Marknadens största urval
Snabb leverans

Böcker i Praeger Security International-serien

Filter
Filter
Sortera efterSortera Serieföljd
  • - The Taliban, Al Qaeda, and the Rise of Terrorism
    av William J. Topich
    890,-

    This single-volume work documents Pakistan's troubled history, which has led to current global insecurities and created a breeding ground for radical insurgency and terrorism.Why is the volatile political status of Pakistan so critical to world security? How did the tribal region of northwest Pakistan become home to numerous insurgent factions, including the Pakistani Taliban and Al Qaeda? Is the government of Pakistan actively combating or facilitating terrorism and the growth of extremism? Pakistan: The Taliban, Al Qaeda, and the Rise of Terrorism addresses and answers these questions and more, providing a current and comprehensive examination of the terrorist and insurgent groups that use Pakistan as their global base of operation.Readers of this book will better understand how the activities of terrorist groups such as the Pakistan Taliban, Lashkar-e-Taiba, and Al Qaeda in Pakistan threaten the future of the state and why the situation in Pakistan is considered by many to be more vital to American interests than Afghanistan. Author William J. Topich evaluates the changing nature of U.S. policy in the region, including analysis of policy regarding drone strikes that target various radical groups, of state stabilization options, and of ongoing United States-Pakistan relations. His assessment of Pakistan's key role in global security accounts for the country's longstanding conflict with India, the Afghanistan wars, and the impact of the attacks of September 11, 2001, and identifies possible future scenarios for Pakistan and the accompanying implications for security.

  • - Financing Terrorism through Organized Crime
     
    1 236,-

    This cohesive set of case studies collects scholarly research, policy evaluation, and field experience to explain how terrorist groups have developed into criminal enterprises.Terrorist groups have evolved from orthodox global insurgents funded by rogue sponsors into nimble and profitable transnational criminal enterprises whose motivations are not always evident. This volume seeks to explain how and why terrorist groups are often now criminal enterprises through 12 case studies of terrorist criminal enterprises written by authors who have derived their expertise on terrorism and/or organized crime from diverse sources. Terrorist groups have been chosen from different regions to provide the global coverage.Chapters describe and analyze the actors, actions, problems, and collaborations of specific terrorist criminal enterprises. Other elements discussed include links to such facilitating conditions as political culture, corruption, history, economy, and issues of governance. This work advances scholarship in the field of counterterrorism by expanding the understanding of these terrorist groups as entities not driven purely by ideology but rather by the criminal enterprises with which they often coincide.

  • av William A. Taylor
    890,-

  • av Ofer Israeli
    890,-

    "This book tries to answer two key questions. The first is why certain periods are more prone to war than others. The other is why certain wars that involve polar powers end with their territorial expansion whereas other wars end in their contraction or maintaining their territorial status. In conclusion, it is asked whether the polarity of the system affects these two outcomes, and if so, how"--

  • - The U.S. and Russian Espionage Game from the Cold War to the 21st Century
    av Sean N. (U.S. Army Command and General Staff College Kalic
    1 300,-

    In the post-World War II era, the Soviet Union and the United States wanted to gain the advantage in international security. Both engaged in intelligence gathering. This book provides a comprehensive understanding of the evolution of the espionage game.For more than four decades after World War II, the quest for intelligence drove the Soviet Union and the United States to develop a high-stakes "game" of spying on one another throughout the Cold War. Each nation needed to be aware of and prepared to counter the capabilities of their primary nemesis. Therefore, as the Cold War period developed and technology advanced, the mutual goal to maintain up-to-date intelligence mandated that the process by which the "game" was played encompass an ever-wider range of intelligence gathering means. Covering far more than the United States and Soviet Union's use of human spies, this book examines the advanced technological means by which the two nations' intelligence agencies worked to ensure that they had an accurate understanding of the enemy.The easily accessible narrative covers the Cold War period from 1945 to 1989 as well as the post-Cold War era, enabling readers to gain an understanding of how the spies and elaborate espionage operations fit within the greater context of the national security concerns of the United States and the Soviet Union. Well-known Cold War historian Sean N. Kalic explains the ideological tenets that fueled the distrust and "the need to know" between the two adversarial countries, supplies a complete history of the technological means used to collect intelligence throughout the Cold War and into the more recent post-Cold War years, and documents how a mutual desire to have the upper hand resulted in both sides employing diverse and creative espionage methods.

  • - Combatting Global Hunger and Forging a Path to Food Sovereignty
    av William D. (University of South Florida Schanbacher
    890,-

    This important work addresses the difficult ethical issues surrounding the accessibility of food to all people as a human right, and not a privilege that emerges because of social structure or benefit of geography.Food sovereignty-the right of peoples to define their own chosen food and agriculture, free of monopolization or threats-is the path to stopping global hunger. This book approaches the topic from a solutions-based perspective, discussing concrete policy providing for sovereignty, or control, of one's own food sources as a solution that, while controversial, offers more promise than do the actions of international organizations and trade agreements. Providing access to safe, healthy food is an ethical responsibility of the world's nations, not just a right of the elite or wealthy.This book presses the need to formulate policies that address the problems of poverty and hunger on a more humane and meaningful level. Organized thematically, chapters are based on such topics as food security, food sovereignty, human rights, and sustainability that focus on the global food system. Specific case studies provide examples of global hunger and poverty issues. Taken in its entirety, the book informs readers of how their food consumption might negatively affect the global poor, while its concluding chapters offer solutions for alleviating problems in the global food system.

  • - Understanding the Domestic and International Terrorist Threat
    av Thomas R. (DePaul University Mockaitis
    1 300,-

    Written for the general reader as well as the professional, this succinct but comprehensive work examines the hybrid nature of the two violent extremist movements threatening the United States: Islamist extremism and white nationalism.Scholarship as well as popular discourse on terrorism often focuses disproportionately on specific groups without paying sufficient attention to the ideology that motivates them. This book emphasizes understanding and countering the ideology that fuels extremism over preoccupation with specific organizations such as Al Qaeda or ISIS. It sets contemporary terrorist threats in perspective, avoiding fear-mongering and political rhetoric.The book examines the nature of violent extremism today in all its forms, including lone wolves and cyber threats. Focusing on the threats posed by both international and domestic terrorism, it analyzes each in depth as a multidimensional hybrid phenomenon: each threat exists as an ideology, as distinct groups espousing that ideology, and as a network of followers. Short, easy-to-read chapters take readers through the subject matter in a clear, methodical manner. Written in an accessible style by an author who has studied terrorism for more than 30 years and provided extensive media coverage on the subject, the work is a valuable addition to the literature on violent extremism.

  • - Lessons from the Past and Present
    av Max G. Manwaring
    890,-

    This book will help civilian and military leaders, opinion makers, scholars, and interested citizens come to grips with the realities of the 21st-century global security arena by dissecting lessons from both the past and the present.This book sets out to accomplish four tasks: first, to outline the evolution of the national and international security concept from the Treaty of Westphalia (1648) to the present; second, to examine the circular relationship of the elements that define contemporary security; third, to provide empirical examples to accompany the discussion of each element-security, development, governance, and sovereignty; and fourth, to argue that substantially more sophisticated stability-security concepts, policy structures, and policy-making precautions are required in order for the United States to play more effectively in the global security arena.Case studies provide the framework to join the various chapters of the book into a cohesive narrative, while the theoretical linear analytic method it employs defines its traditional approach to case studies. For each case study it discusses the issue in context, findings and outcomes of the issue, and conclusions and implications. Issue and Context sections outline the political-historical situation and answers the "What?" question; Findings and Outcome sections answer the "Who?", "Why?", "How?", and "So What?" questions; and Conclusions and Implications sections address Key Points and Lessons.

  • av Hamilton Bean
    890,-

    "This timely book provides the inside story of the development of mobile public alert and warning technology in the United States and addresses similar systems being used in Australia, Canada, Japan, and the Netherlands"--

  •  
    660,-

    A comprehensive textbook that overviews common technologies utilized within the homeland security enterprise with an emphasis on contemporary homeland security mission areas and end-user applications.

  • av Ryan K. Baggett & Brian K. Simpkins
    890,-

    Since the first edition of this book was published in 2009, significant changes have occurred in the security landscape, both domestically and internationally. This second edition is thoroughly updated to reflect those changes, offering a complete review of the various security and resilience measures currently in place and potential strategies to safeguard life and property within the U.S. homeland. As noted in the U.S. Department of Homeland Security's National Preparedness Goal, the mission area of protection is vital to the homeland in its focus on actions to protect people, vital interests, and our nation's way of life. With that in mind, this book discusses strategies such as risk analysis and assessment, information sharing, and continuity planning. The authors focus on relevant and timely threats and hazards facing specific infrastructure components including, but not limited to, agriculture and food, banking and finance, water, energy, telecommunications, and transportation. The dynamic posture of critical infrastructure security and resilience (CISR) underscores the importance of an integrated, layered all-hazards approach. In describing this approach, the book includes new chapters on planning and guidance, public and private partnerships, cyber issues and threats, and careers in infrastructure protection. Additions such as discussion questions, learning objectives, and fundamental concepts for each chapter provide additional direction for instructors and students alike.

  • - How to Think Critically in Complex Environments
    av Wayne Michael (CEO Hall
    1 280,-

    This comprehensive work provides a treasure trove of ways to seek, find, and use the power of will to gain an advantage over one's opponents in mental conflicts.Will has been-and always will be-the basis for succeeding in any conflict or competition. To win in a conflict or competition, decision-makers must comprehend the meaning and implications of will and successfully transform theories about it into practice. In the 21st century, it is especially important for military leaders and security professionals to comprehend will in sufficient depth to enable them to impose their will on other resisting entities and learn how to block or parry their adversaries' efforts to impose their will on them. This book will go a long way in helping decision-makers achieve these goals.Each chapter in this book addresses one of 14 elements that will help readers to use will successfully over their adversaries: life-force, purpose, strength of motive, capabilities, determination, perseverance, sacrifice, passion, advantage, disadvantage, imposition, action, assessment, and adaptation. The book also provides readers with 18 considerations that will serve them well in all types of conflicts. This book will be particularly beneficial to decision-makers in the military, law enforcement, and business, as well as attorneys and judges.

  • - Conflict in the Digital Realm
    av Nicholas Michael Sambaluk
    890,-

    This illuminating book examines and refines the commonplace "wisdom" about cyber conflict-its effects, character, and implications for national and individual security in the 21st century."Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations connected to social media's role in digital struggle.The author discusses numerous mythologies about cyber warfare, including its presumptively instantaneous speed, that it makes distance and location irrelevant, and that victims of cyber attacks deserve blame for not defending adequately against attacks. The author outlines why several widespread beliefs about cyber weapons need modification and suggests more nuanced and contextualized conclusions about how cyber domain hostility impacts conflict in the modern world.After distinguishing between the nature of warfare and the character of wars, chapters will probe the widespread assumptions about cyber weapons themselves. The second half of the book explores the role of social media and the consequences of the digital realm being a battlespace in 21st-century conflicts. The book also considers how trends in computing and cyber conflict impact security affairs as well as the practicality of people's relationships with institutions and trends, ranging from democracy to the Internet of Things.

  • - Is the Atlantic Alliance Still in America's Interest?
    av Wesley B. Truitt
    890,-

    Is NATO still in the best interest of the United States? This provocative work argues that the focus on NATO distracts the U.S. from the vital foreign policy challenges of the 21st century, most notably China's rise in power.Since its beginning in 1949, NATO-the North Atlantic Treaty Organization-has been at the center of U.S. foreign policy. The alliance was crucial during the decades of the Cold War, and the United States collaborated closely with NATO during crises in Kosovo, Afghanistan, and Libya. But does the NATO alliance still serve the best interests of the U.S.?The NATO of today-one that has expanded to 30 member countries-risks involving the U.S. in unwanted military activities of the future, actions that were not intended in the original Atlantic alliance. In addition, the real challenges for foreign policy of 21st century are not in Europe, but in the expanding economic powerhouses in Asia, especially China. NATO Reconsidered argues that the changes in world politics in recent decades requires that the more than 70-year-old alliance should no longer be the principal focus of U.S. foreign policy.

  • - Strategic Thinking and Strategy Formulation in the 21st Century
    av Harry R. Yarger
    986,-

    A reference for national security professionals, political appointees in the security realm, and others who participate in the formulation, evaluation, and execution of strategy, in addition to those who study and follow national security debates.

  • av Nawaf Obaid
    1 310,-

    "This book is an indispensable resource for anyone looking to understand the Muslim Brotherhood, Qatar's role in promoting the group, and the ideological, social, and religious factors that have led to its ultimate failure"--

  • - Why Some Soldiers Are Better Than Others
    av Bruce Newsome
    916,-

    Why do the combat capabilities of individual soldiers vary so much? In this first social scientific study of the effectiveness of combat troops, Newsome evaluates competing explanations for the varying combat capabilities and performances. There are four main explanations, each emphasizing the influence of a single factor.

  • av Eyal Ben-Ari, Kobi Michael & David Kellen
    1 296,-

    With the end of the Cold War, the euphoria of the Gulf War of the 1990s and the avowal of a New World Order, peace-operations were declared as the recipe for a better world through international intervention in conflict arenas.

  • - The Failure of the Obama Doctrine
    av Edward A. Lynch
    1 280,-

    This title provides a succinct, readable, and comprehensive treatment of how the Obama administration reacted to what was arguably the most difficult foreign policy challenge of its eight years in office: the Arab Spring.As a prelude to examining how the United States reacted to the first wave of the Arab Spring in the 21st century, this book begins with an examination of how the U.S. reacted to revolution in the 19th and 20th centuries and a summary of how foreign policy is made. Each revolution in the Arab Spring (in Tunisia, Egypt, Libya, Syria, Bahrain, and Yemen) and the Obama administration's action-or inaction-in response is carefully analyzed. The U.S.' role is compared to that of regional powers, such as Turkey, Israel, and Iran. The impact of U.S. abdication in the face of pivotal events in the region is the subject of the book's conclusion.While other treatments have addressed how the Arab Spring revolutions have affected the individual countries where these revolutions took place, U.S. foreign policy toward the Middle East, and President Barack Obama's overall foreign policy, this is the only work that provides a comprehensive examination of both the Arab Spring revolutions themselves and the reaction of the U.S. government to those revolutions.

  • - The Threat of Militant Islamic Fundamentalism
    av Fereydoun Hoveyda
    620 - 1 390,-

    This text explores the historical and contemporary causes of militant Islamic fundamentalism. It also shows why, despite their terrorist attacks on the West, fundamentalists are even more dangerous to Muslim countries that want to join the global economy.

  • av Frederick Mattis
    1 076,-

    The threat of weapons of mass destruction is still viable, and unless proper motions are made to prohibit this, global safety is still at risk. Prior arms control agreements have moved humanity within striking distance of global prohibition, yet these weapons of mass destruction remain. This enlightening work discusses original principles for a treaty banning nuclear and chem-bio weapons worldwide. Mattis argues that a proposed new nuclear treaty, replacing today's inadequate 1968 Non-Proliferation Treaty, would demand unanimous accession by States which must be achieved before such a treaty enters into force. By asking essential questions, and offering value-creative proposals for nuclear treaty provisions, this work offers a clear path to the daylight of worldwide weapons of mass destruction prohibition.Not only is global safety threatened by the use of nuclear and chem-bio weapons, but more inclusively, today, society is at risk of nuclear weapons being stolen or acquired by terrorists for purposes of destruction. This risk lends to a necessary treaty that would require down-blending of highly enriched uranium to low-enriched uranium to eliminate this prospect. The heart of this work is its delineation of necessary elements for a nuclear ban treaty that addresses inevitable concerns of all States, especially today's nine nuclear weapon States. Mattis addresses 17 major proposed treaty provisions that include: how to suitably ascertain "e;unanimous accession"e; by states to a nuclear ban treaty (unanimity being a condition for entry into force); requirement that states be signatories to the current chemical and biological weapons bans [CWC/BWC] prior to signing a nuclear ban treaty; "e;non-withdrawal"e; by states from the treaty once it is in effect; necessary and new verification elements for banning nuclear weapons; the establishment, via nuclear ban provision, of "e;non-withdrawal"e; from the CWC and BWC. By asking essential questions, and offering illuminating proposals for nuclear ban treaty provisions, the work offers a path to a safer future through worldwide prohibition of weapons of mass destruction.

  • av James J. F. Forest
    890,-

    This book brings together three important dimensions of our everyday lives. First is digital-the online ecosystem of information providers and tools, from websites, blogs, discussion forums, and targeted email campaigns to social media, video streaming, and virtual reality. Second, influence-the most effective ways people can be persuaded, in order to shape their beliefs in ways that lead them to embrace one set of beliefs and reject others. And finally, warfare-wars won by the information and disinformation providers who are able to influence behavior in ways they find beneficial to their political, social, and other goals.The book provides a wide range of specific examples that illustrate the ways people are being targeted by digital influencers. There is much more to digital influence warfare than terrorist propaganda, "e;fake news,"e; or Russian efforts to manipulate elections: chapters examine post-truth narratives, fabricated "e;alternate facts,"e; and brainwashing and disinformation within the context of various political, scientific, security, and societal debates. The final chapters examine how new technical tools, critical thinking, and resilience can help thwart digital influence warfare efforts.

  • av Ryan K. Baggett
    546,-

    A compelling overview of systems and strategies implemented to safeguard U.S. resources from a plethora of threats, the vulnerabilities and security gaps in these infrastructure systems, and options to enable the future security of the homeland.Since the first edition of this book was published in 2009, significant changes have occurred in the security landscape, both domestically and internationally. This second edition is thoroughly updated to reflect those changes, offering a complete review of the various security and resilience measures currently in place and potential strategies to safeguard life and property within the U.S. homeland. As noted in the U.S. Department of Homeland Security's National Preparedness Goal, the mission area of protection is vital to the homeland in its focus on actions to protect people, vital interests, and our nation's way of life. With that in mind, this book discusses strategies such as risk analysis and assessment, information sharing, and continuity planning. The authors focus on relevant and timely threats and hazards facing specific infrastructure components including, but not limited to, agriculture and food, banking and finance, water, energy, telecommunications, and transportation. The dynamic posture of critical infrastructure security and resilience (CISR) underscores the importance of an integrated, layered all-hazards approach. In describing this approach, the book includes new chapters on planning and guidance, public and private partnerships, cyber issues and threats, and careers in infrastructure protection. Additions such as discussion questions, learning objectives, and fundamental concepts for each chapter provide additional direction for instructors and students alike.

  • av Paul J. Springer
    546,-

    Military robots are affecting both the decision to go to war and the means by which wars are conducted. This book covers the history of military robotics, analyzes their current employment, and examines the ramifications of their future utilization.Robotic systems are the future of military conflicts: their development is already revolutionizing the nature of human conflict-and eroding the standards of acceptable behavior in wartime. Written by a professor who teaches strategy and leadership for the U.S. Air Force, one of the global leaders in the development and utilization of military robots, this book both addresses the history of military robotics and discusses the troubling future ramifications of this game-changing technology.Organized both chronologically and thematically, the book's chapters describe the development and evolution of unmanned warfare; clarify the past, current, and future capabilities of military robotics; and offer a detailed and convincing argument that limits should be placed upon their development before it is too late. This standout work presents an eye-opening analysis that military personnel, civil servants, and academic instructors who teach military history, social policy, and ethics can ill afford to ignore, and will also provide the general public with information that will correct misconceptions about military robotics derived through popular culture and the news media.

  • av Jack Caravelli
    546,-

    This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications.This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats.The book's first section describes existing threats and their consequences. The second section identifies newer cyber challenges across an even broader spectrum, including the internet of things. The concluding section looks at policies and practices in the United States, United Kingdom, and elsewhere that offer ways to mitigate threats to cyber security. Written in a nontechnical, accessible manner, the book will appeal to a diverse audience of policymakers, business leaders, cyber security experts, and interested general readers.

  • av Nicholas Michael Sambaluk
    546,-

    This illuminating book examines and refines the commonplace "wisdom" about cyber conflict-its effects, character, and implications for national and individual security in the 21st century."Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations connected to social media's role in digital struggle.The author discusses numerous mythologies about cyber warfare, including its presumptively instantaneous speed, that it makes distance and location irrelevant, and that victims of cyber attacks deserve blame for not defending adequately against attacks. The author outlines why several widespread beliefs about cyber weapons need modification and suggests more nuanced and contextualized conclusions about how cyber domain hostility impacts conflict in the modern world.After distinguishing between the nature of warfare and the character of wars, chapters will probe the widespread assumptions about cyber weapons themselves. The second half of the book explores the role of social media and the consequences of the digital realm being a battlespace in 21st-century conflicts. The book also considers how trends in computing and cyber conflict impact security affairs as well as the practicality of people's relationships with institutions and trends, ranging from democracy to the Internet of Things.

  • av Kimberley L Thachuk
    546,-

    This cohesive set of case studies collects scholarly research, policy evaluation, and field experience to explain how terrorist groups have developed into criminal enterprises.Terrorist groups have evolved from orthodox global insurgents funded by rogue sponsors into nimble and profitable transnational criminal enterprises whose motivations are not always evident. This volume seeks to explain how and why terrorist groups are often now criminal enterprises through 12 case studies of terrorist criminal enterprises written by authors who have derived their expertise on terrorism and/or organized crime from diverse sources. Terrorist groups have been chosen from different regions to provide the global coverage.Chapters describe and analyze the actors, actions, problems, and collaborations of specific terrorist criminal enterprises. Other elements discussed include links to such facilitating conditions as political culture, corruption, history, economy, and issues of governance. This work advances scholarship in the field of counterterrorism by expanding the understanding of these terrorist groups as entities not driven purely by ideology but rather by the criminal enterprises with which they often coincide.

  • av Nicholas Michael Sambaluk
    546,-

    The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals.Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin.Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed.

  • av Christopher Deliso
    546,-

    A fundamental resource for anyone interested in the long-term ramifications of the European migration crisis, this book objectively assesses how Europe's future course will be impacted by the key security, political, and economic trends and events stemming from the migration crisis.The November 13, 2015 Paris terrorist attacks marked the definitive moment when the migration crisis became associated with terrorism, stoking an increasingly heated debate over the perceived dangers of migration, Islam, and extremist politics in Europe. The sudden emergence of migration as the mobilizing factor for European security, political discourse, and socio-economic realities has profoundly affected Europe's contrasting perceptions of its own identity and values, precipitating an increasingly global response to tackling migration challenges in Europe and worldwide. Migration, Terrorism, and the Future of a Divided Europe: A Continent Transformed chronicles the turbulent events of the 2015-2016 migration crisis, creating a context in which future political, economic, social, and security trends in Europe can be understood. The study also examines in detail the deep history of the ideological origins and histories of treaties and policies that have defined the European Union and its guidance of the crisis. Readers will gain insight into the origins, factual realities, and projected ramifications for the continent's future security, politics, and socio-economic identity; the impact of media coverage on public perception; the differing policies and rhetoric of rival right- and left-wing parties in Europe; and the new security threats arising from a widened terrorist threat matrix that will comprise new targets, methods, and logistics. Finally, the book outlines the larger policy actions and trends expected, on the global level, towards handling future migration crises, and explains how this will have an impact on Europe.This important new work is the cumulative result of author Chris Deliso's extensive academic background in European history and thought; his on-the-ground presence in the target region before, during, and after the crisis; and his interviews with security officials, diplomatic figures, and practitioners directly involved with shaping the policies that were visible during the crisis. Offering a broad historical context, the text portrays the current crisis within the context of a much longer institutional and ideological divide that has existed in Europe and shaped policies for almost a century.

  • av Wayne Michael Hall
    546,-

    This comprehensive work provides a treasure trove of ways to seek, find, and use the power of will to gain an advantage over one's opponents in mental conflicts.Will has been-and always will be-the basis for succeeding in any conflict or competition. To win in a conflict or competition, decision-makers must comprehend the meaning and implications of will and successfully transform theories about it into practice. In the 21st century, it is especially important for military leaders and security professionals to comprehend will in sufficient depth to enable them to impose their will on other resisting entities and learn how to block or parry their adversaries' efforts to impose their will on them. This book will go a long way in helping decision-makers achieve these goals.Each chapter in this book addresses one of 14 elements that will help readers to use will successfully over their adversaries: life-force, purpose, strength of motive, capabilities, determination, perseverance, sacrifice, passion, advantage, disadvantage, imposition, action, assessment, and adaptation. The book also provides readers with 18 considerations that will serve them well in all types of conflicts. This book will be particularly beneficial to decision-makers in the military, law enforcement, and business, as well as attorneys and judges.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.