiritual calling, these spies nevertheless ran covert operations in the centers of global religious power, including Mecca, the Vatican, and Palestine. In the end, they played an outsized role in leading the US to victory in WWII: Eddy laid the groundwork for the Allied invasion of North Africa, while Birch led guerilla attacks against the Japanese and, eventually, Chinese Communists. After the war, some of them -- those who survived -- helped launch the Central Intelligence Agency, so that their nation, and American Christianity, could maintain a strong presence throughout the rest of the world. Surprising and absorbing at every turn, Double Crossedis an untold story of World War II spycraft and a profound account of the compromises and doubts that war forces on those who wage it.
The U.S. military is no longer based on a Cold War self-sufficient
model. Today's armed forces are a third smaller than they were
during the Cold War, and yet are expected to do as much if not more
than they did during those years. As a result, a transformation is
occurring in the way the U.S. government expects the military to
conduct operations--with much of that transformation contingent on
the use of contractors to deliver support to the armed forces
during military campaigns and afterwards.
After a decade and a half of war in Iraq and Afghanistan, US policymakers are seeking to provide aid and advice to local governments' counterinsurgency campaigns rather than directly intervening with US forces. This strategy, and US counterinsurgency doctrine in general, fail to recognize that despite a shared aim of defeating an insurgency, the US and its local partner frequently have differing priorities with respect to the conduct of counterinsurgency operations. Without some degree of reform or policy change on the part of the insurgency-plagued government, American support will have a limited impact. Using three detailed case studies - the Hukbalahap Rebellion in the Philippines, Vietnam during the rule of Ngo Dinh Diem, and the Salvadorian Civil War - Ladwig demonstrates that providing significant amounts of aid will not generate sufficient leverage to affect a client's behaviour and policies. Instead, he argues that influence flows from pressure and tight conditions on aid rather than from boundless generosity. |
You may like...
Positive Security - Collective Life in…
Gunhild Hoogensen Gjorv, Ali Bilgic
Hardcover
R4,139
Discovery Miles 41 390
|