![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Weapons & equipment > General
Proliferation poses a broad range of threats to the United States, as well as to our allies and coalition partners. Intercontinental missiles armed with weapons of mass destruction are one of these threats, and it has become obvious that rogue nations such as Iran and North Korea may be acquiring the capability to build such missiles as well as the ability to arm them with nuclear or lethal biological weapons. While such threats are now only potential ones, these shifts in technological and manufacturing capability mean that these rogue nations may be able to pose serious dangers to the American homeland, possibly as early as during the next five years. Cordesman argues that an effective defense against these threats will require linking an effective national missile defense program to an ambitious counterproliferation strategy, a strengthened homeland defense program, and a realistic approach to arms control and national security options. Cordesman argues that these threats may create a near- to mid-term need for national missile defense (NMD), widely discussed during the Clinton Administration and which seems to be emerging as a priority for the Bush Administration. This work analyzes the options available to the United States and how they relate to the delicate balance of deterrence in the post-Cold War era. As the debate on NMD escalates, this work could not be more timely.
Small arms and light artillery are the primary weapons of most armed conflicts. International responses have been shaped by the view that they are abundantly available and easily accessible to all on a global illicit market. This book argues that the arming of conflict is complexly structured and highly dynamic. It uncovers and describes the construction and interaction of structures and dynamics at global and regional levels, which shape the arming patterns of both state and non-state actors.
To capture the defense reform debate surrounding the proper application of high technology in military systems, this study focuses on tactical aircraft, an area epitomizing cutting-edge technology. Air combat history is revisited (including the 1991 Persian Gulf War) to confirm, reject, or qualify positions advocating certain technologies in tactical aviation. Emphasis is placed on enduring combat ideas and aircraft design principles. The interaction between mission requirements, inventory composition, and aircraft design is discussed to illustrate the dynamics of constrained choice that enters acquisition decisions. The relevance of reform arguments in the post-Cold War era is assessed, including the impact of political and economic constraints on future force-mix options, the shift from NATO-centered contingencies to Third World Low Intensity Conflict (LIC), and the threat of conventional arms proliferation.
The events of September 11th, 2001 altered the course of arms
control intended to eliminate weapons of mass destruction (WMD) and
made the role of international disarmament organizations
controversial. Whether they can effectively verify compliance with
the WMD treaty regime has been questioned by the United States. The
study examines this by looking at the management of the three
existing verification organizations--the International Atomic
Energy Agency, the Comprehensive Test Ban Treaty Organization and
the Organization for the Prohibition of Chemical Weapons--and draws
conclusions for a future institution on biological weapons. It
presents the IAEA verification system for nuclear weapons as a
model for evaluating the systems for chemical and biological
weapons. The importance of the IAEA's role has been recognized by
the 2005 Nobel Peace Prize.
Detection of Bulk Explosives: Advanced Techniques against Terrorism contains reviews of: existing and emerging bulk explosives detection techniques; scientific and technical policy of the Federal Border Service of the Russian Federation; challenges in application and evaluation of EDS systems for aviation security; multi-sensor approach to explosives detection. There are also reports devoted to the following individual explosive detection techniques: X-ray systems in airports; neutron in, gamma out techniques; neutron and gamma backscattering; nuclear quadruple resonance, including remote NQR; sub-surface radars; microwave scanners; laser-induced burst spectroscopy (LIBS); acoustic sensors; nonlinear location (NUD); systems for localization and destruction of explosive objects.
Having evolved over the past two and a quarter centuries to become the premier military force in the world, the U.S. Army has a heritage rich in history and tradition. This historical dictionary provides short, clear, authoritative entries on a broad cross section of military terms, concepts, arms and equipment, units and organizations, campaigns and battles, and people who have had a significant impact on Army. It includes over 900 entries written by some 100 scholars, providing a valuable resource for the interested reader, student, and researcher. For those interested in pursuing specific subjects further, the book provides sources at the end of each entry as well as a general bibliography. Appendixes provide a useful list of abbreviations and acronyms and a listing of ranks and grades in the U.S. Army.
In 1997, the International Campaign to Ban Landmines (ICBL) coordinated the Convention on the Prohibition of the Use, Stockpiling, Production, and Transfer of Anti-Personnel Mines and on their Destruction. As of mid-2005, 145 states had signed the agreement. The ICBL's efforts were in large part a response to the careless use of landmines in the previous fifty years. The history of mine use in warfare, however, goes back much further than the World Wars of the 20th century and includes both land and sea use. This first comprehensive study traces the technical, tactical, and ethical developments of mine warfare, from ancient times to the present. Beginning with mine warfare's roots in ancient Assyria and China, Youngblood takes the reader through the centuries of debate about how these hidden weapons should be used. A look at 19th-century developments explores the intertwined development of land and sea mines and the inventors behind them, including Robert Fulton, Samuel Colt, and Immanuel Nobel, father of Alfred Nobel. Subsequent chapters examine the use of mines in the American Civil War, the Russo-Japanese War, both World Wars, and the battlefields of the Cold War, and chart key battles and technical innovations, such as the development of air-delivered munitions. Finally, the author addresses the ethical concerns raised by the careless mining, namely the impact on civilians and the difficulties of de-mining, and the treaties that regulate landmine use.
From 1863 to the present--the company and the men who made it successful, the details of all models of rifles and the many other Marlin products.
The human factors profession is currently attempting to take a more proactive role in the design of man-machine systems than has been character istic of its past. Realizing that human engineering contributions are needed well before the experimental evaluation of prototypes or operational systems, there is a concerted effort to develop tools that predict how humans will interact with proposed designs. This volume provides an over view of one category of such tools: mathematical models of human performance. It represents a collection of invited papers from a 1988 NATO Workshop. The Workshop was conceived and organized by NATO Research Study Group 9 (RSG.9) on "Modelling of Human Operator Behaviour in Weapon Systems." It represented the culmination of over five years of effort, and was attended by 139 persons from Europe, Canada, and the United States. RSG.9 was established in 1982 by Panel 8 of the Defence Research Group to accomplish the following objectives: * Determine the utility and state of the art of human performance modelling. * Encourage international research and the exchange of ideas. * Foster the practical application of modelling research. * Provide a bridge between the models and approaches adopted by engineers and behavioral scientists. * Present the findings in an international symposium."
Whether in international military interventions or routine policing activities the use of force raises a host of questions about appropriateness, necessity and proportionality. Recently attention has focused on the possibility of so-called non-lethal weapons to provide greater legitimacy to the use of force by minimizing injury.
Engineers learn the latest electronic warfare (EW) techniques and technologies related to on-board military platforms with this authoritative resource. Practitioners gain expert design guidance on technologies and equipment used to detect and identify emitter threats, giving them an advantage in the never-ending chess game between sensor guided weapons and EW systems. This unique book offers deeper insight into EW systems principles of operation and their mathematical descriptions, arming professionals with better knowledge for their specific design applications. Moreover, readers get practical information on how to counter modern communications data links which provide connectivity and command flow among the armed forces in the battlefield. Taking a sufficiently broad perspective, this comprehensive volume offers a panoramic view of the various physical domains - RF, Infrared, and electronics - that are present in modern electronic warfare systems.
This book examines emerging defense technologies such as directed energy weapons, nanotech devices, and bioscience applications that have the potential to dominate international relations in the future, just as nuclear weapons and space infrastructure-assisted conventional weapons do now. Emerging Military Technologies: A Guide to the Issues examines the potential of the United States to bring new technologies to deployment in the service of America's security and defense. The work also discusses how other international actors may regard the United States' investment in these high-tech capabilities, identifying possible resultant counter actions, and presents several divergent viewpoints on what the future may bring. The book thoroughly explores three general categories of emerging technologies: autonomous computers, nanotechnology and biotechnology, and the interrelated topics of directed energy weapons and ubiquitous space access. Security studies expert Wilson W.S. Wong balances coverage of today's cutting-edge science and engineering with treatment of real-world concerns of effectiveness, military ethics, and international relations in the 21st century. An invaluable resource for members of the military and intelligence communities, this book also provides general readers with an accessible introduction to these highly technical topics.
Recent nuclear tests in India and Pakistan make it clear that the US can no longer continue a policy of "benign neglect" toward India. This book engages the key issues for nonproliferation and foreign policy that affect Indo-American relations. It addresses under-explored areas such as missile control and space cooperation, chemical and biological weapons, and the use of sanctions versus incentives. This book goes beyond historical analysis to offer practical recommendations for policymakers in both countries.
Knowledge is the basic output of the defense technology
establishment in the United States; it is what enables the
development of weapon systems. From this premise, this volume
explores the process of knowledge production in defense technology
from the beginnings of the Cold War to the present time. Produced
through the process of research and development (R&D),
technical knowledge for defense is an economic commodity. It is
"fundable" in the sense of having future value. Like other
commodities in the futures market, it is purchased before it is
produced. But unlike those other commodities, this knowledge is
typically produced through the joint efforts of the customer and
the vendor.
The Truman administration's decision to embark on an arms build-up in 1950 was a critical event. For the first time other than a World War, the United States became a global military presence. Unlike the World Wars, in this instance the deployment lasted decades, altering the nature of the Cold War and the United States' global role. Such a decision deserves a book dedicated to understanding the strategy and politics behind it. The Beginnings of the Cold War Arms Race serves that purpose. The Beginnings of the Cold War Arms Race reviews the state of American military affairs in the late 1940s and describes the role of atomic power in American strategy. It also outlines the factional fighting within the Truman administration over military spending and deployments and considers the Truman administration's perceptions of Soviet military power and intentions. The author presents a fascinating account of the strategy and politics behind the Truman administration's decision to engage in a massive arms build-up that initiated the Cold War arms race.
"How the War Was Won" describes the major role played by the
British Expeditionary Force on the Western Front in defeating the
German army. In particular, the book explains the methods used in
fighting the last year of the war, and raises questions as to
whether mechanical warfare could have been more widely used.
Perhaps no one in history has played the role of scientist as celebrity with as much skill--and as much deception--as Wernher von Braun. America's leading rocket expert and most enthusiastic advocate of space travel, he had a closet full of secrets that would have shocked his colleagues and millions of admirers if they had been told during his lifetime. "Wernher von Braun: The Man Who Sold the Moon" is the first critical biography of the young German aristocrat who created Hitler's most advanced terror weapon, the V-2 rocket, and who came to the U.S. under the Army's Project Paperclip to develop missiles as a central weapon of the Cold War. The book reveals that factions of the U.S. Army, in their zeal to have von Braun's team of scientists working for American interests, covered up what they knew about his complicity in Nazi causes and abetted him in the perpetuation of the myth he carefully created about his past. Declassified Army documents and war crime transcripts, as well as the discovery of Europe of Dora concentration camp survivors' accounts, and von Braun's published writings and personal papers, have enabled biographer Dennis Piszkiewicz to document von Braun's career more fully than any previous historian. The man who tirelessly promoted space travel, worked with NASA to collaborate with Walt Disney creating television programs and the Tomorrowland section of Disneyland, and put the first astronauts on the moon, was actually a member of the Nazi party, held a rank in the SS equivalent to that of Major, and was an accomplice in the use of slave labor from the Dora concentration camp to produce his V-2 rocket. When the Third Reich collapsed, von Braun unashamedly switched his allegiance to the victor, and adroitly distanced himself from his Nazi partners. By going on to promote NASA and sell the American people on his dreams of space exploration, he became the man who sold the moon--a man who began his brilliant career by selling his soul to the Nazis.
This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach. It also tackles the CBRNE-Cyber threats, their risk mitigation measures and the relevance of raising awareness and education enforcing a CBRNE-Cy security culture. The authors present international instruments and legislation to deal with these threats, for instance the UNSCR1540. The authors address a multitude of stakeholders, and have a multidisciplinary nature dealing with cross-cutting areas like the convergence of biological and chemical, the development of edging technologies, and in the cyber domain, the impelling risks due to the use of malwares against critical subsystems of CBRN facilities. Examples are provided in this book. Academicians, diplomats, technicians and engineers working in the chemical, biological, radiological, nuclear, explosive and cyber fields will find this book valuable as a reference. Students studying in these related fields will also find this book useful as a reference.
|
You may like...
Armors of God - Understanding the Use
John King Hill, Evette Young
Paperback
R601
Discovery Miles 6 010
The Dreyse Military Needle-Ignition…
Leonard Alston-Roberts-West
Paperback
R1,554
Discovery Miles 15 540
The Needle-Ignition System of the Modele…
Guy A-R-West, Leonard A-R-West
Paperback
R1,534
Discovery Miles 15 340
|