![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
When Nelson Mandela was sworn in as president on 10 May 1994, South Africa enjoyed an unprecedented global standing. Much of the international community, particularly Western states, saw the new South Africa as well equipped to play a dynamic and dominant role on the continent; promoting conflict resolution, economic development, and acting as a standard-bearer for democracy and human rights. Yet, throughout the presidencies of Nelson Mandela, Thabo Mbeki and Jacob Zuma, South Africa has failed to deliver on this early promise. Its continental primacy has been circumscribed by its own reluctance to lead, combined with widespread African hostility to its economic expansion, antipathy towards its democratic ideals and scepticism about its suitability as Africa’s global representative. With an onerous domestic agenda, as it continues to tackle the profound socio-economic legacies of apartheid, and with its military power also on the wane, South Africa must now adapt to an emerging multipolarity on the continent. This transition – which may produce a new concert of African powers working in constructive collaboration or lead to fragmentation, discord and gridlock – is likely to determine Africa’s prospects for decades to come. This Adelphi book squarely challenges the received wisdom that South Africa is a dominant power in Africa. It explores the country’s complex and difficult relationship with the rest of the continent in the post-apartheid era and examines the ways in which the country has struggled to translate its economic, military and diplomatic weight into tangible foreign policy successes and enduring influence on the ground. The conclusions of this book will be valuable to academics, policymakers, journalists, and business leaders seeking to understand the evolution and trajectory of South African policy in Africa.
This new Handbook provides readers with the tools to understand the evolution of transatlantic security from the Cold War era to the early 21st century. After World War II, the US retained a strong presence as the dominant member of NATO throughout the Cold War. Former enemies, such as Germany, became close allies, while even countries that often criticized the United States made no serious attempt to break with Washington. This pattern of security co-operation continued after the end of the Cold War, with NATO expansion eastwards extending US influence. Despite the Iraq war prompting a seemingly irreparable transatlantic confrontation, the last years of the Bush administration witnessed a warming of US-European relations, expected to continue with the Obama administration. The contributors address the following key questions arising from the history of transatlantic security relations: What lies behind the growing and continuing European dependency on security policy on the United States and what are the political consequences of this? Is this dependency likely to continue or will an independent European Common Foreign and Security Policy eventually emerge? What has been the impact of 'out-of-area' issues on transatlantic security cooperation? The essays in this Handbook cover a broad range of historical and contemporary themes, including the founding of NATO; the impact of the Korean War; the role of nuclear (non-)proliferation; perspectives of individual countries (especially France and Germany); the impact of culture, identity and representation in shaping post-Cold War transatlantic relations; institutional issues, particularly EU-NATO relations; the Middle East; and the legacy of the Cold War, notably tensions with Russia. This Handbook will be of much interest to students of transatlantic security, NATO, Cold War Studies, foreign policy and IR in general.
This textbook provides a comprehensive introduction to modern strategy, covering the context, theory, and practice of military strategy in all its different forms. Covering all the main issues in the field, the book explores the major themes through a combination of classical and modern strategic theory, history, and current practice. It is split into three main sections: The first provides the context for contemporary strategy and includes discussions of the human, technological, intelligence, ethical, and grand strategic dimensions. The second part explores the theory and practice of strategy in different geographical domains, including land, sea, air, space, and cyberspace. The final part engages with three of the most challenging forms of strategy in the contemporary era: nuclear weapons, terrorism, and insurgency. This second edition brings the book up to date by including discussions of the rise and fall of the Islamic State of Iraq and Syria (ISIS); the emergence of robotics and artificial intelligence; major events in space and cyberspace; and the growing profile of nuclear weapons. Each chapter presents the reader with a succinct summary of the topic, provides a challenging analysis of current issues, and finishes with key points, questions for discussion, and further reading. This book will be essential reading for upper-level students of strategic studies, war studies, military history, and international security.
As tensions between China and Japan increase, including over the disputed islands in the East China Sea, Japan has adopted under Prime Minister Abe a new security posture. This involves, internally, adapting Japan's constitutional position on defence and, externally, building stronger international relationships in the Asia-Pacific region and more widely. This book presents a comprehensive analysis of these developments. It shows how trust and co-operation with the United States, the only partner with which Japan has a formal alliance, is being rebuilt, discusses how other relationships, both on security and on wider issues, are being formed, in the region and with European countries and the EU, with the relationships with India and Australia being of particular importance, and concludes by assessing the likely impact on the region of Japan's changing posture and new relationships.
Eva Gross analyzes changing national preferences towards the EU CFSP and ESDP by providing detailed accounts of British, French and German crisis decision-making in FYROM, Afghanistan, Lebanon and DR Congo. While transatlantic relations remain important, crisis management under the EU label is increasingly accepted in national capitals.
In all modern military doctrines the mission effectiveness shall be dramatically increased by the robust networking of all forces, sharing of information and distributed intelligent information processing, generating situational awareness and providing decision support. In addition, these principles also offer an effective way to improve security systems that support the fight against terrorists and organized crime. Intelligent Agents are a key technology to realize such modern defence and security systems and are therefore increasingly investigated by researchers and practioners in that field. This book is a collection of recent published and refereed papers drawn from workshops and other colloquia held in various venues around the world in the last two years. Papers in this book describe work in the development of command and control systems, military communications systems, information systems, surveillance systems, autonomous vehicles, simulators and HCI. The broad nature of the application domain is matched by the diversity of techniques used in the papers that are included in the collection. The collection provides, for the first time, an overview of the most significant work being performed by the leading workers in this area. It provides a single reference point for the state of the art in the field at the moment and will be of interest to Computer Science professionals working in the defence sector, and academics and students investigating the technology of Intelligent Agents that are curious to see how the technology is applied in practice. The book also provides valuable decision support for planners and strategists in defence- and security-related companies, organizations, ministries and departments.
The fourth and final volume in a pioneering series on the Chinese
military, "Imagined Enemies" offers an unprecedented look at its
history, operational structure, modernization, and strategy.
Beginnning with an examination of culturee adn thought in Part I,
the authors explore the transition away transition away from Mao
Zedong's revolutionary doctrine, the conflict with Moscow, and
Beijing's preoccupation with Taiwanese separatism and preparations
for war to thwart it. Part II focuses on operational and policy
decisions in the National Command Authority and, subsequently, in
the People's Liberation Army. Part III provides a detailed study of
the Second Artillery, China's strategic rocket forces. The book
concludes with the transformation of military strategy and shows
how it is being tested in military exercises, with Taiwan and the
United States as "imagined enemies."
This revised and updated second edition features over twenty new chapters and offers a wide-ranging collection of cutting-edge essays from leading scholars in the field of Security Studies. The field of Security Studies has undergone significant change during the past 20 years, and is now one of the most dynamic sub-disciplines within International Relations. This second edition has been significantly updated to address contemporary and emerging security threats with chapters on organised crime, migration and security, cyber-security, energy security, the Syrian conflict and resilience, amongst many others. Comprising articles by both established and up-and-coming scholars, The Routledge Handbook of Security Studies provides a comprehensive overview of the key contemporary topics of research and debate in the field of Security Studies. The volume is divided into four main parts: * Part I: Theoretical Approaches to Security * Part II: Security Challenges * Part III: Regional (In)Security * Part IV: Security Governance This new edition of the Handbook is a benchmark publication with major importance for both current research and the future of the field. It will be essential reading for all scholars and students of Security Studies, War and Conflict Studies, and International Relations.
Sure to be found controversial by some, compelling by all, this is the only available book-length examination of the way the U.S. Army and Department of Defense have tried to create the capabilities promised by the high-tech Revolution in Military Affairs (RMA). Of more immediate concern, it is also the only in-depth account of the effect RMA and transformation concepts had on the American operations in Afghanistan and Iraq. Many of the problems in both Iraq and Afghanistan, Adams argues, arose from the DoD's implacable desire to implement RMA-driven transformation concepts-whether they were appropriate or not. What we need to do, he maintains, is to fight the war we have, not the war we want. Over the last several decades, military theorists and others began to believe that new technologies were generating a "revolution in military affairs" (RMA), capabilities so revolutionary that they would redefine warfare. Spurred by these beliefs, and led by President George W. Bush and Defense Secretary Donald Rumsfeld, the Department of Defense (DoD) set out to transform the U.S. armed forces by adopting RMA concepts-and spending billions to make the hypothetical capabilities real. The entire structure of the armed forces changed as a result. This vision, however, was totally dependent on a set of unproven suppositions and often nonexistent capabilities, especially a network of information technologies. Moreover, the services, the media, Congress, and industry each had its own agenda, all of which continue to come into play in the development of RMA strategies. The interplay of politics, technology and military reality offers a fascinating narrative.
This book examines the importance of "military ethics" in the formulation and conduct of contemporary military strategy. Clausewitz's original analysis of war relegated ethics to the side-lines in favor of political realism, interpreting the proper use of military power solely to further the political goals of the state, whatever those may be. This book demonstrates how such single-minded focus no longer suffices to secure the interest of states, for whom the nature of warfare has evolved to favor strategies that hold combatants themselves to the highest moral and professional standards in their conduct of hostilities. Waging war has thus been transformed in a manner that moves beyond Clausewitz's original conception, rendering political success wholly dependent upon the cultivation and exercise of discerning moral judgment by strategists and combatants in the field. This book utilizes a number of perspectives and case studies to demonstrate how ethics now plays a central role in strategy in modern armed conflict. This book will be of much interest to students of just war, ethics, military strategy, and international relations.
This book examines how the United States uses limited military force and other means to influence adversaries and potential adversaries. It reviews when limited force can and cannot work and examines a range of current challenges, including those of guerrilla groups or minor powers armed with nuclear, chemical, or biological weapons. It also looks at the complications arising from domestic politics and the difficulties of using force in an alliance.
Hurricane Katrina is the latest in a series of major disasters that were not well managed, but it is not likely to be the last. Category 4 and category 5 hurricanes will, according to most predictions, become both more frequent and more intense in the future due to global warming and/or natural weather cycles. In addition, it is often said that another terrorist attack on the United States is inevitable; that it is a question of when, not whether. Add to that the scare over a possible avian flu pandemic. As a result, the United States should expect that disaster response--to natural and other types of disasters--will continue to be of vital concern to the American public and the policymakers and officials who deal with disaster response and relief, including the military. The U.S. disaster relief program reflects a basic division of responsibility between federal, state, and local governments that has generally stood the test of time. At the federal level, a single agency, FEMA--now under the Department of Homeland Security--has been charged with the responsibility for coordinating the activities of the various federal agencies that have a role in disaster relief. A successful disaster response requires three things: timely and effective coordination between state and federal governments; effective coordination among the federal agencies; and effective coordination between and among state and local government agencies. Miskel examines the effects that operational failures after Hurricanes Agnes, Hugo, Andrew, and Katrina have had on the organizational design and operating principles of the disaster response system program. He also discusses the impact of 9/11 and the evolving role ofthe military, and he identifies reforms that should be implemented to improve the nation's ability to respond in the future.
The #1 New York Times bestseller-updated with additional information on the current Iraq War-now in trade paperback. General Chuck Horner commanded the U.S. and allied air assets-the forces of a dozen nations- during Desert Shield and Desert Storm, and was responsible for the design and execution of one of the most devastating air campaigns in history. Never before has the Gulf air war planning, a process filled with controversy and stormy personalities, been revealed in such rich, provocative detail. In this edition of Every Man a Tiger, General Horner looks at the current Gulf conflict and comments on the use of air power in Iraq.
"Biosecurity" comprehensively analyzes the dramatic transformations
that are reshaping how the international community addresses
biological weapons and infectious diseases.
This work proposes the reorganization of America's ground forces on the strategic, operational and tactical levels. Central to the proposal is the simple thesis that the U.S. Army must take control of its future by exploiting the emerging revolution in military affairs. The analysis argues that a new Army warfighting organization will not only be more deployable and effective in Joint operations; reorganized information age ground forces will be significantly less expensive to operate, maintain, and modernize than the Army's current Cold War division-based organizations. And while ground forces must be equipped with the newest Institute weapons, new technology will not fulfill its promise of shaping the battlefield to American advantage if new devices are merely grafted on to old organizations that are not specifically designed to exploit them. It is not enough to rely on the infusion of new, expensive technology into the American defense establishment to preserve America's strategic dominance in the next century. The work makes it clear that planes, ships, and missiles cannot do the job of defending America's global security issues alone. The United States must opt for reform and reorganization of the nation's ground forces and avoid repeating Britain's historic mistake of always fielding an effective army just in time to avoid defeat, but too late to deter an aggressor.
The fusion of basic ideas in mathematics, radar, sonar, biology, and chemistry with ongoing improvements in hardware and computation offers the promise of much more sophisticated and accurate detection and identification capabilities than currently exist. Coupled with the dramatic rise in the need for surveillance in innumerable aspects of our daily lives, brought about by hostile acts deemed unimaginable only a few short years ago, the time is ripe for image processing scientists in these usually diverse fields to join together in a concerted effort to combat the new brands of terrorism. We envisage the proposed ASI as one important step. To encompass the diverse nature of the subject this volume covers three broadly defined but interrelated areas: I. The mathematics and computer science of automatic detection and identification; II. Image processing techniques for radar and sonar; III. Detection of anomalies in biomedical and chemical images. A deep understanding of these three topics, and of their interdependencies, is clearly crucial to countering the increasing sophistication of those who wish to do us harm. The contributors to this volume include many of the world's leading experts in the development of new imaging methodologies to detect, identify, and prevent or respond to these threats.
This volume in the Contemporary Military, Strategic, and Security Issues series presents a concise introduction to the evolution, key concepts, discourse, and future options for improved strategic communication in today's U.S. government. Strategic Communication: Origins, Concepts, and Current Debates is a groundbreaking study, the first book explicitly focused on strategic communication as it is currently used and discussed in the U.S. government. Written specifically for those who are new to strategic communication, this incisive book clarifies the definitional debate, explores the history of the term and its practice, and embraces a broad, practical definition. But that is only the beginning. Moving to the realities of the issue, author Christopher Paul reviews dozens of government reports on strategic communication and public diplomacy released since 2000, examining specific proposals related to improving strategic communication in the U.S. government and explaining the disagreements. Most important, he offers consensus and clarity for the way ahead, discussing how disparate elements of the government can be coordinated to master-and win-the "war of ideas" through fully integrated and synchronized communications and actions. Key document excerpts from legislation, proposed legislation, doctrine, reform proposals, and policy documents A glossary of terms An annotated bibliography of proposals and recommendations for strategic communication/public diplomacy reform
Throughout human history, scholars, statesmen and military leaders have attempted to define what constitutes the legitimate use of armed force by one community against another. Moreover, if force is to be used, what normative guidelines should govern the conduct of warfare? Based upon the assumption that armed conflict is a human enterprise and therefore subject to human limitations, the Western 'just war tradition' represents an attempt to provide these guidelines. Following on from the success of Hensel's earlier publication, The Law of Armed Conflict, this volume brings together an internationally recognized team of scholars to explore the philosophical and societal foundations of just war tradition. It relates the principles of jus ad bellum to contemporary issues confronting the global community and explores the relationship between the principles of jus in bello and the various principles embodied in the customary law of armed conflict. Applying an interdisciplinary approach to analyzing and assessing the links between just war and the norms of behaviour, the book provides a valuable contribution to international law, international relations and national security studies.
Contemporary European Security explores the complex European security architecture and introduces students to the empirical, theoretical and conceptual approaches to studying the subject. Written by experts in each subfield, it addresses key topics within the wider strategic context of international security. Presenting traditional and critical debates to illuminate this ever-changing field it addresses specifically: European security since 2000 and the end of the Cold War. The evolution of International Relations theories in understanding security in Europe. The role of NATO in the post-war period and its strategy, impact and enlargement. The institutionalisation of the CSCE and the political tensions within the OSCE. The EU's Common Security and Defence Policy and recent policy initiatives in defence. Feminist conceptions of European security. European military innovation. Security challenges in the post-Soviet space and the growing instability in the Middle East and North Africa. The emergence of human security. Internal and societal security. This essential textbook will be of key interests to students and scholars of European Security, Security and Military studies, Strategic Studies, European Politics and International Relations.
Contemporary European Security explores the complex European security architecture and introduces students to the empirical, theoretical and conceptual approaches to studying the subject. Written by experts in each subfield, it addresses key topics within the wider strategic context of international security. Presenting traditional and critical debates to illuminate this ever-changing field it addresses specifically: European security since 2000 and the end of the Cold War. The evolution of International Relations theories in understanding security in Europe. The role of NATO in the post-war period and its strategy, impact and enlargement. The institutionalisation of the CSCE and the political tensions within the OSCE. The EU's Common Security and Defence Policy and recent policy initiatives in defence. Feminist conceptions of European security. European military innovation. Security challenges in the post-Soviet space and the growing instability in the Middle East and North Africa. The emergence of human security. Internal and societal security. This essential textbook will be of key interests to students and scholars of European Security, Security and Military studies, Strategic Studies, European Politics and International Relations.
The book contains lectures of an international NATO-Russian Advanced Research Workshop about the Stand-off-Detection of concealed explosives or explosive charges carried by Suicide-Bombers or in mobile objects (vehicles). The explosives or explosive charges should be detected by harmless methods from a distance and unnoticed by persons under inspection. The ARW was one of a series of workshops before, dealing with the detection of explosives used by terrorists and was initiated by the "Explosive Detection Working Group" of NATO to create projects of applied research. The aim of the workshop was to present suitable projects, to exchange knowledge and to discuss the feasibility and realization of methods. Projects aim at improvements in sensing techniques that will allow the shortest developing time and are suitable for commercial production. Potential short time availability was a prioritizing isssue.
In this new and fully revised edition Pinar Bilgin provides an accessible yet critical analysis of regional security in the Middle East, analysing the significant developments that have taken place in the past years. Drawing from a wide range of critical approaches to security, the book offers a comprehensive study of pasts, presents, and futures of security in the region. The book distinguishes itself from previous (critical) studies on regional security by opening up both 'region' and 'security'. Different from those approaches that bracket one or the other, this study takes seriously the constitutive relationship between (inventing) regions, and (conceptions and practices of) security. There is not one Middle East but many, shaped by the insecurities of those who voice them. This book focuses on how present-day insecurities have their roots in practices that have, throughout history, been shaped by 'geopolitical inventions of security'. In doing so, the book lays the contours of a framework for thinking critically about regional security in this part of the world. This second edition of Regional Security in the Middle East is a key resource for students and scholars interested in International Relations and Political Science, Security Studies, and Middle East Studies.
This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general. |
You may like...
The Far Out Monster Disco Orchestra
The Far Out Monster Disco Orchestra
CD
|