0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

In the Common Defense - National Security Law for Perilous Times (Hardcover): James E. Baker In the Common Defense - National Security Law for Perilous Times (Hardcover)
James E. Baker
R2,348 R1,527 Discovery Miles 15 270 Save R821 (35%) Ships in 12 - 17 working days

The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.

The Centaur's Dilemma - National Security Law for the Coming AI Revolution (Paperback): James E. Baker The Centaur's Dilemma - National Security Law for the Coming AI Revolution (Paperback)
James E. Baker
R872 Discovery Miles 8 720 Ships in 12 - 17 working days

Assessing the legal and practical questions posed by the use of artificial intelligence in national security matters.The increasing use of artificial intelligence poses challenges and opportunities for nearly all aspects of society, including the military and other elements of the national security establishment. This book addresses how national security law can and should be applied to artificial intelligence, which enables a wide range of decisions and actions not contemplated by current law. James Baker, an expert in national security law and process, adopts a realistic approach in assessing how the law-even when not directly addressing artificial intelligence-can be used, or even misused, to regulate this new technology. His new book covers, among other topics, national security process, constitutional law, the law of armed conflict, arms control, and academic and corporate ethics. With his own background as a judge, he examines potential points of contention and litigation in an area where the law is still evolving and might not yet provide clear and certain answers. The Centaur's Dilemma also analyzes potential risks associated with the use of artificial intelligence in the realm of national security-including the challenges of machine-human interface, operating (or not operating) the national-security decision-making process at machine speed, and the perils of a technology arms race. Written in plain English, The Centaur's Dilemma will help guide policymakers, lawyers, and technology experts as they deal with the many legal questions that will arise when using artificial intelligence to plan and carry out the actions required for the nation's defense.

In the Common Defense - National Security Law for Perilous Times (Paperback): James E. Baker In the Common Defense - National Security Law for Perilous Times (Paperback)
James E. Baker
R968 Discovery Miles 9 680 Ships in 12 - 17 working days

The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.

Contextualizing Security - A Reader (Paperback): Kurt W Jefferson, Tobias T. Gibson Contextualizing Security - A Reader (Paperback)
Kurt W Jefferson, Tobias T. Gibson; James McRae, Mark Boulton, James E. Baker, …
R1,137 Discovery Miles 11 370 Ships in 10 - 15 working days

Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China. CONTRIBUTORS: Amelia Ayers, James E. Baker, Roy D. Blunt, Mark Boulton, Naji Bsisu, Robert E. Burnett, Daniel Egbe, Laila Farooq, Lisa Fein, Anna Holyan, Jeh C. Johnson, Richard Ledgett, David L. McDermott, James McRae, Amanda Murdie, Bernie Sanders, Jeremy Scahill, Kristan Stoddart, Jeremy Brooke Straughn, J. R. Swanegan, and Kali Wright-Smith

Contextualizing Security - A Reader (Hardcover): Kurt W Jefferson, Tobias T. Gibson Contextualizing Security - A Reader (Hardcover)
Kurt W Jefferson, Tobias T. Gibson; James McRae, Mark Boulton, James E. Baker, …
R3,369 Discovery Miles 33 690 Ships in 10 - 15 working days

Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China. CONTRIBUTORS: Amelia Ayers, James E. Baker, Roy D. Blunt, Mark Boulton, Naji Bsisu, Robert E. Burnett, Daniel Egbe, Laila Farooq, Lisa Fein, Anna Holyan, Jeh C. Johnson, Richard Ledgett, David L. McDermott, James McRae, Amanda Murdie, Bernie Sanders, Jeremy Scahill, Kristan Stoddart, Jeremy Brooke Straughn, J. R. Swanegan, and Kali Wright-Smith

Regulating Covert Action (Paperback): W. Michael Reisman, James E. Baker Regulating Covert Action (Paperback)
W. Michael Reisman, James E. Baker
R1,038 Discovery Miles 10 380 Ships in 10 - 15 working days

Covert activity has always been a significant element of international politics. When it has served their interests, governments have secretly disseminated propaganda in other countries, manipulated foreign economies, and abetted coups against their adversaries. What are the circumstances, if any, in which it is lawful, under international law or United States law, to resort to covert action either directly or through local proxies? When is it right to do so?   This book is the first to assess the lawfulness of covert action under United States and international law and to face candidly the implications for democratic states that covert operations pose. Michael Reisman and James E. Baker identify different types of covert actions, discussing a variety of cases that include the Trujillo assassination in 1961, the Rainbow Warrior in 1985, and the raid on Libya in 1986. After explaining the complex operations of the international legal system, they explore trends in decision making and the conditions that accounted for them—whether the covert operations were proactive, defensive, or reactive. They examine in detail the procedures followed in the United States to authorize and oversee covert activity and propose guidelines for political leaders who may contemplate using covert techniques. An appendix reviews twenty years of allegations of covert aggression brought to the attention of the United Nations Security Council.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
- (Subtract)
Ed Sheeran CD R165 R74 Discovery Miles 740
Playseat Evolution Racing Chair (Black)
 (3)
R8,999 Discovery Miles 89 990
The Jungle Book 2 (Disney)
Haley Joel Osment, John Goodman, … Blu-ray disc  (1)
R91 Discovery Miles 910
John C. Maxwell Undated Planner
Paperback R423 R297 Discovery Miles 2 970
CyberPulse Gaming Chair
R3,999 R3,278 Discovery Miles 32 780
HP 330 Wireless Keyboard and Mouse Combo
R800 R450 Discovery Miles 4 500
Elecstor 12V 9A LIFEPO4 Battery 3000…
R1,294 R851 Discovery Miles 8 510
Rogz Indoor 3D Pod Dog Bed (Petrol/Grey…
R1,740 R709 Discovery Miles 7 090
Docking Edition Multi-Functional…
R899 R399 Discovery Miles 3 990
Bloedbroers - Na die slagveld van…
Deon Lamprecht Paperback R290 R195 Discovery Miles 1 950

 

Partners