![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
Between 2021 and 2031, the UK government is set to spend over GBP230 billion on its military. Who decides how to use these funds, and how can we be sure that the UK's armed forces can meet the threats of tomorrow? This book provides the answers to these crucial questions. Concentrating on decisions taken below the political level, it uncovers the factors that underpin the translation of strategic direction into military capability. In a series of interviews, over 30 top admirals, generals and air marshals give their own views on the procurement and maintenance of the nation's current and future military capability. Their unrivalled professional knowledge and experience affords a fascinating insight into the higher management of national defence.
This revised and updated second edition features over twenty new chapters and offers a wide-ranging collection of cutting-edge essays from leading scholars in the field of Security Studies. The field of Security Studies has undergone significant change during the past 20 years, and is now one of the most dynamic sub-disciplines within International Relations. This second edition has been significantly updated to address contemporary and emerging security threats with chapters on organised crime, migration and security, cyber-security, energy security, the Syrian conflict and resilience, amongst many others. Comprising articles by both established and up-and-coming scholars, The Routledge Handbook of Security Studies provides a comprehensive overview of the key contemporary topics of research and debate in the field of Security Studies. The volume is divided into four main parts: * Part I: Theoretical Approaches to Security * Part II: Security Challenges * Part III: Regional (In)Security * Part IV: Security Governance This new edition of the Handbook is a benchmark publication with major importance for both current research and the future of the field. It will be essential reading for all scholars and students of Security Studies, War and Conflict Studies, and International Relations.
Since its formation in 1948, and particularly since the assassination of Prime Minister Yitzak Rabin in 1995, Israel has experienced turbulent political change and numerous ongoing security challenges, including major party splits, collapsed peace talks with the Palestinians and Syria, nuclear threats from Iran, and even the specter of civil war as Israel withdrew from Gaza. This essential survey brings together Israeli and American scholars to provide a much-needed balanced introduction to Israel's domestic politics and foreign policy. Experts tackle this difficult subject in three parts: domestic politics, foreign policy challenges, and strategic challenges. Domestic topics include the Israeli Right and Left; religious, Russian, and Arab parties; the Supreme Court; and the economy. Part two discusses Israel's complicated and often fractious relationships with the Palestinians and the Arab world, as well as its improved relations with Turkey and India and continuing close relationship with the United States. The Israel-Hizbollah War of 2006 and existential threats to Israel, including the threat from Iran, are detailed in part three. This compelling and authoritative coverage provides students with the necessary framework to understand Israel's political past and present, as well as the direction Israel is likely to take in the future. Contents 1. Introduction (Robert O. Freedman) Part One: Israeli Domestic Politics Part Two: Israel's Foreign Policy Challenges Part Three: Israel's Strategic Challenges
At first sight it seems that there is little in common between the security dynamics of Northeast Asia and South Asia. They are geographically situated in different parts of Eurasia. Their threat perceptions are different, being informed by their unique historical experience. These geo-strategic particularities have molded their security postures. Both these regions are distinguished by the presence of adversarial dyads- North Korea-South Korea and Pakistan-India. These countries have single-mindedly pursued their quest for nuclear weapons, except for South Korea, that was dissuaded in its own nuclear endeavor by the by the United States.
As a concept, deterrence has launched a thousand books and
articles. It has dominated Western strategic thinking for more than
four decades. In this important and groundbreaking new book,
Lawrence Freedman develops a distinctive approach to the evaluation
of deterrence as both a state of mind and a strategic option. This
approach is applied to post-cold war crisis management, and the
utility and relevance of the concept is addressed in relation to US
strategic practice post-9/11, particularly in the light of the
apparent preference of the Bush Administration for the alternative
concept of pre-emption. The study of deterrence has been hampered by the weight of the intellectual baggage accumulated since the end of the Second World War. Exaggerated notions of what deterrence might achieve were developed, only to be to knocked down by academic critique. In this book, Freedman charts the evolution of the contemporary concept of deterrence, and discusses whether - and how - it still has relevance in today's world. He considers constructivist as well as realist approaches and draws on criminological as well as strategic studies literature to develop a concept of a norms-based, as opposed to an interest-based, deterrence. This book will be essential reading for students of politics and international relations as well as all those interested in contemporary strategic thought.
This new handbook provides a comprehensive overview of the issues facing naval strategy and security in the twenty-first century. Featuring contributions from some of the world's premier researchers and practitioners in the field of naval strategy and security, this handbook covers naval security issues in diverse regions of the world, from the Indian Ocean and the Mediterranean to the Arctic and the piracy-prone waters off East Africa's coast. It outlines major policy challenges arising from competing claims, transnational organized crime and maritime terrorism, and details national and alliance reactions to these problems. While this volume provides detailed analyses on operational, judicial, and legislative consequences that contemporary maritime security threats pose, it also places a specific emphasis on naval strategy. With a public very much focused on the softer constabulary roles naval forces play (such as humanitarian assistance, disaster relief, naval diplomacy, maintenance of good order at sea), the overarching hard-power role of navies has been pushed into the background. In fact, navies and seapower have been notably absent from many recent academic discussions and deliberations of maritime security. This handbook provides a much-desired addition to the literature for researchers and analysts in the social sciences on the relationship between security policy and military means on, under, and from the sea. It comprehensively explains the state of naval security in this maritime century and the role of naval forces in it. This book will be of much interest to students of naval security and naval strategy, security studies and IR, as well as practitioners in the field.
Did the Trump administration have a cybersecurity strategy, or was it hell-bent on dismantling years of consensus-building on how the nation should respond to an existential threat to its digital life blood? Based on insider accounts and exclusive interviews with experts, Cyber in the Age of Trump offers a first-time chronicle and analysis of the Trump administration's approach to cybersecurity, its curious decisions and strategic choices, places where its work has earned applause, and the places where cyber pros see major signs of danger. The new administration came in with a strong faith in technology, a sense that the U.S. could better deploy its cyber weaponry to deter foes, and a willingness to continue popular Obama-era policies on collaborating with industry. But it didn't seem to have a cyber vision, or one that was applied consistently. And in the absence of such a strategic overview, the threat to the nation would only grow. Cyber in the Age of Trump is the first book to examine the impact of President Trump on the nation's greatest long-term strategic challenge and how a "disruptor presidency" has upended consensus and threatened to derail cyber policy.
During the Cold War the concept of international security was understood in military terms as the threat or use of force by states. The end of EastDWest hostilities, however, brought critical perspectives to the fore as scholars sought to explain the emergence of new challenges to international stability, such as environmental degradation, immigration and terrorism. The second edition of this popular and highly respected text offers a wide-ranging and comprehensive analysis of the growing field of critical security studies. All the chapters have been fully revised and updated to map the on-going evolution of debates about international security since 1989, including the more recent shift in emphasis from critiques of the realist practices of states to those of global liberal governance. Topics covered include the relationship between security and change, identity, the production of danger, fear and trauma, human insecurity and emancipation. The book explores the meaning and use of these concepts and their relevance to real-life situations ranging from the War on Terror to the Arab Spring, migration, suffering in war, failed states and state-building, and the changing landscape of the international system, with the emergence of a multipolar world and the escalation of global climate change. Written with verve and clarity and incorporating new seminar activities and questions for class discussion, this book will be an invaluable resource for students of international relations and security studies.
This collection of essays combines historical research with cutting-edge strategic analysis and makes a significant contribution to the study of the early history of strategic thinking. There is a debate as to whether strategy in its modern definition existed before Napoleon and Clausewitz. The case studies featured in this book show that strategic thinking did indeed exist before the last century, and that there was strategy making, even if there was no commonly agreed word for it. The volume uses a variety of approaches. First, it explores the strategy making of three monarchs whose biographers have claimed to have identified strategic reasoning in their warfare: Edward III of England, Philip II of Spain and Louis XIV of France. The book then analyses a number of famous strategic thinkers and practitioners, including Christine de Pizan, Lazarus Schwendi, Matthew Sutcliffe, Raimondo Montecuccoli and Count Guibert, concluding with the ideas that Clausewitz derived from other authors. Several chapters deal with reflections on naval strategy long thought not to have existed before the nineteenth century. Combining in-depth historical documentary research with strategic analysis, the book illustrates that despite social, economic, political, cultural and linguistic differences, our forebears connected warfare and the aims and considerations of statecraft just as we do today. This book will be of great interest to students of strategic history and theory, military history and IR in general.
This collection of essays combines historical research with cutting-edge strategic analysis and makes a significant contribution to the study of the early history of strategic thinking. There is a debate as to whether strategy in its modern definition existed before Napoleon and Clausewitz. The case studies featured in this book show that strategic thinking did indeed exist before the last century, and that there was strategy making, even if there was no commonly agreed word for it. The volume uses a variety of approaches. First, it explores the strategy making of three monarchs whose biographers have claimed to have identified strategic reasoning in their warfare: Edward III of England, Philip II of Spain and Louis XIV of France. The book then analyses a number of famous strategic thinkers and practitioners, including Christine de Pizan, Lazarus Schwendi, Matthew Sutcliffe, Raimondo Montecuccoli and Count Guibert, concluding with the ideas that Clausewitz derived from other authors. Several chapters deal with reflections on naval strategy long thought not to have existed before the nineteenth century. Combining in-depth historical documentary research with strategic analysis, the book illustrates that despite social, economic, political, cultural and linguistic differences, our forebears connected warfare and the aims and considerations of statecraft just as we do today. This book will be of great interest to students of strategic history and theory, military history and IR in general.
In a time where US deployments are uncertain, this book shows how US service members can either build the necessary support to sustain their presence or create added animosity towards the military presence. The United States stands at a crossroads in international security. The backbone of its international position for the last 70 years has been the massive network of overseas military deployments. However, the US now faces pressures to limit its overseas presence and spending. In Beyond the Wire, Michael Allen, Michael Flynn, Carla Martinez Machain, and Andrew Stravers argue that the US has entered into a "Domain of Competitive Consent" where the longevity of overseas deployments relies upon the buy-in from host-state populations and what other major powers offer in security guarantees. Drawing from three years of surveys and interviews across fourteen countries, they demonstrate that a key component of building support for the US mission is the service members themselves as they interact with local community members. Highlighting both the positive contact and economic benefits that flow from military deployments and the negative interactions like crime and anti-base protests, this book shows in the most rigorous and concrete way possible how US policy on the ground shapes its ability to advance its foreign policy goals.
Many historians of U.S. foreign relations think of the post-World War II period as a time when the United States, as an anti-colonial power, advocated collective security through the United Nations and denounced territorial aggrandizement. Yet between 1945 and 1947, the United States violated its wartime rhetoric and instead sought an imperial solution to its postwar security problems in East Asia by acquiring unilateral control of the western Pacific Islands and dominating influence throughout the entire Pacific Basin. This detailed study examines American foreign policy from the beginning of the Truman Administration to the implementation of Containment in the summer and fall of 1947. As a case study of the Truman Administration's Early Cold War efforts, it explores pre-Containment policy in light of U.S. security concerns vis-a-vis the Pearl Harbor Syndrome. The American pursuit of a secure Pacific Basin was inconsistent at the time with its foreign policy toward other areas of the world. Thus, the consolidation of power in this region was an exception to the avowed goal of a multilateral response to the policies of the Soviet Union. This example of national or strategic security went much further than simple military control; it included the cultural assimilation of the indigenous population and the unilateral exclusion of all other powers. Analyzing traditional archival records in a new light, Friedman also investigates the persisting American notions of a Westward moving frontier that stretches beyond North American territorial bounds.
Arms purchases are among the most expensive, technologically challenging and politically controversial decisions made by modern-day governments. Superpower spending on weapons systems is widely analysed and discussed. But defence procurement in smaller industrial countries involves different issues which receive less attention. This volume presents a general framework for understanding smaller country defence procurement supported by country, industry and project studies. Part I provides a general framework for analysing smaller country defence procurement, focusing on the formation of national defence capabilities. The framework is then used to analyse issues around the development of procurement demand, the characteristics of defence industry supply, contracts and relationships between buyers and sellers, and government policy for defence procurement and industry development. Part II focuses on defence procurement in seven smaller industrial nations with widely varying historical and political settings (Australia, Canada, Israel, Singapore, Spain, Sweden and The Netherlands). Part III consists of two Australian case studies of the procurement issues raised in, respectively, the naval shipbuilding industry and in a major, complex defence project. The book addresses the needs of public and private sector managers, military planners, procurement specialists, industry policy-makers, and defence procurement and industry educators. It presents general principles in an accessible manner and points to real-world experience to illustrate the principles at work. Therefore it will be of interest to scholars and practitioners in defence economics, strategic procurement, public sector procurement, and defence industry policy.
The relationship between intelligence organizations and the national security policymakers which they support has its ups and downs. Sometimes the relationship is a good one; communication flows and both sides benefit from the interaction, but sometimes difficulties arise and problems develop. For example, when knowledge is required for decision but is not available or is inaccurate the outcome is frequently described as an intelligence failure. A subset of this kind of intelligence failure occurs when knowledge is distorted in order to reinforce or oppose policymaker preferences or expectations. Another less successful outcome occurs when good, accurate knowledge is not used to improve policy, but is instead set aside or ignored by those who have the responsibility and obligation to make decisions. This collection explores the difficulties that can arise in the relationship between intelligence and policy. The chapters consider both politicization of, and lack of receptiveness to, intelligence on the part of policymakers from a variety of different angles. Readers will find that this book challenges conventional wisdom and offers new ways of thinking about this important but understudied area. This book was published as a special issue of Intelligence and National Security.
Located in the center of Asia with one of the largest land frontiers in the world and 14 neighbors whose dispositions could not easily be predicted, China has long been obsessed with security. In this Handbook, an internationally renowned team of contributors provide a comprehensive and systematic analysis of contemporary thinking about Chinese national security. Chapters cover the PRC's historical, ideological and doctrinal heritage related to security, its security arrangements and policies targeting key regions and nations of the world, the security aspects of the PRC's ground, air, sea, space and cyber forces, as well as the changing and expanding definition and scope of China's security theory and practice. The Handbook is divided into three thematic parts: Part I focuses on national security, covering traditional views of security and the impact of China's historical experience on current security dispositions as well as non-traditional security. Part II looks at China's relations with the great powers, regional security and China's involvement with collective security organizations. Part III provides an overview of China's institutionalized security forces; looking at the army, navy, air force and Second Artillery (strategic nuclear forces) and offering analysis of China's recent interest in space as a security concern and cybersecurity. This volume is essential reading for all students of Asian Security, Chinese Politics and International Relations.
This book provides the first systematic comparative analysis of climate security discourses. It analyses the securitisation of climate change in four different countries: USA, Germany, Turkey, and Mexico. The empirical analysis traces how specific climate-security discourses have become dominant, which actors have driven this process, what political consequences this has had and what role the broader context has played in enabling these specific securitisations. In doing so, the book outlines a new and systematic theoretical framework that distinguishes between different referent objects of securitisation (territorial, individual and planetary) and between a security and risk dimension. It thereby clarifies the ever-increasing literature on different forms of securitisation and the relationship between security, risk and politics. Whereas securitisation studies have traditionally focused on either a single country case study or a global overview, consequently failing to reconstruct detailed securitisation dynamics, this is the first book to provide a systematic comparative analysis of climate security discourses in four countries and thus closes an empirical gap in the present literature. In addition, this comparative framework allows the drawing of conclusions about the conditions for and consequences of successful securitisation based on empirical and comparative analysis rather than theoretical debate only. This book will of interest to students of climate change, environmental studies, critical security, global governance, and IR in general.
The history of bourgeois modernity is a history of the Enemy. This book is a radical exploration of an Enemy that has recently emerged from within security documents released by the US security state: the Universal Adversary. The Universal Adversary is now central to emergency planning in general and, more specifically, to security preparations for future attacks. But an attack from who, or what? This book - the first to appear on the topic - shows how the concept of the Universal Adversary draws on several key figures in the history of ideas, said to pose a threat to state power and capital accumulation. Within the Universal Adversary there lies the problem not just of the 'terrorist' but, more generally, of the 'subversive', and what the emergency planning documents refer to as the 'disgruntled worker'. This reference reveals the conjoined power of the contemporary mobilisation of security and the defence of capital. But it also reveals much more. Taking the figure of the disgruntled worker as its starting point, the book introduces some of this worker's close cousins - figures often regarded not simply as a threat to security and capital but as nothing less than the Enemy of all Mankind: the Zombie, the Devil and the Pirate. In situating these figures of enmity within debates about security and capital, the book engages an extraordinary variety of issues that now comprise a contemporary politics of security. From crowd control to contagion, from the witch-hunt to the apocalypse, from pigs to intellectual property, this book provides a compelling analysis of the ways in which security and capital are organized against nothing less than the 'Enemies of all Mankind'.
Military capability is delivered operationally at a team and collective level, be it a unit as small as a squad or section, or as large as a maritime task group. Modern military forces are required to deal with a potentially wide range of missions frequently involving multiple alliance partners, within a geopolitical environment which can seem to change rapidly. Individual performance, while being important, is not the primary determinant of mission success - force integration, interoperability, adaptability and teamwork are key factors. Team and collective training which fully addresses these factors is fundamental to the development and delivery of military capability. As a consequence, the requirement to determine training requirements and specify effective systems for the delivery of team and collective training is critical to operational success. Training Needs Analysis (also known as Front End Analysis), is a well-established methodology for analysing training requirements and specifying training solutions used extensively by the UK and its NATO partners. However, the analytical techniques employed are optimised for individual training, with little guidance being offered on its application in the team and collective context. Team and Collective Training Needs Analysis (TCTNA) has been developed to close this methodological gap. It addresses the issues of the relationship of individual and team tasks, teamwork, command and control, task and training environments, scenario definition, instructional strategy, team training approaches, instructional functions, and wide-ranging organisational and procurement considerations. Part One of the book develops an integrated set of models which underpin the analytical approach presented in Part Two. Worked examples and case studies illustrate the application of the approach. Between 2005 and 2015 the authors worked on numerous training-related research projects at Cranfield University and Coventry University for the Human Factors Integration Defence Technology Centre and the Defence Human Capability Science and Technology Centre on behalf of the Defence Science and Technology Laboratory, UK Ministry of Defence.
Immerse yourself in the world of the Samurai with this classic text. Code of the Samurai is the 350-year-old summary of the rules and expectations embodied in Bushido--the ancient Japanese "Way of the Warrior." Written by Taira Shigesuke, a Samurai and prominent teacher of military techniques, it was published posthumously in 1834. This influential book was intended as a training manual for young Samurai, outlining personal and professional standards. This accessible and enjoyable translation is by Thomas Cleary, the foremost translator of Asian martial classics, accompanied by the powerful line drawings of master illustrator Oscar Ratti. A new foreword by Alexander Bennett, a leading expert on Samurai history, explains the lasting importance of this classic work and its place within the canon of Japanese literature.
This book offers a multifaceted, analytical account of counterterrorism argumentative speech. Traditionally, existing scholarship in this field of research has taken a selective focus on issues and actors, concentrating mainly on US state discourse after 9/11. However, this approach ignores the fact that there was counterterrorism speech before 9/11, and that there are other countries and other actors who also actively engage in the counterterrorism discursive field, both within and outside of the Western world. Addressing several thematic, chronological and methodological gaps in the current literature, Arguing Counterterrorism offers a dynamic perspective on counterterrorism argumentative speech. Over the course of the volume, the authors tackle the following key issues: first, historical and cultural continuity and change. Second, the phenomenology of counterterrorism speech: its nature, instrumentalisation, implications and interactions between the various actors involved. The third theme is the anatomy of counterterrorism speech; namely its political, cultural and linguistic constitutive elements. Employing a multi-disciplinary framework, the authors explore these issues through a geographically and historically diverse range of case studies, resulting in a book that broadens the perspective of counterterrorism argumentation analysis. This book will be of much interest to students of critical terrorism studies, counterterrorism, discourse analysis, security studies and IR.
A Choice Outstanding Academic Title for 2016 Perhaps the most basic national security question that U.S. leaders and the body politic continuously face is where and under what circumstances to consider and in some cases resort to the use of armed force to ensure the country's safety and well-being. The question is perpetual-but the answer is not. This insightful text helps students make sense of the ever-changing environment and factors that influence disagreement over national security risks and policy in the United States. The book takes shape through a focus on three considerations: strategy, policy, and issues. Snow explains the range of plans of action that are possible and resources available for achieving national security goals, as well as the courses of action for achieving those goals in the context of a broad range of security problems that must be dealt with. However, there is little agreement among policymakers on exactly what is the nature of the threats that the country faces. Snow helps readers frame the debate by suggesting some of the prior influences on risk-assessment, some of the current influences on national security debates, and suggestions for how future strategy and policy may be shaped.
This book explores the development of the military as an organization and looks at the patterns of civil-military relations that have emerged in modern Nepal, especially after the rise of King Prithvi Narayan Shah, who founded the unified state of Nepal. It combines astute analyses with up-to-date data to present a comprehensive account of the relations between monarchy, military and civil government and their impact on the democratization process in the country. The author underlines the pressing need for establishing civilian supremacy over the military, through developing and strengthening civilian supervisory mechanisms. The book will be an important resource to researchers, scholars, students of politics, military studies, peace and conflict studies, and history, particularly those concerned with Nepal. It will also interest policy-makers, security experts and military personnel.
Commanding Military Power offers a new explanation of why some armed forces are stronger than others. Ryan Grauer advances a 'command structure theory' which combines insights from organization theory, international relations, and security studies literatures to provide a unique perspective on military power. Specifically, armed forces organized to facilitate swift and accurate perception of and response to battlefield developments will cope better with war's inherent uncertainty, use resources effectively, and, quite often, win. Case studies of battles from the Russo-Japanese War, Chinese Civil War and Korean War, based on new archival research, underscore the argument, showing that even smaller and materially weaker militaries can fight effectively against and defeat larger and better endowed adversaries when they are organizationally prepared to manage uncertainty. That organization often matters more than numbers and specific tools of war has crucial implications for both contemporary and future thinking about and efforts to improve martial strength. |
You may like...
Materials, Chemicals and Energy from…
Dimitris S. Argyropoulos
Hardcover
R7,042
Discovery Miles 70 420
Crowdsourcing of Sensor Cloud Services
Azadeh Ghari Neiat, Athman Bouguettaya
Hardcover
Software Product Lines in Action - The…
Frank J. van der Linden, Klaus Schmid, …
Hardcover
R1,452
Discovery Miles 14 520
Building the e-World Ecosystem - 11th…
Tomas Skersys, Rimantas Butleris, …
Hardcover
R1,446
Discovery Miles 14 460
Semantic Web Information Management - A…
Roberto De Virgilio, Fausto Giunchiglia, …
Hardcover
R2,960
Discovery Miles 29 600
Self Organized Nanostructures of…
Axel H.E. Muller, Oleg Borisov
Hardcover
R5,165
Discovery Miles 51 650
Open Source Systems: Enterprise Software…
Ioannis Stamelos, Jesus M. Gonzalez-Barahona, …
Hardcover
R1,414
Discovery Miles 14 140
|