![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
When does the legitimate application of military technology to the problem of national defence become needlessly provocative? What obstacles must developing countries overcome if they hope to use military technology effectively? And when might military technology itself become a cause of conflict? Eric Arnett addresses these questions in the context of four particularly important Asian states - China, India, Pakistan, and Iran - from the perspectives of regional specialists and experts in technology and military affairs. The resulting analyses demonstrate the link between military technology and conflict, which is more palpable in southern Asia than elsewhere, while suggesting that it must be approached in a more nuanced way than has been the case so far in discussions of the region.
During the Allied victory celebrations there were few who chose to raise a glass to the staff. The high cost of casualties endured by the British army tarnished the reputation of the military planners, which has yet to recover. This book examines the work and development of the staff of the British army during the First World War and its critical role in the military leadership team. Their effectiveness was germane to the outcome of events in the front line but not enough consideration has been paid to this level of command and control, which has largely been overshadowed by the debate over generalship. This has painted an incomplete picture of the command function. Characterised as arrogant, remote and out of touch with the realities of the front line, the staff have been held responsible for the mismanagement of the war effort and profligate loss of lives in futile offensives. This book takes a different view. By using their letters and diaries it reveals fresh insights into their experience of the war. It shows that the staff made frequent visits to the front line and were no strangers to combat or hostile fire. Their work is also compared with their counterparts in the French and German armies, highlighting differences in practice and approach. In so doing, this study throws new light upon the characteristics, careers and working lives of these officers, investigating the ways in which they both embraced and resisted change. This offers evidence both for those who wish to exonerate the British command system on the basis of the learning process but also for those critical of its performance, thus advancing understanding of British military history in the First World War.
This book examines India's naval strategy within the context of Asian regional security. Amidst the intensifying geopolitical contestation in the waters of Asia, this book investigates the growing strategic salience of the Indian Navy. Delhi's expanding economic and military strength has generated a widespread debate on India's prospects for shaping the balance of power in Asia. This volume provides much needed texture to the abstract debate on India's rise by focusing on the changing nature of India's maritime orientation, the recent evolution of its naval strategy, and its emerging defence diplomacy. In tracing the drift of the Navy from the margins of Delhi's national security consciousness to a central position, analysing the tension between its maritime possibilities and the continentalist mind set, and in examining the gap between the growing external demands for its security contributions and internal ambivalence, this volume offers rare insights into India's strategic direction at a critical moment in the nation's evolution. By examining the internal and external dimensions of the Indian naval future, both of which are in dynamic flux, the essays here help a deeper understanding of India's changing international possibilities and its impact on Asian and global security. This book will be of much interest to students of naval strategy, Asian politics, security studies and IR, in general.
Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.
The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.
This book investigates how states in both the West and Asia have responded to multi-dimensional security challenges since the end of the Cold War, focusing on military transformation. Looking at a cross-section of different countries, this volume assesses how their armed forces have responded to a changing international security context. The book investigates two main themes. First, how the process of military 'transformation'- in terms of technological advances and new ways of conducting warfare - has impacted on the militaries of various countries. These technologies are hugely expensive and the extent to which different states can afford them, and the ability of these states to utilise these technologies, differs greatly. Second, the volume investigates the social dimensions of military transformation. It reveals the expanding breadth of tasks that contemporary armed forces have been required to address. This includes the need for military forces to work with other actors, such as non-governmental agencies and humanitarian organisations, and the ability of armed forces to fight asymmetric opponents and conduct post-conflict reconstruction tasks. The conflicts in Iraq and Afghanistan exemplified how important the relationship between technological and social transformation has become. This book will be of much interest to students of strategic studies, military innovation, Asian politics, security studies and International Relations.
For half a century Adelphi Papers have been the archetype of an international security monograph. Drawn from the Greek word for 'brother', Adelphi Papers had their debut during the height of the Cold War and were intended as a vehicle to form an international network of specialists advancing understanding in international and strategic studies. Although one volume cannot possibly do justice to the depth and insight provided by more than 400 monographs published over the past five decades, it can provide the reader an understanding of the evolution of strategic thinking during that period. These papers are important because of the intellectual contribution they made at the time; but they are equally important because of their enduring value in shedding light even on today's security challenges.
With the rise of religiously motivated violence and terrorism, governments around the world need to develop their religious and ideological capabilities in parallel with strengthening their law enforcement, military and intelligence capabilities. Terrorist Rehabilitation: A New Frontier in Counter-terrorism aims to provide an understanding of the importance of the approach and strategy of terrorist rehabilitation in countering this threat.Comprising of nine chapters, this book provides case study assessments of terrorist rehabilitation practices set against the backdrop of their unique operational and geopolitical milieu in countries such as Saudi Arabia, Singapore, Indonesia and Sri Lanka. This will help the reader to form a foundational understanding of the concept of terrorist rehabilitation by combining the insights, successes and experience of senior government officials and counter-terrorism experts. In addition, the contributors provide discussions on religious concepts that have been manipulated by violent Islamists as a background to understanding religiously or ideologically motivated terrorism and the avenues open for countering it.
In the interwar period, Red Army commanders headed by Tukhachevskii developed a new doctrine of mobile warfare and "deep operations". The military requirements of armaments and industrial production in the event of war was a central parameter in Stalinist industrialization. Based on recently opened Russian archives, the book analyzes military dimensions of Soviet long term economic and military reconstruction plans from the mid 1920s until 1941. It presents a new framework for estimating the Soviet war economic preparations, drastically underestimated by contemporaries.
Are the relationships that the United States forged with North and Central Europe during the Cold War still viable today? As the North Atlantic Treaty Organization (NATO) declines and the European Security and Defense Policy (ESDP) emerges, can the United States and Europe bridge the transatlantic fissures that opened when the United States prepared to go to war with Iraq? In a post-9/11 world, North and Central Europe have had to adapt their national security policies and rethink their relationship with the United States. In an in-depth look at the security policies of the states in North and Central Europe, Andrew Michta highlights how historical legacies, regional geostrategic constraints, and individual capabilities have shaped their response to the new environment. Michta raises the broad question of whether traditional alliances and NATO are still viable ways to deal with new security concerns. The two key questions that arise from this discussion are to what extent NATO still matters to the United States, beyond its political utility, and whether the European Union as a whole can become a partner for the United States in a new security environment. The Limits of Alliance argues that, although NATO will continue to exist in the coming decade, the hollowing-out of the alliance will be accompanied by a shift in transatlantic security relations toward bilateralism determined by regional security considerations.
The human dimension of the Conference on Security and Co-operation in Europe (CSCE) implies an alternative vision of security and co-operation in Europe, based on respect for human rights, democracy, the rule of law, minority rights and human contacts. Until recently the human dimension has been the main claim to perpetuity of the CSCE. It has been through the years the main point of controversy among its participating states, and has played an important role in the revolutionary events of 1989 which transformed Europe.
The South Asian security complex refers to security interdependencies between the states in the region, and also includes the effect that powerful external actors, such as China, the US and Russia, and geopolitical interests have on regional dynamics. This book focuses on the national securities of a number of South Asian countries in order to discuss a range of issues related to South Asian security. The book makes a distinction between traditional and non-traditional security. While state-centric approaches such as bilateral relations between India and Pakistan are considered to be traditional realist approaches to security, the promotion of economic, environmental and human security reflect global concerns, liberal theories and cosmopolitan values. The book goes beyond traditional security issues to reflect the changing security agenda in South Asia in the twenty-first century, and is a useful contribution to studies on South Asian Politics and Security Studies.
In the globalized Arctic there has been a transformation from military security to human security. Climate change, the utilization of Arctic resources and other global challenges have caused the Arctic 'paradox' and a need to redefine security.
Since World War II, military intervention in developing world internal conflicts (DWIC) has become the primary form of U.S. military activity, and these interventions have proven unsuccessful in places like Vietnam, Iraq, and Afghanistan. This book argues such failure was entirely predictable, even inevitable, due both to the nature and dynamics of foreign military intrusion in the affairs of other countries and especially the DWICs that provide the major contemporary form of potential U.S. military in the foreseeable future. Basing its analysis in both human nature (the adverse reaction to prolonged outsider intrusion) and historical analogy, the book argues strongly why military intervention should be avoided as a national security option and the implications of such a policy decision for national security strategy and policy.
This book conducts a comprehensive study on China's maritime strategy. It discusses the lessons of maritime power history that must be learnt by Chinese today, the relations between China's maritime strategy and domestic developing problems of China, the status and influence of maritime strategy from China's overall development strategy perspective, and the geopolitical targets of Chinese navy in 2050.China's maritime strategy is one of the most important academic and realistic subjects in the present and future. This book is the first book to discuss China's maritime strategy comprehensively in and outside China. It will give readers a better sense of why China has to develop its sea power, why it lays so much emphasis on Taiwan and the South China sea, why the country can make friends with India but not Japan, and why China's maritime strategy will never challenge America but has to face the pressure from America's maritime hegemony, and so on.
Since World War II, military intervention in developing world internal conflicts (DWIC) has become the primary form of U.S. military activity, and these interventions have proven unsuccessful in places like Vietnam, Iraq, and Afghanistan. This book argues such failure was entirely predictable, even inevitable, due both to the nature and dynamics of foreign military intrusion in the affairs of other countries and especially the DWICs that provide the major contemporary form of potential U.S. military in the foreseeable future. Basing its analysis in both human nature (the adverse reaction to prolonged outsider intrusion) and historical analogy, the book argues strongly why military intervention should be avoided as a national security option and the implications of such a policy decision for national security strategy and policy.
A Choice Outstanding Academic Title for 2016 Perhaps the most basic national security question that U.S. leaders and the body politic continuously face is where and under what circumstances to consider and in some cases resort to the use of armed force to ensure the country's safety and well-being. The question is perpetual-but the answer is not. This insightful text helps students make sense of the ever-changing environment and factors that influence disagreement over national security risks and policy in the United States. The book takes shape through a focus on three considerations: strategy, policy, and issues. Snow explains the range of plans of action that are possible and resources available for achieving national security goals, as well as the courses of action for achieving those goals in the context of a broad range of security problems that must be dealt with. However, there is little agreement among policymakers on exactly what is the nature of the threats that the country faces. Snow helps readers frame the debate by suggesting some of the prior influences on risk-assessment, some of the current influences on national security debates, and suggestions for how future strategy and policy may be shaped.
The region encompassing Afghanistan and Pakistan (Af/Pak region) is undergoing a fundamental strategic change. This book analyses the nature of this strategic change, in ordre to seek possible future scenarios and to examine policy options. It also undertakes a critical review of the basic elements of the Western strategic approach towards dealing with regional conflicts in all parts of the world, with special emphasis on the Af/Pak region. Dealing with the political developments i one of the most volatile regions in the world - Afghanistan and Pakistan - the volume focuses on Western strategic concerns. The withdrawal of ISAF by 2014 will change the overall political setting and the work addresses the challenges that will result for Western policymakers thereafter. It examines the cases of Afghanistan and Pakistan separately, and also looks at the broader region and tries to identify different outcomes. This book will be of much interest to students of Central and South Asian politics, strategic studies, foreign policy and security studies generally.
Despite the substantial output of revisionist scholarship over the last decade reappraising the performance of the British Army on the Western Front during the First World War, there still remains a stubborn perception that its commanders were incompetent, inflexible and unimaginative. Whilst much ink has been spilled vilifying or defending individual commanders, or looking for overarching trends and 'learning curves', this is the first work to examine systematically the vertical nature of command - that is the transmission of plans from the high-command down through the rank structure to the front line. Through such an investigation, a much more rounded measure of the effectiveness of British commanders can be gained; one moves the argument beyond the overly simplistic 'casualties to ground gained' equation that is usually offered. The Battle of Fromelles (19-20 July 1916) was selected as the case study as it was relatively small in scale, in the right period, and retains sufficient primary sources available to sustain the analysis. It also witnessed the first time Australian forces were used in offensive operations on the Western Front, and thus looms large in wider Commonwealth perceptions of 'Bumbling British Generals'. The book follows the progress of the battle plan from its inception in the strategic designs of the supreme commander down through the various intermediate level commands at operational and tactical headquarters until it became the orders that sent the infantry forward into the attack. In so doing it provides a unique insight into the strengths and weaknesses of British command structure, allowing a much more scholarly judgement of its overall effectiveness.
This is the most comprehensive bibliography to date on the vast English-language literature covering the myriad aspects of peace and security issues in the East Asia/Pacific region. McClean contacted 150 key research institutions and publishers around the world for information about the most significant books, articles, dissertations, and official documents on international and intra-state security, arms control, conflict-avoiding diplomacy, and militarization in the area. He has selectively annotated 12,645 cross-referenced entries and organized them into 27 sub-regional and country chapters including two particularly extensive chapters on Japan and China and two further chapters on relations between Australia, New Zealand, and the United States, and on U.S. and Soviet policy.
How have US economic defence policies promoted its security since 1933? US Policies of Economic Warfare, 1933-1991 concentrates on an important and neglected facet of America's fight for survival in the latter half of the twentieth century. It explains how US policy-makers crafted and used instruments of economic statecraft against states that posed vital threats to the survival of the USA. This study situates economic defence policy within the broad context of US foreign policy and explores its response to the totalitarianism of the 1930s, the Second World War and the complex strategic and political developments of the Cold War.
The origins of the First World War remain one of the greatest twentieth century historical controversies. In this debate the role of military planning in particular and of militarism in general, are a key focus of attention. Did the military wrest control from the civilians? Were the leaders of Europe eager for a conflict? What military commitments were made between the various alliance blocks? These questions are examined in detail here in eleven essays by distinguished historians and the editor's introduction provides a focus and draws out the comparative approach to the history of military policies and war plans of the great powers.
Web Programming for Business: PHP Object-Oriented Programming with Oracle focuses on fundamental PHP coding, giving students practical, enduring skills to solve data and technical problems in business. Using Oracle as the backend database, the book is version-neutral, teaching students code that will still work even with changes to PHP and Oracle. The code is clean, clearly explained and solutions-oriented, allowing students to understand how technologies such as XML, RSS or AJAX can be leveraged in business applications. The book is fully illustrated with examples, and includes chapters on:
Powerpoint slides, applied exam questions, and the raw code for all examples are available on a companion website. This book offers an innovative approach that allows anyone with basic SQL and HTML skills to learn PHP object-oriented programming. |
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Nature-Inspired Algorithms for Big Data…
Hema Banati, Shikha Mehta, …
Hardcover
R5,642
Discovery Miles 56 420
Advanced Metaheuristic Methods in Big…
Hadj Ahmed Bouarara, Reda Mohamed Hamou, …
Hardcover
R5,079
Discovery Miles 50 790
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, …
Paperback
|