![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
Despite their immense war-fighting capacity, the five most powerful
states in the international system have failed to attain their
primary political objective in almost 40% of their military
operations against weak state and non-state targets since 1945. Why
are states with tremendous military might so often unable to attain
their objectives when they use force against weaker adversaries?
More broadly, under what conditions can states use military force
to attain their political objectives and what conditions limit the
utility of military force as a policy instrument? Can we predict
the outcome of a war before the fighting begins?
Examining major terrorist acts and campaigns undertaken in the decade following September 11, 2001, internationally recognized scholars study the involvement of global terrorist leaders and organizations in these incidents and the planning, organization, execution, recruitment, and training that went into them. Their work captures the changing character of al-Qaeda and its affiliates since the invasions of Afghanistan and Iraq and the sophisticated elements that, despite the West's best counterterrorism efforts, continue to exert substantial direction over jihadist terrorist operations. Through case studies of terrorist acts and offensives occurring both in and outside the West, the volume's contributors investigate al-Qaeda and other related entities as they adapted to the strategies of Operation Enduring Freedom and subsequent U.S.-led global counterterrorism programs. They explore whether Osama bin Laden was indeed reduced to a mere figurehead before his death or continued to influence al-Qaeda's global activities. Did al-Qaeda become a loose collection of individuals and ideas following its expulsion from Afghanistan, or was it reborn as a transnational terrorist structure powered by a well-articulated ideology? What is the preeminent terrorist threat we face today, and what will it look like in the future? This anthology pinpoints the critical patterns and strategies that will inform counterterrorism in the coming decades.
This edited collection explores the fruitfulness of applying an interpretive approach to the study of global security. The interpretive approach concentrates on unpacking the meanings and beliefs of various policy actors, and, crucially, explains those beliefs by locating them in historical traditions and as responses to dilemmas. Interpretivists thereby seek to highlight the contingency, diversity, and contestability of the narratives, expertise, and beliefs that inform political action. The interpretive approach is widespread in the study of governance and public policy, but arguably it has not yet had much impact on security studies. The book therefore deploys the interpretive approach to explore contemporary issues in international security, combining theoretical engagement with good empirical coverage through a novel set of case studies. Bringing together a fresh mix of world renowned and up-and-coming scholars from across the fields of security studies, political theory and international relations, the chapters explore the beliefs, traditions, and dilemmas that have informed security practice on the one hand, and the academic study of security on the other, as well as the connections between them. All contributors look to situate their work against a broader historical background and long-standing traditions, allowing them to take a critical yet historically informed approach to the material.
The scope and applicability of risk management have expanded greatly over the past decade. Banks, corporations, and public agencies employ its new technologies both in their daily operations and long-term investments. It would be unimaginable today for a global bank to operate without such systems in place. Similarly, many areas of public management, from NASA to the Centers for Disease Control, have recast their programs using risk management strategies. It is particularly striking, therefore, that such thinking has failed to penetrate the field of national security policy. Venturing into uncharted waters, Managing Strategic Surprise brings together risk management experts and practitioners from different fields with internationally-recognized national security scholars to produce the first systematic inquiry into risk and its applications in national security. The contributors examine whether advance risk assessment and management techniques can be successfully applied to address contemporary national security challenges.
The U.S. military is no longer based on a Cold War self-sufficient
model. Today's armed forces are a third smaller than they were
during the Cold War, and yet are expected to do as much if not more
than they did during those years. As a result, a transformation is
occurring in the way the U.S. government expects the military to
conduct operationsOCowith much of that transformation contingent on
the use of contractors to deliver support to the armed forces
during military campaigns and afterwards.
Sun Tzu's The Art of War has been a vastly influential treatise on military strategy in the east from the time of China's Warring States Period (403-221 BC) onward. Though its first translation into a European language was only in 1782, the book's significance was quickly recognized and even such towering figures of Western history as Napoleon and General Douglas MacArthur have claimed it a source of inspiration. Pax Librorum (www.PaxLibrorum.com) now brings readers this highly accessible unannotated edition of Lionel Giles' definitive translation of Sun Tzu's enduring masterpiece.
The veterans of the Fourteenth Army who fought in Burma between 1942 and 1945 called themselves 'the forgotten army'. But that appellation could equally well be applied to the whole of the British army after 1945. Histories of Britain's post-war defence policy have usually focused on how and why Britain acquired a nuclear deterrent. David French takes a new look at these policies by placing the army centre-stage. Drawing on archival sources that have hardly been used by historians, he shows how British governments tried to create an army that would enable them to maintain their position as a major world power at a time when their economy struggled to foot the bill. The result was a growing mismatch between the military resources that the government thought it could afford on the one hand, and a long list of overseas commitments, in Europe, Africa, the Middle East, and the Far East, that it was reluctant to surrender. The result was that the British created a Potemkin army, a force that had an outwardly impressive facade, but that in reality had only very limited war-fighting capabilities. Army, Empire, and Cold War will interest not only historians of the British army, but also those who are trying to understand Britain's role in the Cold War, and how and why the British came to surrender formal rule over their empire.
The U.S. military is no longer based on a Cold War self-sufficient
model. Today's armed forces are a third smaller than they were
during the Cold War, and yet are expected to do as much if not more
than they did during those years. As a result, a transformation is
occurring in the way the U.S. government expects the military to
conduct operations--with much of that transformation contingent on
the use of contractors to deliver support to the armed forces
during military campaigns and afterwards.
Rarely has security been such a preoccupation of Australian politics, and rarely has it seemed so far from being achieved. This celebrated book argues that security has dominated and distorted Australia's foreign policy and national life, from Cook's first voyage to the Tampa crisis, 9/11 and Iraq. Whether in the Great War, Vietnam or the treatment of asylum seekers, Anthony Burke shows that Australia's security has been bought with the insecurity and suffering of others. Against this corrosive tradition, he offers a new - cosmopolitan and non-coercive - model of national existence and responsibility. At once a deep historical survey and an argument with its society, Fear of Security is a landmark account of how Australia relates to itself, its region and the world. Turning powerful academic and political orthodoxies on their heads, it is essential reading for those concerned with the burning questions that face Australia and the Asia-Pacific.
This history of the Strategic Defense Initiative ranges across politics, economics, strategic studies and international relations. It provides the results of research into the SDI interest groups, the distribution of contracts and the politics of influence. It discusses the wider contexts of 'Star Wars', such as alliance management, marketing and domestic politics, and its military spin-offs, especially for antisatellite (ASAT) and 'space control' programmes. The author tests the theoretical literature on the dynamics of the arms race by using SDI as a case study, and draws evidence from sources such as congressional hearings, interviews, the trade Press, restricted briefing papers, and documents obtained under the US Freedom of Information Act. The book follows the fortunes of strategic defence into the changed global conditions of the 1990s, following the collapse of the Soviet bloc, the Gulf War and President Bush's announcement of a refocussed SDI, the Global Protection Against Limited Strikes (GPALS).
This book arises from the NATO Advanced Study Institute "Technological Innovations in Detection and Sensing of CBRN Agents and Ecological Terrorism" held in Chisinau, Republic of Moldova in June 2010. It comprises a variety of invited contributions by highly experienced educators, scientists, and industrialists, and is structured to cover important aspects of the field that include developments in chemical-biological, and radiation sensing, synthesis and processing of sensors, and applications of sensors in detecting/monitoring contaminants introduced/dispersed inadvertently or intentionally in air, water, and food supplies. The book emphasizes nanomaterials and nanotechnology based sensing and also includes a section on sensing and detection technologies that can be applied to information security. Finally, it examines regional, national, and international policies and ethics related to nanomaterials and sensing. It will be of considerable interest and value to those already pursuing or considering careers in the field of nanostructured materials and nanotechnology based sensing, In general, it serves as a valuable source of information for those interested in how nanomaterials and nanotechnologies are advancing the field of sensing, detection, and remediation, policy makers, and commanders in the field.
This book offers an overview of space strategy in the 21st century. The purpose of space strategy is to coordinate, integrate, and prioritize space activities across security, commercial, and civil sectors. Without strategy, space activities continue to provide value, but it becomes difficult to identify and execute long-term programs and projects and to optimize the use of space for security, economic, civil, and environmental ends. Strategy is essential for all these ends since dependence on, and use of, space is accelerating globally and space is integrated in the fabric of activities across all sectors and uses. This volume identifies a number of areas of concern pertinent to the development of national space strategy, including: intellectual foundations; political challenges; international cooperation and space governance; space assurance and political, organizational, and management aspects specific to security space strategy. The contributing authors expand their focus beyond that of the United States, and explore and analyse the international developments and implications of national space strategies of Russia, China, Europe, Japan, India, Israel, and Brazil. This book will be of much interest to students of space power and politics, strategic studies, foreign policy and International Relations in general.
The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.
From the time the Romans first set foot on England's shore in 55 BC, the British Isles have faced a constant threat of foreign invasion. As a result, the landscapes of England, Scotland, and Ireland are dotted with ancient defensive fortifications as varied as their makers. Iron Age Celtic "hillforts," Roman castra and Hadrian's Wall, Anglo-Saxon dykes and Alfredian burhs, Norman mottes and stone-keeps, Edwardian castles, Irish tower houses--they all served to repel ancient intruders and many still stand as tangible relics of a remarkable past. This study chronicles the development of British fortifications from prehistoric times through the end of Richard III's reign in 1485, providing the history of each type of structure, relevant examples, and information on weapons and siege warfare. More than 250 illustrations vividly detail each ediface's construction and configuration.
Economic turmoil has spread throughout the western world, but terrorists and other threats to national security have not been put out of business by the Great Recession. "Economic Instruments of Security Policy" explores the critical question: does the United States and its allies still maintain effective economic tools to influence the behavior of those who seek to cause us harm? Governments have at their disposal many economic instruments to promote national security, such as sanctions, foreign aid, international trade, international finance, and laws blocking funds for international terrorism. This book examines the use of theses economic policies and addresses how best to measure their effectiveness.
The Security Governance of Regional Organizations assesses the effectiveness of regional organizations as regional or global security providers, and examines how policy preferences, resources, capabilities, institutional mechanisms and economic and political cohesion link with collective action behaviour in four security policy functions. It investigates how regional organizations meet the new security threats or respond to strategic geopolitical changes and what adaptations they make in the process. Divided into three parts and using a common analytical framework, the book explains the changing security agenda in ten key regional organizations, each organizational chapter:
This collection contributes to the ongoing reconceptualization of security and definition of security governance, and explores whether regional security governance processes are unique or similar and whether some organizational experiences can be seen as models for others to follow. It combines a coherent theoretical framework with strong comparative case studies, making it ideal reading for all students of security studies.
vi of a large number of people due to the enormous quantities of radioactive material that would be required to reach high levels of contamination in mass-produced or distributed supplies. Although, based on data presented at the Workshop concerning the more than 30,000 missing radioactive sources all over the word, the radioactive contamination of food or water is also a scenario that must be taken seriously into consideration. During the last two decades there have been several emerging hazards linked to animal diseases or originating in animal products for example: Avian Influenza (AI), Bovine Spongiform Encephalopathy (BSE), West Nile Fever, Severe Acute Respiratory Syndrome (SARS), and Ebola virus. All these diseases or events directly or indirectly affect food security and/or food safety. Approximately 75% of all emerging diseases are zoonotic by either an association with animal populations or an evolution of the disease in a- mals making it possible to move from animal species to humans. Participants were presented the primary results of the ongoing NATO- SPS Pilot Study on "Food Chain Security". These results focused mainly on (i) an overview of the food system; (ii) prevention, surveillance and detection systems and (iii) response system. The importance of issues such as: vuln- ability assessments, risk communication in risk analysis, risk perception, traceability, preparedness - awareness, communication, have to be cons- ered when working on food chain security.
This is an accessible new examination of what security means today, contextualizing the term amongst other key ideas, such as the nation state, diplomacy, war and autonomy. By exploring the many differing conceptions of security, this study clearly explains how the idea of security in world affairs can be understood in relation to other ideas and points of view. It shows how, when standing alone, the word security is meaningless, or just an empty term, when divorced from other ideas distinctive to international life. This essential new volume tackles the key questions in the debate:
This book is an excellent resource for students and scholars of security studies and politics and international relations.
This book rethinks security theory from a feminist perspective - uniquely, it engages feminism, security, and strategic studies to provide a distinct feminist approach to security studies. The volume explicitly works toward an opening up of security studies that would allow for feminist (and other) narratives to be recognized and taken seriously as security narratives. To make this possible, it presents a feminist reading of security studies that aims to invigorate the debate and radicalize critical security studies. Since feminism is a political project, and security studies are, at their base, about particular visions of the political and their attendant institutions, this is of necessity a political intervention. The book works through and beyond security studies to explore possible spaces where an opening of security, necessary to make way for feminist insights, can take place. While it develops and illustrates a feminist narrative approach to security, it is also intended as an intervention that challenges the politics of security and the meanings for security legitimized in existing practices. This book provides develops a comprehensive framework for the emerging field of feminist security studies and will be of great interest to students and scholars of feminist IR, critical security studies, gender studies and IR and security studies in general.
When Nelson Mandela was sworn in as president on 10 May 1994, South Africa enjoyed an unprecedented global standing. Much of the international community, particularly Western states, saw the new South Africa as well equipped to play a dynamic and dominant role on the continent; promoting conflict resolution, economic development, and acting as a standard-bearer for democracy and human rights. Yet, throughout the presidencies of Nelson Mandela, Thabo Mbeki and Jacob Zuma, South Africa has failed to deliver on this early promise. Its continental primacy has been circumscribed by its own reluctance to lead, combined with widespread African hostility to its economic expansion, antipathy towards its democratic ideals and scepticism about its suitability as Africa’s global representative. With an onerous domestic agenda, as it continues to tackle the profound socio-economic legacies of apartheid, and with its military power also on the wane, South Africa must now adapt to an emerging multipolarity on the continent. This transition – which may produce a new concert of African powers working in constructive collaboration or lead to fragmentation, discord and gridlock – is likely to determine Africa’s prospects for decades to come. This Adelphi book squarely challenges the received wisdom that South Africa is a dominant power in Africa. It explores the country’s complex and difficult relationship with the rest of the continent in the post-apartheid era and examines the ways in which the country has struggled to translate its economic, military and diplomatic weight into tangible foreign policy successes and enduring influence on the ground. The conclusions of this book will be valuable to academics, policymakers, journalists, and business leaders seeking to understand the evolution and trajectory of South African policy in Africa.
No foreign policy decision in recent history has had greater
repercussions than President George W. Bush's decision to invade
and occupy Iraq. It launched a new doctrine of preemptive war,
mired the American military in an intractable armed conflict,
disrupted world petroleum supplies, cost the United States hundreds
of billions of dollars, and damaged or ended the lives of hundreds
of thousands of Americans and Iraqis. Its impact on international
politics and America's standing in the world remains incalculable.
The essays in this volume analyze war, its strategic characterisitics and its political and social functions, over the past five centuries. The diversity of its themes and the broad perspectives applied to them make the book a work of general history as much as a history of the theory and practice of war from the Renaissance to the present. "Makers of Modern Strategy from Machiavelli to the Nuclear Age" takes the first part of its title from an earlier collection of essays, published by Princeton University Press in 1943, which became a classic of historical scholarship. Three essays are repinted from the earlier book; four others have been extensively revised. The rest--twenty-two essays--are new. The subjects addressed range from major theorists and political and military leaders to impersonal forces. Machiavelli, Clausewitz, and Marx and Engels are discussed, as are Napoleon, Churchill, and Mao. Other essays trace the interaction of theory and experience over generations--the evolution of American strategy, for instance, or the emergence of revolutionary war in the modern world. Still others analyze the strategy of particular conflicts--the First and Second World Wars--or the relationship between technology, policy, and war in the nuclear age. Whatever its theme, each essay places the specifics of military thought and action in their political, social, and economic environment. Together the contributors have produced a book that reinterprets and illuminates war, one of the most powerful forces in history and one that cannot be controlled in the future without an understanding of its past.
This new Handbook provides readers with the tools to understand the evolution of transatlantic security from the Cold War era to the early 21st century. After World War II, the US retained a strong presence as the dominant member of NATO throughout the Cold War. Former enemies, such as Germany, became close allies, while even countries that often criticized the United States made no serious attempt to break with Washington. This pattern of security co-operation continued after the end of the Cold War, with NATO expansion eastwards extending US influence. Despite the Iraq war prompting a seemingly irreparable transatlantic confrontation, the last years of the Bush administration witnessed a warming of US-European relations, expected to continue with the Obama administration. The contributors address the following key questions arising from the history of transatlantic security relations: What lies behind the growing and continuing European dependency on security policy on the United States and what are the political consequences of this? Is this dependency likely to continue or will an independent European Common Foreign and Security Policy eventually emerge? What has been the impact of 'out-of-area' issues on transatlantic security cooperation? The essays in this Handbook cover a broad range of historical and contemporary themes, including the founding of NATO; the impact of the Korean War; the role of nuclear (non-)proliferation; perspectives of individual countries (especially France and Germany); the impact of culture, identity and representation in shaping post-Cold War transatlantic relations; institutional issues, particularly EU-NATO relations; the Middle East; and the legacy of the Cold War, notably tensions with Russia. This Handbook will be of much interest to students of transatlantic security, NATO, Cold War Studies, foreign policy and IR in general.
This textbook provides a comprehensive introduction to modern strategy, covering the context, theory, and practice of military strategy in all its different forms. Covering all the main issues in the field, the book explores the major themes through a combination of classical and modern strategic theory, history, and current practice. It is split into three main sections: The first provides the context for contemporary strategy and includes discussions of the human, technological, intelligence, ethical, and grand strategic dimensions. The second part explores the theory and practice of strategy in different geographical domains, including land, sea, air, space, and cyberspace. The final part engages with three of the most challenging forms of strategy in the contemporary era: nuclear weapons, terrorism, and insurgency. This second edition brings the book up to date by including discussions of the rise and fall of the Islamic State of Iraq and Syria (ISIS); the emergence of robotics and artificial intelligence; major events in space and cyberspace; and the growing profile of nuclear weapons. Each chapter presents the reader with a succinct summary of the topic, provides a challenging analysis of current issues, and finishes with key points, questions for discussion, and further reading. This book will be essential reading for upper-level students of strategic studies, war studies, military history, and international security.
As tensions between China and Japan increase, including over the disputed islands in the East China Sea, Japan has adopted under Prime Minister Abe a new security posture. This involves, internally, adapting Japan's constitutional position on defence and, externally, building stronger international relationships in the Asia-Pacific region and more widely. This book presents a comprehensive analysis of these developments. It shows how trust and co-operation with the United States, the only partner with which Japan has a formal alliance, is being rebuilt, discusses how other relationships, both on security and on wider issues, are being formed, in the region and with European countries and the EU, with the relationships with India and Australia being of particular importance, and concludes by assessing the likely impact on the region of Japan's changing posture and new relationships. |
You may like...
The Book of Military Strategy - Sun…
Sun Tzu, Niccolo Machiavelli, …
Hardcover
R1,317
Discovery Miles 13 170
Rethinking American Grand Strategy
Elizabeth Borgwardt, Christopher McKnight Nichols, …
Hardcover
R2,460
Discovery Miles 24 600
|