![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
When NATO took charge of the International Security Assistance
Force (ISAF) for Afghanistan in 2003, ISAF conceptualized its
mission largely as a stabilization and reconstruction deployment.
However, as the campaign has evolved and the insurgency has proved
to more resistant and capable, key operational imperatives have
emerged, including military support to the civilian development
effort, closer partnering with Afghan security forces, and greater
military restraint. All participating militaries have adapted, to
varying extents, to these campaign imperatives and pressures.
President Bill Clinton, speaking as might any commander-in-chief, on the eve of his decision to deploy ground troops to Bosnia in 1995, declared he had ""no responsibility more grave than putting soldiers in harm's way [and, it should be noted, in today's operational environment this means civilians as well]."" Such a statement suggests that a study of the decision-making process associated with the weighty matters of using force would be enlightening. Indeed, it is. The decision-making process is far from standardised nor is it simple. While all individuals associated with important decisions about national security and the lives of America's service members take their responsibilities seriously, the processes by which they reach their conclusions are varied and complicated. This book traces traditional and emerging theories of decision-making by first explaining the components of each model and then analysing its practical application through three case studies. Each chapter concludes with a discussion of the utility and explanatory power of the particular theory. Because even at their very best a particular decision-making theory can only explain some cases, the chapter then segues to another theory with different characteristics.
What qualities made the Duke of Wellington a strategic genius? How did Oliver Cromwell, a gentleman farmer create an army that overthrew a king and changed the course of British history? Why was Simon Bolivar able to overcome early reverses to become the greatest figure in the Latin American struggle against Spanish colonialism? The answers to these and a myriad other fascinating questions can be found in Great Commanders of the Early Modern World, a sumptuous chronological survey of the 25 greatest commanders of the early modern world. Compiled by an distinguished team of historians (including such names as Antonia Fraser, Saul David and Stephen Brumwell) working under the general editorship of Andrew Roberts, Great Commanders of the Early Modern World is an authoritative and beautifully illustrated account of the lives and careers of the 25 greatest military commanders of the period, from the Duke of Marlborough to Napoleon Bonaparte, from Robert Clive to Carl von Clausewitz, and from Frederick the Great to Shaka Zulu. Every commander is profiled in a concise and informative 3000-word article which not only brings its subject vividly to life via a lively, fact-driven narrative, but also analyses and assesses his tactical and strategic gifts. As accessible and informative as it is rigorous and scholarly, Great Commanders of the Early Modern World is the perfect introduction to its subject for the layperson - but also a stimulating and thought-provoking read for those with greater knowledge of military history. With its companion volumes, focusing on the great commanders of the ancient, medieval and modern eras, it forms an indispensable guide to the greatest generals the world has seen.
This book integrates strategy, technology and economics and presents a new way of looking at twentieth-century military history and Britain's decline as a great power. G. C. Peden explores how from the Edwardian era to the 1960s warfare was transformed by a series of innovations, including dreadnoughts, submarines, aircraft, tanks, radar, nuclear weapons and guided missiles. He shows that the cost of these new weapons tended to rise more quickly than national income and argues that strategy had to be adapted to take account of both the increased potency of new weapons and the economy's diminishing ability to sustain armed forces of a given size. Prior to the development of nuclear weapons, British strategy was based on an ability to wear down an enemy through blockade, attrition (in the First World War) and strategic bombing (in the Second), and therefore power rested as much on economic strength as on armaments.
In the twenty-first century, political conflict and militarization have come to constitute a global social condition rather than a political exception. Military occupation increasingly informs the politics of both democracies and dictatorships, capitalist and formerly socialist regimes, raising questions about its relationship to sovereignty and the nation-state form. Israel and India are two of the world's most powerful postwar democracies yet have long-standing military occupations. Pakistan, Bangladesh, and Turkey have passed through periods of military dictatorship, but democracy has yielded little for their ethnic minorities who have been incorporated into the electoral process. Sri Lanka and Bangladesh (like India, Pakistan, and Turkey) have felt the imprint of socialism; declarations of peace after long periods of conflict in these countries have not improved the conditions of their minority or indigenous peoples but rather have resulted in "violent peace" and remilitarization. Indeed, the existence of standing troops and ongoing state violence against peoples struggling for self-determination in these regions suggests the expanding and everyday nature of military occupation. Such everydayness raises larger issues about the dominant place of the military in society and the social values surrounding militarism."Everyday Occupations" examines militarization from the standpoints of both occupier and occupied. With attention to gender, poetics, satire, and popular culture, contributors who have lived and worked in occupied areas in the Middle East and South Asia explore what kinds of society are foreclosed or made possible by militarism. The outcome is a powerful contribution to the ethnography of political violence.Contributors: Nosheen Ali, Kabita Chakma, Richard Falk, Sandya Hewamanne, Mohamad Junaid, Rhoda Kanaaneh, Hisyar Ozsoy, Cheran Rudhramoorthy, Serap Ruken Sengul, Kamala Visweswaran.
In the course of his forty-year-career as one of America's most
admired journalists, Robert Scheer's work has been praised by Gore
Vidal, Susan Sontag, and Joan Didion, who deems him "one of the
best reporters of our time." Now, Scheer brings a lifetime of
wisdom and experience to one of the most overlooked and dangerous
issues of our time - the destructive influence of America's
military-industrial complex.
Despite their immense war-fighting capacity, the five most powerful
states in the international system have failed to attain their
primary political objective in almost 40% of their military
operations against weak state and non-state targets since 1945. Why
are states with tremendous military might so often unable to attain
their objectives when they use force against weaker adversaries?
More broadly, under what conditions can states use military force
to attain their political objectives and what conditions limit the
utility of military force as a policy instrument? Can we predict
the outcome of a war before the fighting begins?
This edited collection explores the fruitfulness of applying an interpretive approach to the study of global security. The interpretive approach concentrates on unpacking the meanings and beliefs of various policy actors, and, crucially, explains those beliefs by locating them in historical traditions and as responses to dilemmas. Interpretivists thereby seek to highlight the contingency, diversity, and contestability of the narratives, expertise, and beliefs that inform political action. The interpretive approach is widespread in the study of governance and public policy, but arguably it has not yet had much impact on security studies. The book therefore deploys the interpretive approach to explore contemporary issues in international security, combining theoretical engagement with good empirical coverage through a novel set of case studies. Bringing together a fresh mix of world renowned and up-and-coming scholars from across the fields of security studies, political theory and international relations, the chapters explore the beliefs, traditions, and dilemmas that have informed security practice on the one hand, and the academic study of security on the other, as well as the connections between them. All contributors look to situate their work against a broader historical background and long-standing traditions, allowing them to take a critical yet historically informed approach to the material.
The scope and applicability of risk management have expanded greatly over the past decade. Banks, corporations, and public agencies employ its new technologies both in their daily operations and long-term investments. It would be unimaginable today for a global bank to operate without such systems in place. Similarly, many areas of public management, from NASA to the Centers for Disease Control, have recast their programs using risk management strategies. It is particularly striking, therefore, that such thinking has failed to penetrate the field of national security policy. Venturing into uncharted waters, Managing Strategic Surprise brings together risk management experts and practitioners from different fields with internationally-recognized national security scholars to produce the first systematic inquiry into risk and its applications in national security. The contributors examine whether advance risk assessment and management techniques can be successfully applied to address contemporary national security challenges.
The U.S. military is no longer based on a Cold War self-sufficient
model. Today's armed forces are a third smaller than they were
during the Cold War, and yet are expected to do as much if not more
than they did during those years. As a result, a transformation is
occurring in the way the U.S. government expects the military to
conduct operationsOCowith much of that transformation contingent on
the use of contractors to deliver support to the armed forces
during military campaigns and afterwards.
The U.S. military is no longer based on a Cold War self-sufficient
model. Today's armed forces are a third smaller than they were
during the Cold War, and yet are expected to do as much if not more
than they did during those years. As a result, a transformation is
occurring in the way the U.S. government expects the military to
conduct operations--with much of that transformation contingent on
the use of contractors to deliver support to the armed forces
during military campaigns and afterwards.
Sun Tzu's The Art of War has been a vastly influential treatise on military strategy in the east from the time of China's Warring States Period (403-221 BC) onward. Though its first translation into a European language was only in 1782, the book's significance was quickly recognized and even such towering figures of Western history as Napoleon and General Douglas MacArthur have claimed it a source of inspiration. Pax Librorum (www.PaxLibrorum.com) now brings readers this highly accessible unannotated edition of Lionel Giles' definitive translation of Sun Tzu's enduring masterpiece.
Rarely has security been such a preoccupation of Australian politics, and rarely has it seemed so far from being achieved. This celebrated book argues that security has dominated and distorted Australia's foreign policy and national life, from Cook's first voyage to the Tampa crisis, 9/11 and Iraq. Whether in the Great War, Vietnam or the treatment of asylum seekers, Anthony Burke shows that Australia's security has been bought with the insecurity and suffering of others. Against this corrosive tradition, he offers a new - cosmopolitan and non-coercive - model of national existence and responsibility. At once a deep historical survey and an argument with its society, Fear of Security is a landmark account of how Australia relates to itself, its region and the world. Turning powerful academic and political orthodoxies on their heads, it is essential reading for those concerned with the burning questions that face Australia and the Asia-Pacific.
This history of the Strategic Defense Initiative ranges across politics, economics, strategic studies and international relations. It provides the results of research into the SDI interest groups, the distribution of contracts and the politics of influence. It discusses the wider contexts of 'Star Wars', such as alliance management, marketing and domestic politics, and its military spin-offs, especially for antisatellite (ASAT) and 'space control' programmes. The author tests the theoretical literature on the dynamics of the arms race by using SDI as a case study, and draws evidence from sources such as congressional hearings, interviews, the trade Press, restricted briefing papers, and documents obtained under the US Freedom of Information Act. The book follows the fortunes of strategic defence into the changed global conditions of the 1990s, following the collapse of the Soviet bloc, the Gulf War and President Bush's announcement of a refocussed SDI, the Global Protection Against Limited Strikes (GPALS).
The veterans of the Fourteenth Army who fought in Burma between 1942 and 1945 called themselves 'the forgotten army'. But that appellation could equally well be applied to the whole of the British army after 1945. Histories of Britain's post-war defence policy have usually focused on how and why Britain acquired a nuclear deterrent. David French takes a new look at these policies by placing the army centre-stage. Drawing on archival sources that have hardly been used by historians, he shows how British governments tried to create an army that would enable them to maintain their position as a major world power at a time when their economy struggled to foot the bill. The result was a growing mismatch between the military resources that the government thought it could afford on the one hand, and a long list of overseas commitments, in Europe, Africa, the Middle East, and the Far East, that it was reluctant to surrender. The result was that the British created a Potemkin army, a force that had an outwardly impressive facade, but that in reality had only very limited war-fighting capabilities. Army, Empire, and Cold War will interest not only historians of the British army, but also those who are trying to understand Britain's role in the Cold War, and how and why the British came to surrender formal rule over their empire.
This book arises from the NATO Advanced Study Institute "Technological Innovations in Detection and Sensing of CBRN Agents and Ecological Terrorism" held in Chisinau, Republic of Moldova in June 2010. It comprises a variety of invited contributions by highly experienced educators, scientists, and industrialists, and is structured to cover important aspects of the field that include developments in chemical-biological, and radiation sensing, synthesis and processing of sensors, and applications of sensors in detecting/monitoring contaminants introduced/dispersed inadvertently or intentionally in air, water, and food supplies. The book emphasizes nanomaterials and nanotechnology based sensing and also includes a section on sensing and detection technologies that can be applied to information security. Finally, it examines regional, national, and international policies and ethics related to nanomaterials and sensing. It will be of considerable interest and value to those already pursuing or considering careers in the field of nanostructured materials and nanotechnology based sensing, In general, it serves as a valuable source of information for those interested in how nanomaterials and nanotechnologies are advancing the field of sensing, detection, and remediation, policy makers, and commanders in the field.
This book offers an overview of space strategy in the 21st century. The purpose of space strategy is to coordinate, integrate, and prioritize space activities across security, commercial, and civil sectors. Without strategy, space activities continue to provide value, but it becomes difficult to identify and execute long-term programs and projects and to optimize the use of space for security, economic, civil, and environmental ends. Strategy is essential for all these ends since dependence on, and use of, space is accelerating globally and space is integrated in the fabric of activities across all sectors and uses. This volume identifies a number of areas of concern pertinent to the development of national space strategy, including: intellectual foundations; political challenges; international cooperation and space governance; space assurance and political, organizational, and management aspects specific to security space strategy. The contributing authors expand their focus beyond that of the United States, and explore and analyse the international developments and implications of national space strategies of Russia, China, Europe, Japan, India, Israel, and Brazil. This book will be of much interest to students of space power and politics, strategic studies, foreign policy and International Relations in general.
The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.
From the time the Romans first set foot on England's shore in 55 BC, the British Isles have faced a constant threat of foreign invasion. As a result, the landscapes of England, Scotland, and Ireland are dotted with ancient defensive fortifications as varied as their makers. Iron Age Celtic "hillforts," Roman castra and Hadrian's Wall, Anglo-Saxon dykes and Alfredian burhs, Norman mottes and stone-keeps, Edwardian castles, Irish tower houses--they all served to repel ancient intruders and many still stand as tangible relics of a remarkable past. This study chronicles the development of British fortifications from prehistoric times through the end of Richard III's reign in 1485, providing the history of each type of structure, relevant examples, and information on weapons and siege warfare. More than 250 illustrations vividly detail each ediface's construction and configuration.
Economic turmoil has spread throughout the western world, but terrorists and other threats to national security have not been put out of business by the Great Recession. "Economic Instruments of Security Policy" explores the critical question: does the United States and its allies still maintain effective economic tools to influence the behavior of those who seek to cause us harm? Governments have at their disposal many economic instruments to promote national security, such as sanctions, foreign aid, international trade, international finance, and laws blocking funds for international terrorism. This book examines the use of theses economic policies and addresses how best to measure their effectiveness.
The Security Governance of Regional Organizations assesses the effectiveness of regional organizations as regional or global security providers, and examines how policy preferences, resources, capabilities, institutional mechanisms and economic and political cohesion link with collective action behaviour in four security policy functions. It investigates how regional organizations meet the new security threats or respond to strategic geopolitical changes and what adaptations they make in the process. Divided into three parts and using a common analytical framework, the book explains the changing security agenda in ten key regional organizations, each organizational chapter:
This collection contributes to the ongoing reconceptualization of security and definition of security governance, and explores whether regional security governance processes are unique or similar and whether some organizational experiences can be seen as models for others to follow. It combines a coherent theoretical framework with strong comparative case studies, making it ideal reading for all students of security studies.
vi of a large number of people due to the enormous quantities of radioactive material that would be required to reach high levels of contamination in mass-produced or distributed supplies. Although, based on data presented at the Workshop concerning the more than 30,000 missing radioactive sources all over the word, the radioactive contamination of food or water is also a scenario that must be taken seriously into consideration. During the last two decades there have been several emerging hazards linked to animal diseases or originating in animal products for example: Avian Influenza (AI), Bovine Spongiform Encephalopathy (BSE), West Nile Fever, Severe Acute Respiratory Syndrome (SARS), and Ebola virus. All these diseases or events directly or indirectly affect food security and/or food safety. Approximately 75% of all emerging diseases are zoonotic by either an association with animal populations or an evolution of the disease in a- mals making it possible to move from animal species to humans. Participants were presented the primary results of the ongoing NATO- SPS Pilot Study on "Food Chain Security". These results focused mainly on (i) an overview of the food system; (ii) prevention, surveillance and detection systems and (iii) response system. The importance of issues such as: vuln- ability assessments, risk communication in risk analysis, risk perception, traceability, preparedness - awareness, communication, have to be cons- ered when working on food chain security.
No foreign policy decision in recent history has had greater
repercussions than President George W. Bush's decision to invade
and occupy Iraq. It launched a new doctrine of preemptive war,
mired the American military in an intractable armed conflict,
disrupted world petroleum supplies, cost the United States hundreds
of billions of dollars, and damaged or ended the lives of hundreds
of thousands of Americans and Iraqis. Its impact on international
politics and America's standing in the world remains incalculable.
This is an accessible new examination of what security means today, contextualizing the term amongst other key ideas, such as the nation state, diplomacy, war and autonomy. By exploring the many differing conceptions of security, this study clearly explains how the idea of security in world affairs can be understood in relation to other ideas and points of view. It shows how, when standing alone, the word security is meaningless, or just an empty term, when divorced from other ideas distinctive to international life. This essential new volume tackles the key questions in the debate:
This book is an excellent resource for students and scholars of security studies and politics and international relations.
This book rethinks security theory from a feminist perspective - uniquely, it engages feminism, security, and strategic studies to provide a distinct feminist approach to security studies. The volume explicitly works toward an opening up of security studies that would allow for feminist (and other) narratives to be recognized and taken seriously as security narratives. To make this possible, it presents a feminist reading of security studies that aims to invigorate the debate and radicalize critical security studies. Since feminism is a political project, and security studies are, at their base, about particular visions of the political and their attendant institutions, this is of necessity a political intervention. The book works through and beyond security studies to explore possible spaces where an opening of security, necessary to make way for feminist insights, can take place. While it develops and illustrates a feminist narrative approach to security, it is also intended as an intervention that challenges the politics of security and the meanings for security legitimized in existing practices. This book provides develops a comprehensive framework for the emerging field of feminist security studies and will be of great interest to students and scholars of feminist IR, critical security studies, gender studies and IR and security studies in general. |
You may like...
How to be Brilliant at Mental Arithmetic
Beryl Webber, Jean Haigh
Paperback
R548
Discovery Miles 5 480
Mathematical Modeling with Excel
Brian Albright, William P. Fox
Paperback
R1,542
Discovery Miles 15 420
Real Classrooms, Real Teachers - The C3…
Kristy A. Brugar, Kathryn L Roberts
Hardcover
R2,530
Discovery Miles 25 300
Master Your Data with Excel and Power BI…
Miguel Escobar, Ken Puls
Paperback
|