0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

In the Common Defense - National Security Law for Perilous Times (Paperback): James E. Baker In the Common Defense - National Security Law for Perilous Times (Paperback)
James E. Baker
R998 Discovery Miles 9 980 Ships in 10 - 15 working days

The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.

In the Common Defense - National Security Law for Perilous Times (Hardcover): James E. Baker In the Common Defense - National Security Law for Perilous Times (Hardcover)
James E. Baker
R2,809 R2,408 Discovery Miles 24 080 Save R401 (14%) Ships in 10 - 15 working days

The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.

The Centaur's Dilemma - National Security Law for the Coming AI Revolution (Paperback): James E. Baker The Centaur's Dilemma - National Security Law for the Coming AI Revolution (Paperback)
James E. Baker
R1,185 Discovery Miles 11 850 Ships in 18 - 22 working days

Assessing the legal and practical questions posed by the use of artificial intelligence in national security matters.The increasing use of artificial intelligence poses challenges and opportunities for nearly all aspects of society, including the military and other elements of the national security establishment. This book addresses how national security law can and should be applied to artificial intelligence, which enables a wide range of decisions and actions not contemplated by current law. James Baker, an expert in national security law and process, adopts a realistic approach in assessing how the law-even when not directly addressing artificial intelligence-can be used, or even misused, to regulate this new technology. His new book covers, among other topics, national security process, constitutional law, the law of armed conflict, arms control, and academic and corporate ethics. With his own background as a judge, he examines potential points of contention and litigation in an area where the law is still evolving and might not yet provide clear and certain answers. The Centaur's Dilemma also analyzes potential risks associated with the use of artificial intelligence in the realm of national security-including the challenges of machine-human interface, operating (or not operating) the national-security decision-making process at machine speed, and the perils of a technology arms race. Written in plain English, The Centaur's Dilemma will help guide policymakers, lawyers, and technology experts as they deal with the many legal questions that will arise when using artificial intelligence to plan and carry out the actions required for the nation's defense.

Contextualizing Security - A Reader (Hardcover): Kurt W Jefferson, Tobias T. Gibson Contextualizing Security - A Reader (Hardcover)
Kurt W Jefferson, Tobias T. Gibson; James McRae, Mark Boulton, James E. Baker, …
R3,352 Discovery Miles 33 520 Ships in 18 - 22 working days

Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China. CONTRIBUTORS: Amelia Ayers, James E. Baker, Roy D. Blunt, Mark Boulton, Naji Bsisu, Robert E. Burnett, Daniel Egbe, Laila Farooq, Lisa Fein, Anna Holyan, Jeh C. Johnson, Richard Ledgett, David L. McDermott, James McRae, Amanda Murdie, Bernie Sanders, Jeremy Scahill, Kristan Stoddart, Jeremy Brooke Straughn, J. R. Swanegan, and Kali Wright-Smith

Contextualizing Security - A Reader (Paperback): Kurt W Jefferson, Tobias T. Gibson Contextualizing Security - A Reader (Paperback)
Kurt W Jefferson, Tobias T. Gibson; James McRae, Mark Boulton, James E. Baker, …
R1,140 Discovery Miles 11 400 Ships in 18 - 22 working days

Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China. CONTRIBUTORS: Amelia Ayers, James E. Baker, Roy D. Blunt, Mark Boulton, Naji Bsisu, Robert E. Burnett, Daniel Egbe, Laila Farooq, Lisa Fein, Anna Holyan, Jeh C. Johnson, Richard Ledgett, David L. McDermott, James McRae, Amanda Murdie, Bernie Sanders, Jeremy Scahill, Kristan Stoddart, Jeremy Brooke Straughn, J. R. Swanegan, and Kali Wright-Smith

Regulating Covert Action (Paperback): W. Michael Reisman, James E. Baker Regulating Covert Action (Paperback)
W. Michael Reisman, James E. Baker
R1,002 Discovery Miles 10 020 Ships in 18 - 22 working days

Covert activity has always been a significant element of international politics. When it has served their interests, governments have secretly disseminated propaganda in other countries, manipulated foreign economies, and abetted coups against their adversaries. What are the circumstances, if any, in which it is lawful, under international law or United States law, to resort to covert action either directly or through local proxies? When is it right to do so?   This book is the first to assess the lawfulness of covert action under United States and international law and to face candidly the implications for democratic states that covert operations pose. Michael Reisman and James E. Baker identify different types of covert actions, discussing a variety of cases that include the Trujillo assassination in 1961, the Rainbow Warrior in 1985, and the raid on Libya in 1986. After explaining the complex operations of the international legal system, they explore trends in decision making and the conditions that accounted for them—whether the covert operations were proactive, defensive, or reactive. They examine in detail the procedures followed in the United States to authorize and oversee covert activity and propose guidelines for political leaders who may contemplate using covert techniques. An appendix reviews twenty years of allegations of covert aggression brought to the attention of the United Nations Security Council.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Poetic Conventions as Cognitive Fossils
Reuven Tsur Hardcover R3,284 Discovery Miles 32 840
Structural Synthesis of Parallel Robots…
Grigore Gogu Hardcover R4,170 Discovery Miles 41 700
A Brief History Of Time - From Big Bang…
Stephen Hawking Paperback  (4)
R313 R284 Discovery Miles 2 840
Power Electronics and Motor Drive…
Stefanos Manias Paperback R3,731 Discovery Miles 37 310
Study of Travelling Interplanetary…
M.A. Shea, D.F. Smart, … Hardcover R5,389 Discovery Miles 53 890
Vera the Virus
Tamar Golan O'brien Hardcover R590 Discovery Miles 5 900
Get Untamed: The Journal - How To Quit…
Glennon Doyle Hardcover  (1)
R376 Discovery Miles 3 760
Astronomy - A Visual Guide
Dk Hardcover R771 R677 Discovery Miles 6 770
More than Meets the Eye - What Blindness…
Georgina Kleege Hardcover R3,269 Discovery Miles 32 690
The Bok Who Lost His Spring
Marleen Lammers Paperback R190 R176 Discovery Miles 1 760

 

Partners