Marknadens största urval
Snabb leverans

Böcker i Praeger Security International-serien

Filter
Filter
Sortera efterSortera Serieföljd
  • - The Threat of Militant Islamic Fundamentalism
    av Fereydoun Hoveyda
    599 - 1 389

    This text explores the historical and contemporary causes of militant Islamic fundamentalism. It also shows why, despite their terrorist attacks on the West, fundamentalists are even more dangerous to Muslim countries that want to join the global economy.

  • av Frederick Mattis
    1 045,-

    The threat of weapons of mass destruction is still viable, and unless proper motions are made to prohibit this, global safety is still at risk. Prior arms control agreements have moved humanity within striking distance of global prohibition, yet these weapons of mass destruction remain. This enlightening work discusses original principles for a treaty banning nuclear and chem-bio weapons worldwide. Mattis argues that a proposed new nuclear treaty, replacing today's inadequate 1968 Non-Proliferation Treaty, would demand unanimous accession by States which must be achieved before such a treaty enters into force. By asking essential questions, and offering value-creative proposals for nuclear treaty provisions, this work offers a clear path to the daylight of worldwide weapons of mass destruction prohibition.Not only is global safety threatened by the use of nuclear and chem-bio weapons, but more inclusively, today, society is at risk of nuclear weapons being stolen or acquired by terrorists for purposes of destruction. This risk lends to a necessary treaty that would require down-blending of highly enriched uranium to low-enriched uranium to eliminate this prospect. The heart of this work is its delineation of necessary elements for a nuclear ban treaty that addresses inevitable concerns of all States, especially today's nine nuclear weapon States. Mattis addresses 17 major proposed treaty provisions that include: how to suitably ascertain "e;unanimous accession"e; by states to a nuclear ban treaty (unanimity being a condition for entry into force); requirement that states be signatories to the current chemical and biological weapons bans [CWC/BWC] prior to signing a nuclear ban treaty; "e;non-withdrawal"e; by states from the treaty once it is in effect; necessary and new verification elements for banning nuclear weapons; the establishment, via nuclear ban provision, of "e;non-withdrawal"e; from the CWC and BWC. By asking essential questions, and offering illuminating proposals for nuclear ban treaty provisions, the work offers a path to a safer future through worldwide prohibition of weapons of mass destruction.

  • av Ryan K. Baggett
    525,-

    A compelling overview of systems and strategies implemented to safeguard U.S. resources from a plethora of threats, the vulnerabilities and security gaps in these infrastructure systems, and options to enable the future security of the homeland.Since the first edition of this book was published in 2009, significant changes have occurred in the security landscape, both domestically and internationally. This second edition is thoroughly updated to reflect those changes, offering a complete review of the various security and resilience measures currently in place and potential strategies to safeguard life and property within the U.S. homeland. As noted in the U.S. Department of Homeland Security's National Preparedness Goal, the mission area of protection is vital to the homeland in its focus on actions to protect people, vital interests, and our nation's way of life. With that in mind, this book discusses strategies such as risk analysis and assessment, information sharing, and continuity planning. The authors focus on relevant and timely threats and hazards facing specific infrastructure components including, but not limited to, agriculture and food, banking and finance, water, energy, telecommunications, and transportation. The dynamic posture of critical infrastructure security and resilience (CISR) underscores the importance of an integrated, layered all-hazards approach. In describing this approach, the book includes new chapters on planning and guidance, public and private partnerships, cyber issues and threats, and careers in infrastructure protection. Additions such as discussion questions, learning objectives, and fundamental concepts for each chapter provide additional direction for instructors and students alike.

  • av Paul J. Springer
    525,-

    Military robots are affecting both the decision to go to war and the means by which wars are conducted. This book covers the history of military robotics, analyzes their current employment, and examines the ramifications of their future utilization.Robotic systems are the future of military conflicts: their development is already revolutionizing the nature of human conflict-and eroding the standards of acceptable behavior in wartime. Written by a professor who teaches strategy and leadership for the U.S. Air Force, one of the global leaders in the development and utilization of military robots, this book both addresses the history of military robotics and discusses the troubling future ramifications of this game-changing technology.Organized both chronologically and thematically, the book's chapters describe the development and evolution of unmanned warfare; clarify the past, current, and future capabilities of military robotics; and offer a detailed and convincing argument that limits should be placed upon their development before it is too late. This standout work presents an eye-opening analysis that military personnel, civil servants, and academic instructors who teach military history, social policy, and ethics can ill afford to ignore, and will also provide the general public with information that will correct misconceptions about military robotics derived through popular culture and the news media.

  • av Jack Caravelli
    525,-

    This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications.This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats.The book's first section describes existing threats and their consequences. The second section identifies newer cyber challenges across an even broader spectrum, including the internet of things. The concluding section looks at policies and practices in the United States, United Kingdom, and elsewhere that offer ways to mitigate threats to cyber security. Written in a nontechnical, accessible manner, the book will appeal to a diverse audience of policymakers, business leaders, cyber security experts, and interested general readers.

  • av Nicholas Michael Sambaluk
    525,-

    This illuminating book examines and refines the commonplace "wisdom" about cyber conflict-its effects, character, and implications for national and individual security in the 21st century."Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations connected to social media's role in digital struggle.The author discusses numerous mythologies about cyber warfare, including its presumptively instantaneous speed, that it makes distance and location irrelevant, and that victims of cyber attacks deserve blame for not defending adequately against attacks. The author outlines why several widespread beliefs about cyber weapons need modification and suggests more nuanced and contextualized conclusions about how cyber domain hostility impacts conflict in the modern world.After distinguishing between the nature of warfare and the character of wars, chapters will probe the widespread assumptions about cyber weapons themselves. The second half of the book explores the role of social media and the consequences of the digital realm being a battlespace in 21st-century conflicts. The book also considers how trends in computing and cyber conflict impact security affairs as well as the practicality of people's relationships with institutions and trends, ranging from democracy to the Internet of Things.

  • av Kimberley L Thachuk
    525,-

    This cohesive set of case studies collects scholarly research, policy evaluation, and field experience to explain how terrorist groups have developed into criminal enterprises.Terrorist groups have evolved from orthodox global insurgents funded by rogue sponsors into nimble and profitable transnational criminal enterprises whose motivations are not always evident. This volume seeks to explain how and why terrorist groups are often now criminal enterprises through 12 case studies of terrorist criminal enterprises written by authors who have derived their expertise on terrorism and/or organized crime from diverse sources. Terrorist groups have been chosen from different regions to provide the global coverage.Chapters describe and analyze the actors, actions, problems, and collaborations of specific terrorist criminal enterprises. Other elements discussed include links to such facilitating conditions as political culture, corruption, history, economy, and issues of governance. This work advances scholarship in the field of counterterrorism by expanding the understanding of these terrorist groups as entities not driven purely by ideology but rather by the criminal enterprises with which they often coincide.

  • av Nicholas Michael Sambaluk
    525,-

    The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals.Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin.Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed.

  • av Christopher Deliso
    525,-

    A fundamental resource for anyone interested in the long-term ramifications of the European migration crisis, this book objectively assesses how Europe's future course will be impacted by the key security, political, and economic trends and events stemming from the migration crisis.The November 13, 2015 Paris terrorist attacks marked the definitive moment when the migration crisis became associated with terrorism, stoking an increasingly heated debate over the perceived dangers of migration, Islam, and extremist politics in Europe. The sudden emergence of migration as the mobilizing factor for European security, political discourse, and socio-economic realities has profoundly affected Europe's contrasting perceptions of its own identity and values, precipitating an increasingly global response to tackling migration challenges in Europe and worldwide. Migration, Terrorism, and the Future of a Divided Europe: A Continent Transformed chronicles the turbulent events of the 2015-2016 migration crisis, creating a context in which future political, economic, social, and security trends in Europe can be understood. The study also examines in detail the deep history of the ideological origins and histories of treaties and policies that have defined the European Union and its guidance of the crisis. Readers will gain insight into the origins, factual realities, and projected ramifications for the continent's future security, politics, and socio-economic identity; the impact of media coverage on public perception; the differing policies and rhetoric of rival right- and left-wing parties in Europe; and the new security threats arising from a widened terrorist threat matrix that will comprise new targets, methods, and logistics. Finally, the book outlines the larger policy actions and trends expected, on the global level, towards handling future migration crises, and explains how this will have an impact on Europe.This important new work is the cumulative result of author Chris Deliso's extensive academic background in European history and thought; his on-the-ground presence in the target region before, during, and after the crisis; and his interviews with security officials, diplomatic figures, and practitioners directly involved with shaping the policies that were visible during the crisis. Offering a broad historical context, the text portrays the current crisis within the context of a much longer institutional and ideological divide that has existed in Europe and shaped policies for almost a century.

  • av Wayne Michael Hall
    529,-

    This comprehensive work provides a treasure trove of ways to seek, find, and use the power of will to gain an advantage over one's opponents in mental conflicts.Will has been-and always will be-the basis for succeeding in any conflict or competition. To win in a conflict or competition, decision-makers must comprehend the meaning and implications of will and successfully transform theories about it into practice. In the 21st century, it is especially important for military leaders and security professionals to comprehend will in sufficient depth to enable them to impose their will on other resisting entities and learn how to block or parry their adversaries' efforts to impose their will on them. This book will go a long way in helping decision-makers achieve these goals.Each chapter in this book addresses one of 14 elements that will help readers to use will successfully over their adversaries: life-force, purpose, strength of motive, capabilities, determination, perseverance, sacrifice, passion, advantage, disadvantage, imposition, action, assessment, and adaptation. The book also provides readers with 18 considerations that will serve them well in all types of conflicts. This book will be particularly beneficial to decision-makers in the military, law enforcement, and business, as well as attorneys and judges.

  • av M Kent Bolton
    525,-

    This book examines the impact of the National Security Act of 1947, the most important foreign policy legislation that many Americans (including policymakers and academics) have never heard of.Since September 11, 2001, the White House-under both Bush and Obama-has pushed the envelope of taking the United States to war (without declarations), interrogating prisoners of war, spying on potential threats, and acting unilaterally. Why have these trends occurred? How has the apex of foreign power shifted, causing a sea change that has fueled a continual turf war between Capitol Hill and the White House? And perhaps most critically, what is America's role in the world now, and what should it be? The Rise of the American Security State: The National Security Act of 1947 and the Militarization of U.S. Foreign Policy argues that the National Security Act of 1947 and the early Cold War created a bipartisan consensus among U.S. policymakers that spanned several administrations. The result of this consensus and the National Security Act was the creation of permanent institutions: the permanent Defense Department with a secretary of defense; the intelligence community, which has grown to 17 agencies; and significantly, the National Security Council inside the presidency. Collectively, these three developments have led to the militarization of U.S. foreign policy. Readers will grasp how concepts and strategies that were in their infancy during the Cold War era have persisted and continued to affect today's U.S. foreign policy.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.