Sign up
Forgot password?
FAQ: Login

National security policy

A
Palgrave Macmillan, 2005. — 261 p. Recent events have shown that, despite over 40 years of effort, control of weapons of mass destruction (WMD) and effective deterrence against their use are still inadequate. Cooperative solutions through verified disarmament are the best responses to this problem. The book examines the three verification organizations that form the core of the...
  • №1
  • 846,38 KB
  • added
  • info modified
Springer International Publishing AG, 2018. — 254 p. — (Ius Gentium: Comparative Perspectives on Law and Justice 64). — ISBN: 978-3-319-74472-8. This book analyzes emergency legislations formed in response to terrorism. In recognition that different countries, with different legal traditions, have different solutions, it adopts a comparative point of view. The countries...
  • №2
  • 2,63 MB
  • added
  • info modified
B
Second Edition. — Wiley, 2018. — 499 p. — ISBN: 9781119237808. A comprehensive guide to understanding, assessing, and responding to terrorism in this modern age. This book provides readers with a thorough understanding of the types of attacks that may be perpetrated, and how to identify potential targets, conduct a meaningful vulnerability analysis, and apply protective...
  • №3
  • 17,69 MB
  • added
  • info modified
Frank Cass, London, Portland, 2005. — 204 p. Intelligence and the Problem of Strategic Surprise. Michael I.Handel Politicization of Intelligence: Costs and Benefits. Richard K.Belts Intelligence Failures: Forecasting and the Lessons of Epistemology. Woodrow J.Kuhns Theory of Surprise. James J.Wirtz ‘Fortidude’ in Context: The Evolution of British Military. Deception in Two...
  • №4
  • 1,96 MB
  • added
  • info modified
Noida, India: Gopsons Papers Limited, 2004. — 471 p. China 1945 to 1960s: Was Mao Tse-tung just paranoid? Italy 1947-1948: Free elections, Hollywood style. Greece 1947 to early 1950s: From cradle of democracy to client state. The Philippines 1940s and 1950s: America's oldest colony. Korea 1945-1953: Was it all that it appeared to be? Albania 1949-1953: The proper English spy....
  • №5
  • 3,50 MB
  • added
  • info modified
Mönch Publishing Group, 1992. — 164 p. — ISSN: 0722-3226. The World Defence Almanac is the most up-to-date study of defense forces in the world. As a reference, it provides a comprehensive review of force structures, organization and inventories. Divided up by separate countries, each entry gives a wealth of information about that country and its defences, including population...
  • №6
  • 55,55 MB
  • added
  • info modified
Glasgow UK: William Collins Sons & Co. Ltd.,1978. — 318 p. —ISBN: 0-00-635241-3 English. The CIA. This book is an exercise in citizens' intelligence. The author and the majority of those who've contributed to it are private citizens working on their own in a synergistic effort, without major funding or corporate support, without government privilege or "need to know," other...
  • №7
  • 2,93 MB
  • added
  • info modified
Boulder, CO: Lynne Rienner Publishers Inc., 1998. — 239 p. — ISBN: 1-55587-784-2. Traditionalists in the field of security studies tend to restrict the subject to politico military issues; while wideners want to extend it to the economic, societal, and environmental sectors. This book sets out a comprehensive statement of the new security studies, establishing the case for the...
  • №8
  • 6,61 MB
  • added
  • info modified
C
Thomas Allen & Son Limited, 2019. — 289 p. From an FBI insider, a riveting, fly-on-the-wall account of the historic investigation into the Trump campaign's ties to Russia and the president's unprecedented attacks on the bureau - and a passionate defense of the men and women who work every day to uphold democratic institutions and the rule of law. Titled after the FBI code name...
  • №9
  • 1,16 MB
  • added
  • info modified
University of California Press, 2007. — 488 p. This authoritative work provides an essential perspective on terrorism by offering a rare opportunity for analysis and reflection at a time of ongoing violence, chilling threats, and renewed reprisals. In it, some of the best international specialists working on the subject today examine terrorism's long and complex history from...
  • №10
  • 4,15 MB
  • added
  • info modified
Penguin Books; Reprint edition (December 28, 2004). — 738 p. Steve Coll's study "Ghost Wars" is the most comprehensive study of the CIA and other secret services operating in Afghanistan covering the twenty odd years preceding the September 11th attack that I have read so far. The account is based on an impressive bibliography and large number of interviews. It is factual, but...
  • №11
  • 1002,25 KB
  • added
  • info modified
Penguin Books; Reprint edition (December 28, 2004). — 738 p. Steve Coll's study "Ghost Wars" is the most comprehensive study of the CIA and other secret services operating in Afghanistan covering the twenty odd years preceding the September 11th attack that I have read so far. The account is based on an impressive bibliography and large number of interviews. It is factual, but...
  • №12
  • 585,29 KB
  • added
  • info modified
Penguin Books; Reprint edition (December 28, 2004). — 738 p. Steve Coll's study "Ghost Wars" is the most comprehensive study of the CIA and other secret services operating in Afghanistan covering the twenty odd years preceding the September 11th attack that I have read so far. The account is based on an impressive bibliography and large number of interviews. It is factual, but...
  • №13
  • 792,78 KB
  • added
  • info modified
Routledge, Taylor and Francis, 2015. — 237 p. Critical Security Studies introduces students of Politics and International Relations to the sub-field through a detailed yet accessible survey of emerging theories and practices. Written in an accessible and clear manner, this textbook: offers a comprehensive and up-to-date introduction to critical security studies locates critical...
  • №14
  • 361,48 KB
  • added
  • info modified
Copyright by M. Paul Cook, 2005. - 440 p. The Legacy. The Air Force – Spiralling out of Control . Fixed Wing Fighter and Bomber Aircraft. Transport Aircraft. Helicopters. The Army– Grinding to a Halt . Light Armour. The Liberal Tank Fiasco, and the ‘Light Force’ Lie. The Navy– Struggling to Remain Afloat. Attack on Canada’s Sovereignty. Attack on National Unity. Is there the...
  • №15
  • 8,49 MB
  • added
  • info modified
Washington: US Government printing office, 1975. — 66 p. Overview and Background Overview: Covert Action in Chile Issues Historical Background in Recent United States-Chilean Relations The Ringe of Covert Action in Chile Covert Action and other Clandestine Activities Covert Action in Chile: Techniques Covert Action and Multinational Corporations Major Covert Action Programs and...
  • №16
  • 4,09 MB
  • added
  • info modified
D
IOS Press, 2007. — 397 p. This publication concerns three main topics: Dynamics of effective international cooperation against terrorism: Facilitators and barriers; Law enforcement response to terrorism in different countries and regions; Emergency management lessons for Homeland Security. On the first topic on the role of international organizations, the barriers for...
  • №17
  • 2,03 MB
  • added
  • info modified
F
Cambridge University Press, 2004. — 219 p. The nations that drafted theUNCharter in 1945 clearly were more concerned about peace than about justice. As a result, the Charter prohibits all use of force by states except in the event of an armed attack or when authorized by the Security Council. This arrangement has only very imperfectly withstood the test of time and changing...
  • №18
  • 984,71 KB
  • added
  • info modified
G
Random House; Kindle Edition (14 Sep 2004), — 296 p. In this explosive, controversial, and profoundly alarming insider’s report, Senator Bob Graham reveals faults in America’s national security network severe enough to raise fundamental questions about the competence and honesty of public officials in the CIA, the FBI, and the White House. For ten years, Senator Graham served...
  • №19
  • 327,98 KB
  • added
  • info modified
I.B.Tauris & Co Ltd, 2006, ISBN10: 1 85043 803 X, pages 284. Introduction: a day of infamy. A clash of civilizations? Blowback. Diversion. Spoiler violence. Breakdown. Revenge and spill-over. A logic of escalation? Counter-terrorism. Peace processes and terrorism. Injustice and inequality. Conclusion: terrorism and global disorder. Concise bibliography.
  • №20
  • 1,88 MB
  • added
  • info modified
H
Russia and Eurasia Programme, November 2014., Р.20 Research Paper John Heathershaw and David W. Montgomery Russia and Eurasia Programme November 2014 The Myth of Post-Soviet Muslim Radicalization in the Central Asian Republics. Analysts of political Islam in the West are frequently caught between the accusation of ‘Islamophobia’ and the risk of denying the reality of violence...
  • №21
  • 1,37 MB
  • added
  • info modified
Cambridge University Press, 2007. — 379 p. The Matador’s Cape delves into the tangled causes and devastating consequences of American policy at home and abroad since 9/11. In a collection of searing essays, the author explores Washington’s seemingly chronic inability to bring “the enemy” into focus, detailing the ideological, bureaucratic, electoral, and (not least) emotional...
  • №22
  • 1,19 MB
  • added
  • info modified
Oxford University Press, 2022. — 320 p. Immigration is a divisive policy issue in modern liberal democracies. A common worry is that immigration poses a threat to social cohesion, and so to the social unity that underpins cooperation, stable democratic institutions, and a robust welfare state. At the heart of this worry is the suggestion that social cohesion requires a shared...
  • №23
  • 1,68 MB
  • added
Washington: The Jamestown Foundation, 2019. — 476 p. — ISBN: 978-0-9986660-1-3 Russia’s Military Strategy and Doctrine is designed to educate Russia watchers, policymakers, military leaders, and the broader foreign policy community about the Russian Armed Forces and security apparatus across the full spectrum of geographic, doctrinal and domain areas. Each chapter addresses a...
  • №24
  • 2,09 MB
  • added
  • info modified
K
Berkeley and Los Angeles: University of California Press, 1967. — 287 p. This survey has military policy in its defense aspect in India, throwout British government to independent India. It shows how Indian authorities deals with border problems and how this gaps determinate their foreign policy.
  • №25
  • 11,13 MB
  • added
  • info modified
L
Routledge, 2017. — 292 p. — ISBN: 978-0-765807-99-8. Assassinations, bombings, hijackings, diplomatic kidnappings-terrorism is the most publicized form of political violence. The history of terrorism goes back a very long time, but the very fact that there is such a history has frequently been ignored, even suppressed. This may be because terrorism has not appeared with equal...
  • №26
  • 1,89 MB
  • added
  • info modified
New York: McGraw-Hill Book Co., 1950. — xiii, 259 p. The research program initiated in 1942, during World War II, by the Committee for Economic Development has as its focus a study of the chief economic factors affecting the maintenance of high stable production and employment. It is revealing of the tumult in the postwar world that this report on National Security and...
  • №27
  • 13,50 MB
  • added
  • info modified
Routledge, 2007. — 439 p. Providing a wealth of empirical research on the everyday practice of Islam in post-Soviet Central Asia, this book gives a detailed account of how Islam is understood and practised among ordinary Muslims in the region, focusing in particular on Uzbekistan. It shows how individuals negotiate understandings of Islam as an important marker for identity,...
  • №28
  • 1,38 MB
  • added
  • info modified
M
Cambridge University Press, 2008. — 251 p. What is terrorism and can it ever be defended? Beginning with its definition, proceeding to its possible justifications, and culminating in proposals for contending with and combating it, this book offers a full theoretical analysis of the issue of terrorism. Tamar Meisels argues that, regardless of its professed cause, terrorism is...
  • №29
  • 1,14 MB
  • added
  • info modified
Princeton, Woodstock: Princeton University Press. 2012. 288 p. ISBN: 978-0-691-16358-1 The inspections we put up with at airport gates and the endless warnings we get at train stations, on buses, and all the rest are the way we encounter the vast apparatus of U.S. security. Like the wars fought in its name, these measures are supposed to make us safer in a post–9/11 world. But...
  • №30
  • 940,43 KB
  • added
  • info modified
Collection of articles. London,Palgrave, 2008. -273 p. The book provides an examination of the policies,discourse,laws and counter-terrorist practice of the United Kingdom's war on terror and focusses on intelligence.
  • №31
  • 1,46 MB
  • added
  • info modified
N
The white hause Washington DC. — 29 p. Security Strengthen Our National Defense Reinforce Homeland Security Combat the Persistent Threat of Terrorism Build Capacity to Prevent Conflict Prevent the Spread and Use of Weapons of Mass Destruction Confront Climate Change Assure Access to Shared Spaces Increase Global Health Security Prosperity Put Our Economy to Work Advance Our...
  • №32
  • 445,77 KB
  • added
  • info modified
Gefen Publishing House, 2013. — 232 p. On July 4, 1976, more than a hundred hostages, held at gunpoint in Entebbe, Uganda, were freed in a spectacular rescue operation and flown to safety in Israel, over 2000 miles away. Their captors were Arab and German terrorists, aided by the Ugandan army; their liberators were members of Israel's elite commando unit, Sayeret Matkal, simply...
  • №33
  • 2,51 MB
  • added
  • info modified
P
Praeger, 2015. — 259 p. This expert's view into the strategic directions, tactics, leaders, and significant attacks connected to Chechen and North Caucasus terrorists examines the network's operations as well as the success of Russia's counterterrorist responses. - Discusses different strands of terrorist movements that emerged over time in the North Caucasus - Includes tables,...
  • №34
  • 3,33 MB
  • added
  • info modified
R
Karachi: Oxford University Press; London & New Jersey: Zed Books, 1994. — x, 278 p. — (Politics in contemporary Asia). — ISBN: I 8S649 132. The author focuses on the underlying issues confronting these societies today - the legacy of Soviet rule; ethnic tensions: the position of women: the future of Islam; the question of nuclear proliferation; and the economic and...
  • №35
  • 12,03 MB
  • added
  • info modified
Cambridge University Press, 2007. — 360 p. Lively political and public debates on war and morality have been a feature of the post-Cold War world. The Price of Peace argues that a re-examination of the just war tradition is therefore required. The authors suggest that, despite fluctuations and transformations in international politics, the just war tradition continues to be...
  • №36
  • 2,54 MB
  • added
  • info modified
S
Springer, 2019. — 726 p. — ISBN: 978-981-13-0227-5. This handbook deals with various financial instruments, policies, and strategies in a policy-oriented approach for financing green energy projects. Recently, global investment in renewables and energy efficiency has declined, and there is a risk that it will slow further, Clearly, fossil fuels still dominate energy...
  • №37
  • 15,37 MB
  • added
  • info modified
New York: Columbia University Press, 2001. — xii, 276 p. — ISBN: 0-231-12228-4. Ethnic conflicts have created crises within NATO and between NATO and Russia, produced massive flows of refugees, destabilized neighboring countries, and increased the risk of nuclear war between Pakistan and India. Interventions have cost the United States, the United Nations, and other actors...
  • №38
  • 2,24 MB
  • added
  • info modified
Oxford University Press, 1996. — 224 p. Science of Coercion provides the first thorough examination of the role of the CIA, the Pentagon, and other U.S. security agencies in the evolution of modern communication research, a field in the social sciences which crystallized into a distinct discipline in the early 1950s. Government-funded psychological warfare programs underwrote...
  • №39
  • 10,35 MB
  • added
  • info modified
Policy Research Papers. Barcelona: CIDOB, June 2013, 23 p. The report was prepared as part of the international project “Sources of Tension in Afghanistan and Pakistan - Regional Perspectives” under the auspices of the Barcelona Center for International Affairs (CIDOB). The Regional Dimension First Tier: Pakistan & Iran Second Tier: China, India, Central Asia, Russia Third...
  • №40
  • 221,17 KB
  • added
  • info modified
Oxford University Press, 2008. — 200 p. SIPRI Research Report No. 23 Introduction: terrorism and asymmetry Ideological patterns of terrorism: radical nationalism Ideological patterns of terrorism: religious and quasi-religious extremism Organizational forms of terrorism at the local and regional levels Organizational forms of the violent Islamist movement at the transnational level
  • №41
  • 927,12 KB
  • added
  • info modified
Carnegie Endowment for International Peace, 2013 -422 p. China’s growing military capabilities and presence could even weaken Japanese confidence in America’s security commitment to Tokyo and increase support in Japan for a much larger and offensive-oriented conventional military — and perhaps even for the acquisition of nuclear weapons. Thus, if Tokyo and Washington do not...
  • №42
  • 3,81 MB
  • added
  • info modified
T
November 2009. Issue Twelve. Contents:Introduction Can the European Security Dialogue Return Russia the Sense of Ownership of the OSCE? Russia and the OSCE Human Dimension: a Critical Assessment Russia and Its Commitments in the Politico Politico-Military Dimension of the OSCE Russia and OSCE Operations in Eastern Europe (Belarus, Moldova and Ukraine)
  • №43
  • 698,17 KB
  • added
  • info modified
Washington: The White House, 2017. — 68 p. Protect the American People, the Homeland, and the American Way of Life. Secure U.S. Borders and Territory. Defend Against Weapons of Mass Destruction (WMD). Combat Biothreats and Pandemics. Strengthen Border Control and Immigration Policy. Pursue threats to their Source. Defeat Jihadist Terrorists. Dismantle Transnational Criminal...
  • №44
  • 1,75 MB
  • added
  • info modified
2nd edition. — NY: CRC Press, 2010. — 582 p. — (Public administration and public policy. Book 156). — ISBN: 978-1-4200-7181-8. Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects. Taking into account these practical considerations,...
  • №45
  • 6,63 MB
  • added
  • info modified
W
L.: Routledge, 2010. - 232 p. Religion and security play an important role in traditional societies. In South and Central Asia, traditional and moderate Islamic beliefs and practices with strong indigenous and Sufi content are diametrically opposed to radical Wahabi and Taliban brands of Islam intolerant of other cultures and groups. The emergence of radical extremist and...
  • №46
  • 1,89 MB
  • added
  • info modified
Columbia University Press, 2015. — 309 p. The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in Cyberspace, the successor to his seminal Terror on the Internet. Even though al-Qaeda's leadership has been largely destroyed and its organization disrupted, terrorist attacks take 12,000 lives annually worldwide, and jihadist terrorist ideology continues to...
  • №47
  • 1,34 MB
  • added
  • info modified
Verlag: S. Fischer, 2008 - 864 Seiten. Es war nie ein Geheimnis, dass die CIA Leichen im Keller hat. Doch was Tim Weiner in über zwanzig Jahren Recherche zusammengetragen hat, geht weit über alle bisherigen Veröffentlichungen zur CIA hinaus und lässt zahlreiche weltpolitische Ereignisse – beginnend mit dem Korea-Krieg bis hin zum 11. September – und ihre Akteure in neuem Licht...
  • №48
  • 3,10 MB
  • added
  • info modified
There are no files in this category.

Comments

There are no comments.
Up