![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 6 of 6 matches in All Departments
One of the prevailing issues regarding security to North America and more pointedly, the United States, gravitates on the topic of cyber threats confronting this nation. These threats are becoming more disruptive and destructive and many nations' infrastructure is vulnerable to them. This book makes use of a qualitative research methodology looking at a conventional understanding of the four instruments of power that include diplomacy, information, military and economic (D.I.M.E.) efforts through the use of the York Intelligence Red Team Model-Cyber (Modified) and seeing how adversaries are using them against the United States. Moreover, this project uses secondary data and makes use of the Federal Secondary Data Case Study Triangulation Model to ensure a balance of sources to dissect the problem.
This book builds on the six years of hands-on experience that the author had while working in the North Atlantic Treaty Organization. It provides an overview and history of NATO, looks at the political and military components of the Alliance, as well as the military command from the perspective of real-world contemporary NATO operations and planning. The author also looks at the military training, lessons, and exercise components and how it prepares forces to support upcoming NATO Response Force (NRF) rotations to ensure that NATO is a viable threat deterrent and responsive organization to both Article 5 and non-Article 5 operations. This book will serve as a primer into the world's longest enduring Alliance and one that has made an impact on real world operations over the last 20 years in Europe (Bosnia and Kosovo), Africa (Libya), Asia (Afghanistan and Pakistan), and the Middle East (Iraq).
This study turned the tables on a conventional understanding of the four instruments of national power (diplomacy, information, military and economic measures/D.I.M.E.) to see how potential adversaries could use these against the national security interests of Canada and the United States. Moreover, this particular work focuses on qualitative research regarding cyber threats that have continually beleaguered these nations by malevolent actors mostly over the last five years. This study also affords consideration to how nefarious individuals, non-state actors, or nation states can implement the instruments of national power through the application of a new model named the York Intelligence Red Team Model-Cyber (YIRTM-C) using sources guided by the Federal Qualitative Secondary Data Case Study Triangulation Model to arrive at results.
This book analyzes intelligence relations in an unsecure world and provides contributions on intelligence processes, interstate intelligence relations and hybrid warfare. Tactical, operational and strategic intelligence relations, both within and between intelligence agencies, and between states, are essential to support decision makers. This book ties together how intelligence adapts to security changes, global power shifts and the trend from globalization to a more nationalistic approach. During such changes, there is a need to analyze intelligence sharing relationships. Bringing together practitioners and academics, the book presents a plurality of approaches relative to intelligence relations that seek to advance the debate in the field.
Threats to peace and stability are real and will likely continue into the foreseeable future. Likewise, globalization and its proliferation has made it increasingly difficult in knowing whether one is a friend or foe. This is particularly true when turning to the relationship of the five permanent members of the United Nations Security Council (UNSC); the relationships are not as clear as was the case two decades ago. Intelligence professionals the world over would be remiss in their assessments if they fail to take into account the position of each in the context of contemporary issues. Countries can be aligned on one issue and yet diametrically opposed on others. This research looks to enhance what Ernest Boyer refers to as scholarship of integration and uses the Federal Qualitative Secondary Data Case Study Triangulation Model and a variation of a model referred to as the York Intelligence Red Team Model-Modified (YIRTM-M) to conduct the analysis. More pointedly, this book looks at issues from the U.S. perspective to see how the YIRTM-M can be applied to advance its own interests on the world stage and to better understand when each can be seen as a friend or foe.
This book analyzes intelligence relations in an unsecure world and provides contributions on intelligence processes, interstate intelligence relations and hybrid warfare. Tactical, operational and strategic intelligence relations, both within and between intelligence agencies, and between states, are essential to support decision makers. This book ties together how intelligence adapts to security changes, global power shifts and the trend from globalization to a more nationalistic approach. During such changes, there is a need to analyze intelligence sharing relationships. Bringing together practitioners and academics, the book presents a plurality of approaches relative to intelligence relations that seek to advance the debate in the field.
|
You may like...
The Climbing Bible - Technical, physical…
Martin MobrĂ¥ten, Stian Christophersen
Paperback
(1)R741 Discovery Miles 7 410
Lakeland Mountain Challenges - A Guide…
Ronald Turnbull, Roy Edward Clayton
Paperback
R276
Discovery Miles 2 760
The Life Of Horace Benedict De Saussure
Douglas W. Freshfield
Hardcover
R1,327
Discovery Miles 13 270
|