![]() |
![]() |
Your cart is empty |
||
Showing 1 - 14 of 14 matches in All Departments
The hidden story of a little-known but transformative period in the formation of England as a nation. The Viking Great Army that swept through England between AD 865 and 878 altered the course of British history. Since the late 8th century, Viking raids on the British Isles had been a regular feature of life, but the winter of 865 saw a fundamental shift that would change the political, economic and social landscape forever. Instead of making quick smash-and-grab summer raids for silver and slaves, Vikings now remained in England for the winter and became immersed in its communities. Some settled permanently, acquiring land and forming a new hybrid Anglo-Scandinavian culture. The Viking army was here to stay. Its presence was a catalyst for new towns and new industries, while transformations in power politics would ultimately see the rise of King Alfred the Great and make Wessex the pre-eminent kingdom of Anglo-Saxon England. Drawing on the most up-to-date discoveries and the latest scientific techniques, the authors' recent research at the Viking Great Army's winter camp at Torksey in Lincolnshire has revolutionized what we know about its size, activities and social makeup, as has the wealth of newly recovered evidence from metal-detectorists. Unfolding like a great detective story, this account traces the movements of the Great Army across the country, piecing together a new picture of Viking Age England in unprecedented detail, from swords, coins, jewelry and the burials of great warriors to the everyday objects that ordinary farmers and craftsmen discarded. It is the definitive story of a vital period in British history.
A Guide to National Security offers an analysis of the threats and
policy responses facing the UK, presented within the framework of
the Government's National Security Strategy and the Strategic
Defence and Security Review. It explores the processes and
developments which have shaped the transformation of national
security over the last three decades, and critically examines the
processes of politicisation and securitisation that have delivered
the new strategic vision.
Stonehenge is the world's most famous pre-historic monument and, since the middle of the 19th century, probably the most photographed. Using images from English Heritage's unique photgraphic archive (the National Monuments Record), Stonehenge: A History in Photographs charts the last 150 years in the life of this extraordinary and iconic site. These largely unseen images touch on various moments in Stonehenge's history, from the leiusrely tourism in the last years of Victoria's reign to the monument of today, a site visited each year by more than one million people from all over the world. This book is a celebration of Stonehenge, in fascinating and often very human images. The text is written by archaeologist and television presenter Julian Richards, someone with a genuine love of Stonehenge. This is a book for all who share a fascination with this magical monument.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
This book provides a detailed application of identity theory to contemporary questions of extremism, radicalization and security. The analysis considers how identity forms a central aspect of notions of extremism and security in Western societies, as articulated both by political leaders, the media and the government. It also takes a close and critical look at counter-extremism policy in contemporary Western society. With its detailed and empirical approach to these questions, this book is an accessible and invaluable resource for academics, practitioners, policy-makers and general readers keen to establish a deeper understanding of the key societal security threats of the day.
This book provides a detailed application of identity theory to contemporary questions of extremism, radicalization and security. The analysis considers how identity forms a central aspect of notions of extremism and security in Western societies, as articulated both by political leaders, the media and the government. It also takes a close and critical look at counter-extremism policy in contemporary Western society. With its detailed and empirical approach to these questions, this book is an accessible and invaluable resource for academics, practitioners, policy-makers and general readers keen to establish a deeper understanding of the key societal security threats of the day.
Four new stories from the First Doctor's era: 1. E is For... by Julian Richards. All is not right on the planet Malkus. Every day more and more monstrosities are born; people with powers and abilities far beyond those of normal men and women. They call these people "the Gifted." And Susan has become one of them. Separated from her friends in a Police State dedicated to hunting people like her, Susan finds herself in a prison which has destroyed countless lives. And at its centre, at its heart, waiting, is the most dangerous monster of all... 2. The Crumbling Magician by Guy Adams. The TARDIS has crashed, its passengers in a bad way. The Doctor, not in the best of health anyway, his old body wearing somewhat thin, is in a coma, Ben unconscious. As for Polly, she's been affected worst of all. Time is running in the wrong order for her and she's seen the future, a future in which she's mortally wounded. But will Continuity allow her to die? 3. The Vardan Invasion of Earth by Paul Morris and Ian Atkins. The Doctor and Steven think they've arrived in London 1956, but the TARDIS disagrees. When both the Doctor and his craft are lost, it's down to Steven to solve a mystery that holds his fate in its grasp. With the help of comic Teddy Baxter, Steven's going to have to find a way into Television. 4. The Crumbling Magician by Guy Adams The TARDIS has crashed, its passengers in a bad way. The Doctor - not in the best of health anyway, his old body wearing somewhat thin - is in a coma, Ben unconscious. As for Polly, she's been affected worst of all. Time is running in the wrong order for her and she's seen the future, a future in which she's mortally wounded. But will Continuity allow her to die? CAST: Carole Ann Ford (Susan / Narrator), Mark Edel-Hunt (Virgil Winters), Anneke Wills (Polly Wright / Narrator), Elliot Chapman (Ben Jackson), David Warner (Allie), Maureen O'Brien (Vicki / Narrator), Peter Purves (Steven Taylor / The Doctor / Narrator), Lisa Bowerman (Colonel Maria Rage), Stephen Critchlow (Teddy Baxter / Michael Hart), Clive Hayward (The Judge / Markus).
The 1989 conference at York has resulted in a voluntary 34 papers. The first ten are on CRM topics, chiefly the maintenance of SMRs; then there are nine papers on surface and solid modelling and image enhancement, (patterning of distributions, image processing, rectification of air photos and the like); then seven papers illustrating statistical methods of data analysis and interpretation; three papers describe recording systems, four expert systems and artefact classification, and one on the teaching value of Hypercard. The production of the volume illustrates some of the latest methods of text and graphics handling.
On 11 September 2001, the Al Qaeda-sponsored attacks in New York
and Washington DC marked a turning point in global security. The
worldwide impact demonstrated not only that no country is an
island, but also raised questions about the way the intelligence
community gather its data, analyzed it, and disseminated it up to
the policymakers. Some of these questions concerned the very
tradecraft of intelligence - the process of analysis itself. This
book deconstructs the profession of intelligence analysis in the
contemporary, globalized world, and asks: is it an art, a science,
or both?
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book.
|
![]() ![]() You may like...
Modern Historiography in the Making…
Kasper Risbjerg Eskildsen
Hardcover
R3,203
Discovery Miles 32 030
Research Handbook on Torture - Legal and…
Malcolm D. Evans, Jens Modvig
Hardcover
R7,837
Discovery Miles 78 370
Introduction to Health Psychology
Val Morrison, Paul Bennett
Paperback
Nuclear - Inside South Africa's Secret…
Karyn Maughan, Kirsten Pearson
Paperback
|