1,279 books
Chinese Cyber Economic Espionage
Understanding the Threat Ecosystem
Assessing and Strengthening the Manufacturing and Defense Industrial Base and Supply Chain Resiliency of the United States - Report to President Trump on Reliance on Foreign and Chinese Suppliers
Nationalist to Transnational Insurgency
Wired Fast and Thinking Slow
Ebb and Flow
Army Aviation's Pacific Rebalance
Infiltrating to Win
Measuring Transnational Organized Crime Threats to U.S. National Security - Analysis of Three Conceptual Frameworks Used to Study Organized Crime, Un Typology Considers Terrorist Organization Links
Personal Disaster Preparedness Levels in the National Guard - Analysis of Survey Data, Readiness Rates Compared to General Public, First Responders, and Federal Emergency Management Agency Goal
System Shock
Tactical Integration of Conventional and Special Operations Forces in Training for a Complex World - Detailed Case Study of Operation Enduring Freedom in Afghanistan, Peacetime Integration Valuable
Seven Times Around a City
Why Security Force Assistance Fails - Case Studies of Korea After World War II and Iraqi Security Forces During Coalition Forces Occupation Against Isil, Strategies Must Be Adjusted Based on Dynamics
Joint Force Opportunities
Operation Dragoon
War and Man
U.S. - Russian Cooperation in the Post-Cold War Environment - History of Cooperation During Administrations of George H.W. Bush Through Obama, Role of Putin, Need to Reinvent Relationship
Learning to Mow Grass
Back to the Future? Associated Units and Arng Brigade Combat Teams - Origins of All-Volunteer Force, Total Force Policy, Proposed Associated Units Approach, Arng Brigade Combat Teams Are No More Ready
Pacific Pathways 2014
People's War on the East Sea
Cyber Attacks and the Legal Justification for an Armed Response - Need to Clarify Definition of Cyberattack, Legal Guidelines, Law of War and Armed Conflict, Severity and Human Casualties
Fighting Blind