0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

In the Common Defense - National Security Law for Perilous Times (Hardcover): James E. Baker In the Common Defense - National Security Law for Perilous Times (Hardcover)
James E. Baker
R2,292 Discovery Miles 22 920 Ships in 12 - 17 working days

The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.

The Centaur's Dilemma - National Security Law for the Coming AI Revolution (Paperback): James E. Baker The Centaur's Dilemma - National Security Law for the Coming AI Revolution (Paperback)
James E. Baker
R853 Discovery Miles 8 530 Ships in 12 - 17 working days

Assessing the legal and practical questions posed by the use of artificial intelligence in national security matters.The increasing use of artificial intelligence poses challenges and opportunities for nearly all aspects of society, including the military and other elements of the national security establishment. This book addresses how national security law can and should be applied to artificial intelligence, which enables a wide range of decisions and actions not contemplated by current law. James Baker, an expert in national security law and process, adopts a realistic approach in assessing how the law-even when not directly addressing artificial intelligence-can be used, or even misused, to regulate this new technology. His new book covers, among other topics, national security process, constitutional law, the law of armed conflict, arms control, and academic and corporate ethics. With his own background as a judge, he examines potential points of contention and litigation in an area where the law is still evolving and might not yet provide clear and certain answers. The Centaur's Dilemma also analyzes potential risks associated with the use of artificial intelligence in the realm of national security-including the challenges of machine-human interface, operating (or not operating) the national-security decision-making process at machine speed, and the perils of a technology arms race. Written in plain English, The Centaur's Dilemma will help guide policymakers, lawyers, and technology experts as they deal with the many legal questions that will arise when using artificial intelligence to plan and carry out the actions required for the nation's defense.

In the Common Defense - National Security Law for Perilous Times (Paperback): James E. Baker In the Common Defense - National Security Law for Perilous Times (Paperback)
James E. Baker
R946 Discovery Miles 9 460 Ships in 12 - 17 working days

The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.

Contextualizing Security - A Reader (Paperback): Kurt W Jefferson, Tobias T. Gibson Contextualizing Security - A Reader (Paperback)
Kurt W Jefferson, Tobias T. Gibson; James McRae, Mark Boulton, James E. Baker, …
R1,137 Discovery Miles 11 370 Ships in 10 - 15 working days

Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China. CONTRIBUTORS: Amelia Ayers, James E. Baker, Roy D. Blunt, Mark Boulton, Naji Bsisu, Robert E. Burnett, Daniel Egbe, Laila Farooq, Lisa Fein, Anna Holyan, Jeh C. Johnson, Richard Ledgett, David L. McDermott, James McRae, Amanda Murdie, Bernie Sanders, Jeremy Scahill, Kristan Stoddart, Jeremy Brooke Straughn, J. R. Swanegan, and Kali Wright-Smith

Contextualizing Security - A Reader (Hardcover): Kurt W Jefferson, Tobias T. Gibson Contextualizing Security - A Reader (Hardcover)
Kurt W Jefferson, Tobias T. Gibson; James McRae, Mark Boulton, James E. Baker, …
R3,369 Discovery Miles 33 690 Ships in 10 - 15 working days

Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China. CONTRIBUTORS: Amelia Ayers, James E. Baker, Roy D. Blunt, Mark Boulton, Naji Bsisu, Robert E. Burnett, Daniel Egbe, Laila Farooq, Lisa Fein, Anna Holyan, Jeh C. Johnson, Richard Ledgett, David L. McDermott, James McRae, Amanda Murdie, Bernie Sanders, Jeremy Scahill, Kristan Stoddart, Jeremy Brooke Straughn, J. R. Swanegan, and Kali Wright-Smith

Regulating Covert Action (Paperback): W. Michael Reisman, James E. Baker Regulating Covert Action (Paperback)
W. Michael Reisman, James E. Baker
R1,038 Discovery Miles 10 380 Ships in 10 - 15 working days

Covert activity has always been a significant element of international politics. When it has served their interests, governments have secretly disseminated propaganda in other countries, manipulated foreign economies, and abetted coups against their adversaries. What are the circumstances, if any, in which it is lawful, under international law or United States law, to resort to covert action either directly or through local proxies? When is it right to do so?   This book is the first to assess the lawfulness of covert action under United States and international law and to face candidly the implications for democratic states that covert operations pose. Michael Reisman and James E. Baker identify different types of covert actions, discussing a variety of cases that include the Trujillo assassination in 1961, the Rainbow Warrior in 1985, and the raid on Libya in 1986. After explaining the complex operations of the international legal system, they explore trends in decision making and the conditions that accounted for them—whether the covert operations were proactive, defensive, or reactive. They examine in detail the procedures followed in the United States to authorize and oversee covert activity and propose guidelines for political leaders who may contemplate using covert techniques. An appendix reviews twenty years of allegations of covert aggression brought to the attention of the United Nations Security Council.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Future Past
Duran Duran CD R187 R88 Discovery Miles 880
Nintendo Joy-Con Neon Controller Pair…
R1,899 R1,729 Discovery Miles 17 290
Mousepad with Gel Wrist Support
R70 Discovery Miles 700
And So I Roar
Abi Dare Paperback R415 R289 Discovery Miles 2 890
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
The Garden Within - Where the War with…
Anita Phillips Paperback R329 R239 Discovery Miles 2 390
Minions 2 - The Rise Of Gru
DVD R133 Discovery Miles 1 330
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, … Blu-ray disc  (1)
R131 R91 Discovery Miles 910
Bostik Glu Tape
R38 Discovery Miles 380
Cadac 47cm Paella Pan
R1,215 Discovery Miles 12 150

 

Partners