|
Showing 1 - 14 of
14 matches in All Departments
The hidden story of a little-known but transformative period in the
formation of England as a nation. The Viking Great Army that swept
through England between AD 865 and 878 altered the course of
British history. Since the late 8th century, Viking raids on the
British Isles had been a regular feature of life, but the winter of
865 saw a fundamental shift that would change the political,
economic and social landscape forever. Instead of making quick
smash-and-grab summer raids for silver and slaves, Vikings now
remained in England for the winter and became immersed in its
communities. Some settled permanently, acquiring land and forming a
new hybrid Anglo-Scandinavian culture. The Viking army was here to
stay. Its presence was a catalyst for new towns and new industries,
while transformations in power politics would ultimately see the
rise of King Alfred the Great and make Wessex the pre-eminent
kingdom of Anglo-Saxon England. Drawing on the most up-to-date
discoveries and the latest scientific techniques, the authors'
recent research at the Viking Great Army's winter camp at Torksey
in Lincolnshire has revolutionized what we know about its size,
activities and social makeup, as has the wealth of newly recovered
evidence from metal-detectorists. Unfolding like a great detective
story, this account traces the movements of the Great Army across
the country, piecing together a new picture of Viking Age England
in unprecedented detail, from swords, coins, jewelry and the
burials of great warriors to the everyday objects that ordinary
farmers and craftsmen discarded. It is the definitive story of a
vital period in British history.
Intelligence agencies spend huge sums of money to collect and
analyze vast quantities of national security data for their
political leaders. How well is this intelligence analyzed, how
often is it acted on by policymakers, and does it have a positive
or negative effect on decision making? Drawing on declassified
documents, interviews with intelligence veterans and policymakers,
and other sources, The Image of the Enemy breaks new ground as it
examines how seven countries analyzed and used intelligence to
shape their understanding of their main adversary. The cases in the
book include the Soviet Union's analysis of the United States (and
vice versa), East Germany's analysis of West Germany (and vice
versa), British intelligence in the early years of the Troubles in
Northern Ireland, Israeli intelligence about the Palestinians,
Pakistani intelligence on India, and US intelligence about Islamist
terrorists. These rivalries provide rich case studies for scholars
and offer today's analysts and policymakers the opportunity to
closely evaluate past successes and failures in intelligence
analysis and the best ways to give information support to
policymakers. Using these lessons from the past, they can move
forward to improve analysis of current adversaries and future
threats.
Intelligence agencies spend huge sums of money to collect and
analyze vast quantities of national security data for their
political leaders. How well is this intelligence analyzed, how
often is it acted on by policymakers, and does it have a positive
or negative effect on decision making? Drawing on declassified
documents, interviews with intelligence veterans and policymakers,
and other sources, The Image of the Enemy breaks new ground as it
examines how seven countries analyzed and used intelligence to
shape their understanding of their main adversary. The cases in the
book include the Soviet Union's analysis of the United States (and
vice versa), East Germany's analysis of West Germany (and vice
versa), British intelligence in the early years of the Troubles in
Northern Ireland, Israeli intelligence about the Palestinians,
Pakistani intelligence on India, and US intelligence about Islamist
terrorists. These rivalries provide rich case studies for scholars
and offer today's analysts and policymakers the opportunity to
closely evaluate past successes and failures in intelligence
analysis and the best ways to give information support to
policymakers. Using these lessons from the past, they can move
forward to improve analysis of current adversaries and future
threats.
This book provides a detailed application of identity theory to
contemporary questions of extremism, radicalization and security.
The analysis considers how identity forms a central aspect of
notions of extremism and security in Western societies, as
articulated both by political leaders, the media and the
government. It also takes a close and critical look at
counter-extremism policy in contemporary Western society. With its
detailed and empirical approach to these questions, this book is an
accessible and invaluable resource for academics, practitioners,
policy-makers and general readers keen to establish a deeper
understanding of the key societal security threats of the day.
This book provides a detailed application of identity theory to
contemporary questions of extremism, radicalization and security.
The analysis considers how identity forms a central aspect of
notions of extremism and security in Western societies, as
articulated both by political leaders, the media and the
government. It also takes a close and critical look at
counter-extremism policy in contemporary Western society. With its
detailed and empirical approach to these questions, this book is an
accessible and invaluable resource for academics, practitioners,
policy-makers and general readers keen to establish a deeper
understanding of the key societal security threats of the day.
A Guide to National Security offers an analysis of the threats and
policy responses facing the UK, presented within the framework of
the Government's National Security Strategy and the Strategic
Defence and Security Review. It explores the processes and
developments which have shaped the transformation of national
security over the last three decades, and critically examines the
processes of politicisation and securitisation that have delivered
the new strategic vision.
Presented in three parts, the book has taken one of the key
recommendations from the National Security Strategy - collaboration
between police and national security agencies - and used this as
both the viewpoint from which to assess the current state of play
regarding the UK's national security, as well as the approach to
identifying future threats and creating policies and tactics to
deal with them. Part One: Threats sets the scene for the current
status of national security in the UK and relates this to the rest
of the world, before moving on to the myriad of possible threats
facing governments and intelligence services, from organised crime
and terrorism to cyber-threats and failed states. Part Two:
Responses looks at the interaction between governments and other
agencies in response to a threat, how that framework functions and
is organized, as well as the action or response taken. Finally,
Part Three: Strategies offers a range of considerations for the
future, including making a case for military restructuring,
discussing domestic policies regarding radicalisation and other
internal security issues, and the building of partnerships with the
EU and the rest of the world, as well as within current
international organizations, such as the UN and NATO. Throughout,
the book presents opinions from leading figures across the
agencies, including the National Security Council and members of
ACPO, as well as case studies and suggestions for further
investigation.
This book provides a number of fascinating and critical points for
those interested in the UK's own national security organization,
from those working in intelligence, counter-terrorism and organised
crime within the police, staff within the national intelligence
agencies, and policy advisers and officials. However, the
contemporary era of globalisation means that it also has resonances
for anyone involved in such issues across the Western world and
beyond.
Four new stories from the First Doctor's era: 1. E is For... by
Julian Richards. All is not right on the planet Malkus. Every day
more and more monstrosities are born; people with powers and
abilities far beyond those of normal men and women. They call these
people "the Gifted." And Susan has become one of them. Separated
from her friends in a Police State dedicated to hunting people like
her, Susan finds herself in a prison which has destroyed countless
lives. And at its centre, at its heart, waiting, is the most
dangerous monster of all... 2. The Crumbling Magician by Guy Adams.
The TARDIS has crashed, its passengers in a bad way. The Doctor,
not in the best of health anyway, his old body wearing somewhat
thin, is in a coma, Ben unconscious. As for Polly, she's been
affected worst of all. Time is running in the wrong order for her
and she's seen the future, a future in which she's mortally
wounded. But will Continuity allow her to die? 3. The Vardan
Invasion of Earth by Paul Morris and Ian Atkins. The Doctor and
Steven think they've arrived in London 1956, but the TARDIS
disagrees. When both the Doctor and his craft are lost, it's down
to Steven to solve a mystery that holds his fate in its grasp. With
the help of comic Teddy Baxter, Steven's going to have to find a
way into Television. 4. The Crumbling Magician by Guy Adams The
TARDIS has crashed, its passengers in a bad way. The Doctor - not
in the best of health anyway, his old body wearing somewhat thin -
is in a coma, Ben unconscious. As for Polly, she's been affected
worst of all. Time is running in the wrong order for her and she's
seen the future, a future in which she's mortally wounded. But will
Continuity allow her to die? CAST: Carole Ann Ford (Susan /
Narrator), Mark Edel-Hunt (Virgil Winters), Anneke Wills (Polly
Wright / Narrator), Elliot Chapman (Ben Jackson), David Warner
(Allie), Maureen O'Brien (Vicki / Narrator), Peter Purves (Steven
Taylor / The Doctor / Narrator), Lisa Bowerman (Colonel Maria
Rage), Stephen Critchlow (Teddy Baxter / Michael Hart), Clive
Hayward (The Judge / Markus).
The 1989 conference at York has resulted in a voluntary 34 papers.
The first ten are on CRM topics, chiefly the maintenance of SMRs;
then there are nine papers on surface and solid modelling and image
enhancement, (patterning of distributions, image processing,
rectification of air photos and the like); then seven papers
illustrating statistical methods of data analysis and
interpretation; three papers describe recording systems, four
expert systems and artefact classification, and one on the teaching
value of Hypercard. The production of the volume illustrates some
of the latest methods of text and graphics handling.
On 11 September 2001, the Al Qaeda-sponsored attacks in New York
and Washington DC marked a turning point in global security. The
worldwide impact demonstrated not only that no country is an
island, but also raised questions about the way the intelligence
community gather its data, analyzed it, and disseminated it up to
the policymakers. Some of these questions concerned the very
tradecraft of intelligence - the process of analysis itself. This
book deconstructs the profession of intelligence analysis in the
contemporary, globalized world, and asks: is it an art, a science,
or both?
The availability of data and information to support intelligence
analysis is now much greater than ever before, and used properly,
this material can assist hugely in the fight against terrorism.
This book takes a practical look at intelligence analysis and
offers a synthesis of the key issues affecting this area and the
context within which it is taught and understood. The main
cognitive processes affecting analysis and interpretation, such as
memory, hindsight, perception, bias, hypothesizing and evaluating
data, are explained in the context of the intelligence machinery
and environment, and the book explores ways in which pitfalls can
be mitigated. There is also discussion about the external pressures
and influences on intelligence analysis, such as politics, ethics
and civil liberties, cultural factors, and the changing nature of
security threats and their impact on the intelligence process.
In its analysis, the book provides an objective view of
intelligence success as well as failure, and will be of interest to
police and security intelligence trainers and analysts, police
counter-intelligence units, and those involved in the study of
policing, intelligence and counter-terrorism.
This is a reproduction of a book published before 1923. This book
may have occasional imperfections such as missing or blurred pages,
poor pictures, errant marks, etc. that were either part of the
original artifact, or were introduced by the scanning process. We
believe this work is culturally important, and despite the
imperfections, have elected to bring it back into print as part of
our continuing commitment to the preservation of printed works
worldwide. We appreciate your understanding of the imperfections in
the preservation process, and hope you enjoy this valuable book.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
Not available
|