Coalition Warfare
It is unquestionable that the warfare of various post-Cold War 'coalitions-of-the-willing' has drawn much attention over recent years. However, we may also notice that associations of nations fighting, or preparing to fight, for common causes are no novelty.Multi-national co-operation in fields as costly and as fateful as war depends on considerations and caveats concerning political purpose, risks, mutual trust, national wealth and pride, compatibility of military forces and a glut of intangibl...
Ukraine's Nuclear History (Contributions to International Relations)
This book presents a comprehensive overview of Ukraine's nuclear history, beginning from its experiences within the Russian Empire in the early 20th century, through the Soviet period, to the emergence of Ukraine as an independent state that inherited the world's third-largest nuclear arsenal. The book discusses the development of the nuclear infrastructure on Ukrainian soil and offers a rich and nuanced background of how Ukraine became an important and integrated part of the Soviet nuclear inf...
Scales on War is a collection of ideas, concepts, and observations aboutcontemporary war taken from over thirty years of research, writing, andpersonal experience by retired Major General Bob Scales. Scales' unique styleof writing utilizes contemporary military history, current events, and hisphilosophy of ground warfare to create a very personal and expansive view ofthe future direction of American defense policies. Each chapter in the book addresses a distinct topic facing the upcomingprospec...
Beyond "Fortress America"
The national security controls that regulate access to and export of science and technology are broken. As currently structured, many of these controls undermine our national and homeland security and stifle American engagement in the global economy, and in science and technology. These unintended consequences arise from policies that were crafted for an earlier era. In the name of maintaining superiority, the U.S. now runs the risk of becoming less secure, less competitive and less prosperous....
1999 saw two major international crises which, looked at side-by-side by Noam Chomsky, illuminate the strategies of the Western powers in the new century. In East Timor the warnings of further escalation in an unfolding humanitarian disaster could not have been more apparent. The referendum on independence was predicted to prompt widespread savagery towards the local population by an Indonesian army and their cohorts. Noam Chomsky points out, the West did not need to do very much to prevent this...
Emergency Preparedness: A Safety Guide to Planning for People, Property, and Business Continuity provides step-by-step instructions for developing prevention and response plans for all types of emergencies and disasters. It helps the reader to create an organization-wide emergency management plan that ensures that all procedures are in place and all equipment and personnel needs are addressed so that you and/or your organization can respond to an emergency situation quickly and instinctively. Yo...
Understanding and Managing Risk in Security Systems for the DOE Nuclear Weapons Complex
A nuclear weapon or a significant quantity of special nuclear material (SNM) would be of great value to a terrorist or other adversary. It might have particular value if acquired from a U.S. facility-in addition to acquiring a highly destructive tool, the adversary would demonstrate an inability of the United States to protect its nuclear assets. The United States expends considerable resources toward maintaining effective security at facilities that house its nuclear assets. However, particular...
WINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying expose' The Times 'Part John le Carre . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world's largest attack su...
What motivates states to protect populations threatened by mass atrocities beyond their own borders? Most often, states and their representatives appeal to the principle of common humanity, acknowledging a conscience-shocking quality that demands a moral response. But though the idea of a common humanity is powerful, the question remains: to what extent is it effective in motivating action?The Limits of Common Humanity provides an ambitious interdisciplinary response to this question, theorizing...
Genocide: A Comprehensive Introduction is the most wide-ranging textbook on genocide yet published. The book is designed as a text for upper-undergraduate and graduate students, as well as a primer for non-specialists and general readers interested in learning about one of humanity’s enduring blights. Fully updated to reflect the latest thinking in this rapidly developing field, this unique book:Provides an introduction to genocide as both a historical phenomenon and an analytical-legal concept...
This book explores types of disruptions in defence and security, ways to assess disruptions triggered by technological advancements or the lack of legal frameworks; the consequent delays or disruptions to making decisions, creative idea generation and finally the innovative pathways to counter such disruptions. What do disruption, ideation and innovation have in common? How do disruptions, ideas and innovation coexist within defence and security? They all influence and impact decision-making. Di...
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatical...
Global Security Watch Central Asia (Global Security Watch) (Praeger Security International)
by Reuel R Hanks
This volume is the only current treatment of security issues in Central Asia for the nonspecialist, as well as specialists and policy-makers.Global Security Watch-Central Asia is the first authoritative examination of the security issues affecting, and affected by, the region where Russia, South Asia, China, and the Middle East meet. The author provides a comprehensive account of the strategic importance and challenges facing Central Asia written for policymakers, students, researchers, and inte...
An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order The cyber revolution is the revolution of our time. The rapid expansion of cyberspace in society brings both promise and peril. It promotes new modes of political cooperation, but it also disrupts interstate dealings and empowers subversive actors who may instigate diplomatic and military crises. Despite significant expe...
The Iran-North Korea Strategic Alliance
by Committee on Foreign Affairs House of Re
American Fixation with Pakistans FATA -An Atlas to understand US Stupidities
by Agha Humayun Amin
Conflict, Security and the Reshaping of Society (Routledge Studies in Liberty and Security)
A PDF version of this book is available for free in open access via www.tandfebooks.com as well as the OAPEN Library platform, www.oapen.org. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 3.0 license and is part of the OAPEN-UK research project. This book is an examination of the effect of contemporary wars (such as the 'War on Terror') on civil life at a global level. Contemporary literature on war is mainly devoted to recent changes in the the...
Gender and Civilian Victimization in War (Routledge Studies in Gender and Security)
by Jessica L. Peet and Laura Sjoberg
This book explores the role of gender in influencing war-fighting actors’ strategies toward the attack or protection of civilians. Traditional narratives suggest that killing civilians intentionally in wars happens infrequently and that the perpetration of civilian targeting is limited to aberrant actors. Recently, scholars have shown that both state and non-state actors target civilians, even while explicitly deferring to the civilian immunity principle. This book fills a gap in the accounts o...