![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
This book examines India's naval strategy within the context of Asian regional security. Amidst the intensifying geopolitical contestation in the waters of Asia, this book investigates the growing strategic salience of the Indian Navy. Delhi's expanding economic and military strength has generated a widespread debate on India's prospects for shaping the balance of power in Asia. This volume provides much needed texture to the abstract debate on India's rise by focusing on the changing nature of India's maritime orientation, the recent evolution of its naval strategy, and its emerging defence diplomacy. In tracing the drift of the Navy from the margins of Delhi's national security consciousness to a central position, analysing the tension between its maritime possibilities and the continentalist mind set, and in examining the gap between the growing external demands for its security contributions and internal ambivalence, this volume offers rare insights into India's strategic direction at a critical moment in the nation's evolution. By examining the internal and external dimensions of the Indian naval future, both of which are in dynamic flux, the essays here help a deeper understanding of India's changing international possibilities and its impact on Asian and global security. This book will be of much interest to students of naval strategy, Asian politics, security studies and IR, in general.
Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.
The later seventeenth and eighteenth centuries have been acclaimed as the classic period of artillery fortification. This was an era when fortresses and fortress systems shaped the calculations of strategists and statesmen, and often dictated the course of campaigns. The age was one of almost constant conflict and this book, originally published in 1985, explores the influence of the fortress in the dynastic wars of Bourbon, Habsburg and Hohenzollern, the contest for influence in the Baltic, the last crusades of the West against the Turks, and in the peculiar conditions of colonial campaigning and the War of the American Independence.
This book investigates how states in both the West and Asia have responded to multi-dimensional security challenges since the end of the Cold War, focusing on military transformation. Looking at a cross-section of different countries, this volume assesses how their armed forces have responded to a changing international security context. The book investigates two main themes. First, how the process of military 'transformation'- in terms of technological advances and new ways of conducting warfare - has impacted on the militaries of various countries. These technologies are hugely expensive and the extent to which different states can afford them, and the ability of these states to utilise these technologies, differs greatly. Second, the volume investigates the social dimensions of military transformation. It reveals the expanding breadth of tasks that contemporary armed forces have been required to address. This includes the need for military forces to work with other actors, such as non-governmental agencies and humanitarian organisations, and the ability of armed forces to fight asymmetric opponents and conduct post-conflict reconstruction tasks. The conflicts in Iraq and Afghanistan exemplified how important the relationship between technological and social transformation has become. This book will be of much interest to students of strategic studies, military innovation, Asian politics, security studies and International Relations.
For half a century Adelphi Papers have been the archetype of an international security monograph. Drawn from the Greek word for 'brother', Adelphi Papers had their debut during the height of the Cold War and were intended as a vehicle to form an international network of specialists advancing understanding in international and strategic studies. Although one volume cannot possibly do justice to the depth and insight provided by more than 400 monographs published over the past five decades, it can provide the reader an understanding of the evolution of strategic thinking during that period. These papers are important because of the intellectual contribution they made at the time; but they are equally important because of their enduring value in shedding light even on today's security challenges.
With the rise of religiously motivated violence and terrorism, governments around the world need to develop their religious and ideological capabilities in parallel with strengthening their law enforcement, military and intelligence capabilities. Terrorist Rehabilitation: A New Frontier in Counter-terrorism aims to provide an understanding of the importance of the approach and strategy of terrorist rehabilitation in countering this threat.Comprising of nine chapters, this book provides case study assessments of terrorist rehabilitation practices set against the backdrop of their unique operational and geopolitical milieu in countries such as Saudi Arabia, Singapore, Indonesia and Sri Lanka. This will help the reader to form a foundational understanding of the concept of terrorist rehabilitation by combining the insights, successes and experience of senior government officials and counter-terrorism experts. In addition, the contributors provide discussions on religious concepts that have been manipulated by violent Islamists as a background to understanding religiously or ideologically motivated terrorism and the avenues open for countering it.
Are the relationships that the United States forged with North and Central Europe during the Cold War still viable today? As the North Atlantic Treaty Organization (NATO) declines and the European Security and Defense Policy (ESDP) emerges, can the United States and Europe bridge the transatlantic fissures that opened when the United States prepared to go to war with Iraq? In a post-9/11 world, North and Central Europe have had to adapt their national security policies and rethink their relationship with the United States. In an in-depth look at the security policies of the states in North and Central Europe, Andrew Michta highlights how historical legacies, regional geostrategic constraints, and individual capabilities have shaped their response to the new environment. Michta raises the broad question of whether traditional alliances and NATO are still viable ways to deal with new security concerns. The two key questions that arise from this discussion are to what extent NATO still matters to the United States, beyond its political utility, and whether the European Union as a whole can become a partner for the United States in a new security environment. The Limits of Alliance argues that, although NATO will continue to exist in the coming decade, the hollowing-out of the alliance will be accompanied by a shift in transatlantic security relations toward bilateralism determined by regional security considerations.
The South Asian security complex refers to security interdependencies between the states in the region, and also includes the effect that powerful external actors, such as China, the US and Russia, and geopolitical interests have on regional dynamics. This book focuses on the national securities of a number of South Asian countries in order to discuss a range of issues related to South Asian security. The book makes a distinction between traditional and non-traditional security. While state-centric approaches such as bilateral relations between India and Pakistan are considered to be traditional realist approaches to security, the promotion of economic, environmental and human security reflect global concerns, liberal theories and cosmopolitan values. The book goes beyond traditional security issues to reflect the changing security agenda in South Asia in the twenty-first century, and is a useful contribution to studies on South Asian Politics and Security Studies.
The human dimension of the Conference on Security and Co-operation in Europe (CSCE) implies an alternative vision of security and co-operation in Europe, based on respect for human rights, democracy, the rule of law, minority rights and human contacts. Until recently the human dimension has been the main claim to perpetuity of the CSCE. It has been through the years the main point of controversy among its participating states, and has played an important role in the revolutionary events of 1989 which transformed Europe.
Since World War II, military intervention in developing world internal conflicts (DWIC) has become the primary form of U.S. military activity, and these interventions have proven unsuccessful in places like Vietnam, Iraq, and Afghanistan. This book argues such failure was entirely predictable, even inevitable, due both to the nature and dynamics of foreign military intrusion in the affairs of other countries and especially the DWICs that provide the major contemporary form of potential U.S. military in the foreseeable future. Basing its analysis in both human nature (the adverse reaction to prolonged outsider intrusion) and historical analogy, the book argues strongly why military intervention should be avoided as a national security option and the implications of such a policy decision for national security strategy and policy.
This book conducts a comprehensive study on China's maritime strategy. It discusses the lessons of maritime power history that must be learnt by Chinese today, the relations between China's maritime strategy and domestic developing problems of China, the status and influence of maritime strategy from China's overall development strategy perspective, and the geopolitical targets of Chinese navy in 2050.China's maritime strategy is one of the most important academic and realistic subjects in the present and future. This book is the first book to discuss China's maritime strategy comprehensively in and outside China. It will give readers a better sense of why China has to develop its sea power, why it lays so much emphasis on Taiwan and the South China sea, why the country can make friends with India but not Japan, and why China's maritime strategy will never challenge America but has to face the pressure from America's maritime hegemony, and so on.
A Choice Outstanding Academic Title for 2016 Perhaps the most basic national security question that U.S. leaders and the body politic continuously face is where and under what circumstances to consider and in some cases resort to the use of armed force to ensure the country's safety and well-being. The question is perpetual-but the answer is not. This insightful text helps students make sense of the ever-changing environment and factors that influence disagreement over national security risks and policy in the United States. The book takes shape through a focus on three considerations: strategy, policy, and issues. Snow explains the range of plans of action that are possible and resources available for achieving national security goals, as well as the courses of action for achieving those goals in the context of a broad range of security problems that must be dealt with. However, there is little agreement among policymakers on exactly what is the nature of the threats that the country faces. Snow helps readers frame the debate by suggesting some of the prior influences on risk-assessment, some of the current influences on national security debates, and suggestions for how future strategy and policy may be shaped.
Since World War II, military intervention in developing world internal conflicts (DWIC) has become the primary form of U.S. military activity, and these interventions have proven unsuccessful in places like Vietnam, Iraq, and Afghanistan. This book argues such failure was entirely predictable, even inevitable, due both to the nature and dynamics of foreign military intrusion in the affairs of other countries and especially the DWICs that provide the major contemporary form of potential U.S. military in the foreseeable future. Basing its analysis in both human nature (the adverse reaction to prolonged outsider intrusion) and historical analogy, the book argues strongly why military intervention should be avoided as a national security option and the implications of such a policy decision for national security strategy and policy.
The region encompassing Afghanistan and Pakistan (Af/Pak region) is undergoing a fundamental strategic change. This book analyses the nature of this strategic change, in ordre to seek possible future scenarios and to examine policy options. It also undertakes a critical review of the basic elements of the Western strategic approach towards dealing with regional conflicts in all parts of the world, with special emphasis on the Af/Pak region. Dealing with the political developments i one of the most volatile regions in the world - Afghanistan and Pakistan - the volume focuses on Western strategic concerns. The withdrawal of ISAF by 2014 will change the overall political setting and the work addresses the challenges that will result for Western policymakers thereafter. It examines the cases of Afghanistan and Pakistan separately, and also looks at the broader region and tries to identify different outcomes. This book will be of much interest to students of Central and South Asian politics, strategic studies, foreign policy and security studies generally.
In the interwar period, Red Army commanders headed by Tukhachevskii developed a new doctrine of mobile warfare and "deep operations". The military requirements of armaments and industrial production in the event of war was a central parameter in Stalinist industrialization. Based on recently opened Russian archives, the book analyzes military dimensions of Soviet long term economic and military reconstruction plans from the mid 1920s until 1941. It presents a new framework for estimating the Soviet war economic preparations, drastically underestimated by contemporaries.
Despite the substantial output of revisionist scholarship over the last decade reappraising the performance of the British Army on the Western Front during the First World War, there still remains a stubborn perception that its commanders were incompetent, inflexible and unimaginative. Whilst much ink has been spilled vilifying or defending individual commanders, or looking for overarching trends and 'learning curves', this is the first work to examine systematically the vertical nature of command - that is the transmission of plans from the high-command down through the rank structure to the front line. Through such an investigation, a much more rounded measure of the effectiveness of British commanders can be gained; one moves the argument beyond the overly simplistic 'casualties to ground gained' equation that is usually offered. The Battle of Fromelles (19-20 July 1916) was selected as the case study as it was relatively small in scale, in the right period, and retains sufficient primary sources available to sustain the analysis. It also witnessed the first time Australian forces were used in offensive operations on the Western Front, and thus looms large in wider Commonwealth perceptions of 'Bumbling British Generals'. The book follows the progress of the battle plan from its inception in the strategic designs of the supreme commander down through the various intermediate level commands at operational and tactical headquarters until it became the orders that sent the infantry forward into the attack. In so doing it provides a unique insight into the strengths and weaknesses of British command structure, allowing a much more scholarly judgement of its overall effectiveness.
This is the most comprehensive bibliography to date on the vast English-language literature covering the myriad aspects of peace and security issues in the East Asia/Pacific region. McClean contacted 150 key research institutions and publishers around the world for information about the most significant books, articles, dissertations, and official documents on international and intra-state security, arms control, conflict-avoiding diplomacy, and militarization in the area. He has selectively annotated 12,645 cross-referenced entries and organized them into 27 sub-regional and country chapters including two particularly extensive chapters on Japan and China and two further chapters on relations between Australia, New Zealand, and the United States, and on U.S. and Soviet policy.
How have US economic defence policies promoted its security since 1933? US Policies of Economic Warfare, 1933-1991 concentrates on an important and neglected facet of America's fight for survival in the latter half of the twentieth century. It explains how US policy-makers crafted and used instruments of economic statecraft against states that posed vital threats to the survival of the USA. This study situates economic defence policy within the broad context of US foreign policy and explores its response to the totalitarianism of the 1930s, the Second World War and the complex strategic and political developments of the Cold War.
The origins of the First World War remain one of the greatest twentieth century historical controversies. In this debate the role of military planning in particular and of militarism in general, are a key focus of attention. Did the military wrest control from the civilians? Were the leaders of Europe eager for a conflict? What military commitments were made between the various alliance blocks? These questions are examined in detail here in eleven essays by distinguished historians and the editor's introduction provides a focus and draws out the comparative approach to the history of military policies and war plans of the great powers.
Web Programming for Business: PHP Object-Oriented Programming with Oracle focuses on fundamental PHP coding, giving students practical, enduring skills to solve data and technical problems in business. Using Oracle as the backend database, the book is version-neutral, teaching students code that will still work even with changes to PHP and Oracle. The code is clean, clearly explained and solutions-oriented, allowing students to understand how technologies such as XML, RSS or AJAX can be leveraged in business applications. The book is fully illustrated with examples, and includes chapters on:
Powerpoint slides, applied exam questions, and the raw code for all examples are available on a companion website. This book offers an innovative approach that allows anyone with basic SQL and HTML skills to learn PHP object-oriented programming.
In an age of mass camera surveillance people in the UK have become the most watched, catalogued and categorised people in the western world, all with little public debate or opposition. Nor has there been much more critical research that understands CCTV within the broader social relations out of which it has grown and consolidated. The aim of this book is to analyse the use of CCTV within this broader social, political and ideological context, focusing on relations between surveillance, power and social order, using Liverpool as a case study. At the same time the book provides a study of social control in Liverpool city centre, exploring the development of, and meaning attributed to, social control practices by those at the centre of the implementation and management of these practices. As such the book is a study of the 'locally powerful', their organisation through the local state, and their perceptions of order and disorder in the city centre. Liverpool's CCTV network is thus seen as emblematic of the developments in social control which the book explores. The book makes a key contribution to theoretical debates around social control in four respects: it places the analysis of CCTV within an understanding of the social relations in which the technology emerged; it analyses CCTV as a normative tool of social control and not merely as a piece of crime prevention technology; it considers how social scientists and criminologists think about and understand social control in the contemporary setting; and finally it seeks to draw lessons from the Liverpool case study and considers their applicability to the study of CCTV more generally.
In The Tank Debate, John Stone highlights the equivocal position
that armour has traditionally occupied in Anglo-American thought,
and explains why - despite frequent predictions to the contrary -
the tank has remained an important instrument of war. This book
provides a timely and provocative study of the tank's developmental
history, against the changing background of Anglo-American military
thought.
Why has U.S. security policy scarcely changed from the Bush to the Obama administrations? The theory of "double government" posed by the 19th century English scholar Walter Bagehot suggests a disquieting answer that is extensively discussed in National Security and Double Government. Michael J. Glennon challenges the myth that U.S. security policy is made through the visible, "Madisonian institutions"-the President, Congress, and the courts, proposing that their roles are largely illusory. Presidential control is nominal, congressional oversight is dysfunctional, and judicial review is negligible. He argues that security policy is really made by the managers of the military, intelligence, diplomatic, and law enforcement agencies- a concealed "Trumanite network" of several hundred members who are responsible for protecting the nation, and who are primarily immune from constitutional restraints. As such, this new system of "double government" will not correct itself, as to do so would require those branches to exercise the very power that they lack. Glennon suggests that the main problem is political ignorance, which is becoming more acute as public influence on security policy declines. This book aims to inform and enlighten the reader about the Trumanite network, and highlight the restraints on the Constitution, which operates primarily upon the hollowed-out Madisonian institutions, and poses a grave threat to democratic accountability. |
You may like...
The Book of Military Strategy - Sun…
Sun Tzu, Niccolo Machiavelli, …
Hardcover
R1,317
Discovery Miles 13 170
Sustainable Security - Rethinking…
Jeremi Suri, Benjamin Valentino
Hardcover
R3,762
Discovery Miles 37 620
|