You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book, written by members of the Chief of Staff of the Army's Strategic Studies Group, takes an innovative approach to determining how the United States can counter extremist groups and engage in great power competition in the twenty first century. After proposing that the answer lies in switching the focus of current US strategy from the physical domain on which conflict occurs to the social, political, and cultural networks that comprise the human domain in which it occurs, it develops a new operating concept for conducting operations within that domain. This is an important book for those in security studies and international relations."--Provided by publisher.
As entrenched bureaucracies, military organizations might reasonably be expected to be especially resistant to reform and favor only limited, incremental adjustments. Yet, since 1945, the U.S. Army has rewritten its capstone doctrine manual, Operations, fourteen times. While some modifications have been incremental, collectively they reflect a significant evolution in how the Army approaches warfare—making the U.S. Army a crucial and unique case of a modern land power that is capable of change. So what accounts for this anomaly? What institutional processes have professional officers developed over time to escape bureaucracies' iron cage? Forging the Sword conducts a comparative historical...
Are cyber operations as revolutionary as the headlines suggest? Do they compel rival states and alter international politics? By examining cyber strategy as a contemporary form of political warfare and covert action, this book demonstrates that the digital domain complements rather than replaces traditional instruments of power.
None
Presenting the foundations of an integrated theory of organizations, Jensen argues that the cost of transferring information necessitates decentralization of some decision rights in organizations and economies. This in turn requires organizations to solve the control problem that results when self-interested persons do not behave as perfect agents.
The cross stirs intense feelings among Christians as well as non-Christians. Robin Jensen takes readers on an intellectual and spiritual journey through the two-thousand-year evolution of the cross as an idea and an artifact, illuminating the controversies—along with the forms of devotion—this central symbol of Christianity inspires. Jesus’s death on the cross posed a dilemma for Saint Paul and the early Church fathers. Crucifixion was a humiliating form of execution reserved for slaves and criminals. How could their messiah and savior have been subjected to such an ignominious death? Wrestling with this paradox, they reimagined the cross as a triumphant expression of Christ’s sacrif...
"This path-breaking study is about how ordinary people are gaining the means to be extraordinarily lethal. States are also concentrating their technological power, but their gains lag behind a shift in relative capacity that is already disrupting the role of conventional armed forces. The dispersal of emerging technologies such as roboics, cyber weapons, 3-D printing, autonomous systems, and various forms of artificial intelligence is widening popular access to unprecedented destructive power. Based on hard lessons from previous waves of lethal technology such as dynamite and the assault rifle, the book explains what the future may hold and how we should respond"-
In the third volume of this popular series, leading experts provide fascinating and unexpected insights into critical issues of culture, economy, politics, and society in today's China. This world, outside the reach of state control and either misunderstood or unreported in Western media, gains clarity and dimension from the fresh insights of a prominent group of activists, investigative journalists, lawyers, scholars, and travelers, who share a common interest in lessening the profound information gap between China and the rest of the world. In sixteen new essays, they address such key topics as civil society, consumerism, environmental adversity, ethnic tension, the Internet, legal reform,...
The national security of the United States depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national security has been underway since World War II and has increased with the proliferation of Internet-enabled devices. There is an increasing need to develop a robust deterrence framework within which the United States and its allies can dissuade would-be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges, including credibility, attribution, escalation and confli...
he first overview of US NC3 since the 1980s, Nuclear Command, Control, and Communications explores the current NC3 system and its vital role in ensuring effective deterrence, contemporary challenges posed by cyber threats, new weapons technologies, and the need to modernize the United States’ Cold War–era system of systems.