Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe Praeger Security International

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • - Financing Terrorism through Organized Crime
     
    105,00 €

    This cohesive set of case studies collects scholarly research, policy evaluation, and field experience to explain how terrorist groups have developed into criminal enterprises.Terrorist groups have evolved from orthodox global insurgents funded by rogue sponsors into nimble and profitable transnational criminal enterprises whose motivations are not always evident. This volume seeks to explain how and why terrorist groups are often now criminal enterprises through 12 case studies of terrorist criminal enterprises written by authors who have derived their expertise on terrorism and/or organized crime from diverse sources. Terrorist groups have been chosen from different regions to provide the global coverage.Chapters describe and analyze the actors, actions, problems, and collaborations of specific terrorist criminal enterprises. Other elements discussed include links to such facilitating conditions as political culture, corruption, history, economy, and issues of governance. This work advances scholarship in the field of counterterrorism by expanding the understanding of these terrorist groups as entities not driven purely by ideology but rather by the criminal enterprises with which they often coincide.

  • von William A. Taylor
    106,00 €

  • von Ofer Israeli
    106,00 €

    "This book tries to answer two key questions. The first is why certain periods are more prone to war than others. The other is why certain wars that involve polar powers end with their territorial expansion whereas other wars end in their contraction or maintaining their territorial status. In conclusion, it is asked whether the polarity of the system affects these two outcomes, and if so, how"--

  • - The U.S. and Russian Espionage Game from the Cold War to the 21st Century
    von Sean N. (U.S. Army Command and General Staff College Kalic
    106,00 €

    In the post-World War II era, the Soviet Union and the United States wanted to gain the advantage in international security. Both engaged in intelligence gathering. This book provides a comprehensive understanding of the evolution of the espionage game.For more than four decades after World War II, the quest for intelligence drove the Soviet Union and the United States to develop a high-stakes "game" of spying on one another throughout the Cold War. Each nation needed to be aware of and prepared to counter the capabilities of their primary nemesis. Therefore, as the Cold War period developed and technology advanced, the mutual goal to maintain up-to-date intelligence mandated that the process by which the "game" was played encompass an ever-wider range of intelligence gathering means. Covering far more than the United States and Soviet Union's use of human spies, this book examines the advanced technological means by which the two nations' intelligence agencies worked to ensure that they had an accurate understanding of the enemy.The easily accessible narrative covers the Cold War period from 1945 to 1989 as well as the post-Cold War era, enabling readers to gain an understanding of how the spies and elaborate espionage operations fit within the greater context of the national security concerns of the United States and the Soviet Union. Well-known Cold War historian Sean N. Kalic explains the ideological tenets that fueled the distrust and "the need to know" between the two adversarial countries, supplies a complete history of the technological means used to collect intelligence throughout the Cold War and into the more recent post-Cold War years, and documents how a mutual desire to have the upper hand resulted in both sides employing diverse and creative espionage methods.

  • - Combatting Global Hunger and Forging a Path to Food Sovereignty
    von William D. (University of South Florida Schanbacher
    106,00 €

    This important work addresses the difficult ethical issues surrounding the accessibility of food to all people as a human right, and not a privilege that emerges because of social structure or benefit of geography.Food sovereignty-the right of peoples to define their own chosen food and agriculture, free of monopolization or threats-is the path to stopping global hunger. This book approaches the topic from a solutions-based perspective, discussing concrete policy providing for sovereignty, or control, of one's own food sources as a solution that, while controversial, offers more promise than do the actions of international organizations and trade agreements. Providing access to safe, healthy food is an ethical responsibility of the world's nations, not just a right of the elite or wealthy.This book presses the need to formulate policies that address the problems of poverty and hunger on a more humane and meaningful level. Organized thematically, chapters are based on such topics as food security, food sovereignty, human rights, and sustainability that focus on the global food system. Specific case studies provide examples of global hunger and poverty issues. Taken in its entirety, the book informs readers of how their food consumption might negatively affect the global poor, while its concluding chapters offer solutions for alleviating problems in the global food system.

  • - Understanding the Domestic and International Terrorist Threat
    von Thomas R. (DePaul University Mockaitis
    106,00 €

    Written for the general reader as well as the professional, this succinct but comprehensive work examines the hybrid nature of the two violent extremist movements threatening the United States: Islamist extremism and white nationalism.Scholarship as well as popular discourse on terrorism often focuses disproportionately on specific groups without paying sufficient attention to the ideology that motivates them. This book emphasizes understanding and countering the ideology that fuels extremism over preoccupation with specific organizations such as Al Qaeda or ISIS. It sets contemporary terrorist threats in perspective, avoiding fear-mongering and political rhetoric.The book examines the nature of violent extremism today in all its forms, including lone wolves and cyber threats. Focusing on the threats posed by both international and domestic terrorism, it analyzes each in depth as a multidimensional hybrid phenomenon: each threat exists as an ideology, as distinct groups espousing that ideology, and as a network of followers. Short, easy-to-read chapters take readers through the subject matter in a clear, methodical manner. Written in an accessible style by an author who has studied terrorism for more than 30 years and provided extensive media coverage on the subject, the work is a valuable addition to the literature on violent extremism.

  • - Lessons from the Past and Present
    von Max G. (U.S. Army War College Manwaring
    105,00 €

    This book will help civilian and military leaders, opinion makers, scholars, and interested citizens come to grips with the realities of the 21st-century global security arena by dissecting lessons from both the past and the present.This book sets out to accomplish four tasks: first, to outline the evolution of the national and international security concept from the Treaty of Westphalia (1648) to the present; second, to examine the circular relationship of the elements that define contemporary security; third, to provide empirical examples to accompany the discussion of each element-security, development, governance, and sovereignty; and fourth, to argue that substantially more sophisticated stability-security concepts, policy structures, and policy-making precautions are required in order for the United States to play more effectively in the global security arena.Case studies provide the framework to join the various chapters of the book into a cohesive narrative, while the theoretical linear analytic method it employs defines its traditional approach to case studies. For each case study it discusses the issue in context, findings and outcomes of the issue, and conclusions and implications. Issue and Context sections outline the political-historical situation and answers the "What?" question; Findings and Outcome sections answer the "Who?", "Why?", "How?", and "So What?" questions; and Conclusions and Implications sections address Key Points and Lessons.

  • von Hamilton Bean
    105,00 €

    "This timely book provides the inside story of the development of mobile public alert and warning technology in the United States and addresses similar systems being used in Australia, Canada, Japan, and the Netherlands"--

  •  
    73,00 €

    A comprehensive textbook that overviews common technologies utilized within the homeland security enterprise with an emphasis on contemporary homeland security mission areas and end-user applications.

  • von Ryan K. Baggett & Brian K. Simpkins
    108,00 €

    Since the first edition of this book was published in 2009, significant changes have occurred in the security landscape, both domestically and internationally. This second edition is thoroughly updated to reflect those changes, offering a complete review of the various security and resilience measures currently in place and potential strategies to safeguard life and property within the U.S. homeland. As noted in the U.S. Department of Homeland Security's National Preparedness Goal, the mission area of protection is vital to the homeland in its focus on actions to protect people, vital interests, and our nation's way of life. With that in mind, this book discusses strategies such as risk analysis and assessment, information sharing, and continuity planning. The authors focus on relevant and timely threats and hazards facing specific infrastructure components including, but not limited to, agriculture and food, banking and finance, water, energy, telecommunications, and transportation. The dynamic posture of critical infrastructure security and resilience (CISR) underscores the importance of an integrated, layered all-hazards approach. In describing this approach, the book includes new chapters on planning and guidance, public and private partnerships, cyber issues and threats, and careers in infrastructure protection. Additions such as discussion questions, learning objectives, and fundamental concepts for each chapter provide additional direction for instructors and students alike.

  • - How to Think Critically in Complex Environments
    von Wayne Michael (CEO Hall
    107,00 €

    This comprehensive work provides a treasure trove of ways to seek, find, and use the power of will to gain an advantage over one's opponents in mental conflicts.Will has been-and always will be-the basis for succeeding in any conflict or competition. To win in a conflict or competition, decision-makers must comprehend the meaning and implications of will and successfully transform theories about it into practice. In the 21st century, it is especially important for military leaders and security professionals to comprehend will in sufficient depth to enable them to impose their will on other resisting entities and learn how to block or parry their adversaries' efforts to impose their will on them. This book will go a long way in helping decision-makers achieve these goals.Each chapter in this book addresses one of 14 elements that will help readers to use will successfully over their adversaries: life-force, purpose, strength of motive, capabilities, determination, perseverance, sacrifice, passion, advantage, disadvantage, imposition, action, assessment, and adaptation. The book also provides readers with 18 considerations that will serve them well in all types of conflicts. This book will be particularly beneficial to decision-makers in the military, law enforcement, and business, as well as attorneys and judges.

  • - Conflict in the Digital Realm
    von Nicholas Michael Sambaluk
    106,00 €

    This illuminating book examines and refines the commonplace "wisdom" about cyber conflict-its effects, character, and implications for national and individual security in the 21st century."Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations connected to social media's role in digital struggle.The author discusses numerous mythologies about cyber warfare, including its presumptively instantaneous speed, that it makes distance and location irrelevant, and that victims of cyber attacks deserve blame for not defending adequately against attacks. The author outlines why several widespread beliefs about cyber weapons need modification and suggests more nuanced and contextualized conclusions about how cyber domain hostility impacts conflict in the modern world.After distinguishing between the nature of warfare and the character of wars, chapters will probe the widespread assumptions about cyber weapons themselves. The second half of the book explores the role of social media and the consequences of the digital realm being a battlespace in 21st-century conflicts. The book also considers how trends in computing and cyber conflict impact security affairs as well as the practicality of people's relationships with institutions and trends, ranging from democracy to the Internet of Things.

  • - Is the Atlantic Alliance Still in America's Interest?
    von Wesley B. Truitt
    106,00 €

    Is NATO still in the best interest of the United States? This provocative work argues that the focus on NATO distracts the U.S. from the vital foreign policy challenges of the 21st century, most notably China's rise in power.Since its beginning in 1949, NATO-the North Atlantic Treaty Organization-has been at the center of U.S. foreign policy. The alliance was crucial during the decades of the Cold War, and the United States collaborated closely with NATO during crises in Kosovo, Afghanistan, and Libya. But does the NATO alliance still serve the best interests of the U.S.?The NATO of today-one that has expanded to 30 member countries-risks involving the U.S. in unwanted military activities of the future, actions that were not intended in the original Atlantic alliance. In addition, the real challenges for foreign policy of 21st century are not in Europe, but in the expanding economic powerhouses in Asia, especially China. NATO Reconsidered argues that the changes in world politics in recent decades requires that the more than 70-year-old alliance should no longer be the principal focus of U.S. foreign policy.

  • - Strategic Thinking and Strategy Formulation in the 21st Century
    von Harry R. Yarger
    90,00 €

    A reference for national security professionals, political appointees in the security realm, and others who participate in the formulation, evaluation, and execution of strategy, in addition to those who study and follow national security debates.

  • von Nawaf Obaid
    107,00 €

    "This book is an indispensable resource for anyone looking to understand the Muslim Brotherhood, Qatar's role in promoting the group, and the ideological, social, and religious factors that have led to its ultimate failure"--

  • - Why Some Soldiers Are Better Than Others
    von Bruce Newsome
    78,00 €

    Why do the combat capabilities of individual soldiers vary so much? In this first social scientific study of the effectiveness of combat troops, Newsome evaluates competing explanations for the varying combat capabilities and performances. There are four main explanations, each emphasizing the influence of a single factor.

  • von Eyal Ben-Ari, Kobi Michael & David Kellen
    106,00 €

    With the end of the Cold War, the euphoria of the Gulf War of the 1990s and the avowal of a New World Order, peace-operations were declared as the recipe for a better world through international intervention in conflict arenas.

  • - The Failure of the Obama Doctrine
    von Edward A. Lynch
    106,00 €

    This title provides a succinct, readable, and comprehensive treatment of how the Obama administration reacted to what was arguably the most difficult foreign policy challenge of its eight years in office: the Arab Spring.As a prelude to examining how the United States reacted to the first wave of the Arab Spring in the 21st century, this book begins with an examination of how the U.S. reacted to revolution in the 19th and 20th centuries and a summary of how foreign policy is made. Each revolution in the Arab Spring (in Tunisia, Egypt, Libya, Syria, Bahrain, and Yemen) and the Obama administration's action-or inaction-in response is carefully analyzed. The U.S.' role is compared to that of regional powers, such as Turkey, Israel, and Iran. The impact of U.S. abdication in the face of pivotal events in the region is the subject of the book's conclusion.While other treatments have addressed how the Arab Spring revolutions have affected the individual countries where these revolutions took place, U.S. foreign policy toward the Middle East, and President Barack Obama's overall foreign policy, this is the only work that provides a comprehensive examination of both the Arab Spring revolutions themselves and the reaction of the U.S. government to those revolutions.

  • - The Threat of Militant Islamic Fundamentalism
    von Fereydoun Hoveyda
    50,00 - 117,00 €

    This text explores the historical and contemporary causes of militant Islamic fundamentalism. It also shows why, despite their terrorist attacks on the West, fundamentalists are even more dangerous to Muslim countries that want to join the global economy.

  • von Frederick Mattis
    87,00 €

    The threat of weapons of mass destruction is still viable, and unless proper motions are made to prohibit this, global safety is still at risk. Prior arms control agreements have moved humanity within striking distance of global prohibition, yet these weapons of mass destruction remain. This enlightening work discusses original principles for a treaty banning nuclear and chem-bio weapons worldwide. Mattis argues that a proposed new nuclear treaty, replacing today's inadequate 1968 Non-Proliferation Treaty, would demand unanimous accession by States which must be achieved before such a treaty enters into force. By asking essential questions, and offering value-creative proposals for nuclear treaty provisions, this work offers a clear path to the daylight of worldwide weapons of mass destruction prohibition.Not only is global safety threatened by the use of nuclear and chem-bio weapons, but more inclusively, today, society is at risk of nuclear weapons being stolen or acquired by terrorists for purposes of destruction. This risk lends to a necessary treaty that would require down-blending of highly enriched uranium to low-enriched uranium to eliminate this prospect. The heart of this work is its delineation of necessary elements for a nuclear ban treaty that addresses inevitable concerns of all States, especially today's nine nuclear weapon States. Mattis addresses 17 major proposed treaty provisions that include: how to suitably ascertain "e;unanimous accession"e; by states to a nuclear ban treaty (unanimity being a condition for entry into force); requirement that states be signatories to the current chemical and biological weapons bans [CWC/BWC] prior to signing a nuclear ban treaty; "e;non-withdrawal"e; by states from the treaty once it is in effect; necessary and new verification elements for banning nuclear weapons; the establishment, via nuclear ban provision, of "e;non-withdrawal"e; from the CWC and BWC. By asking essential questions, and offering illuminating proposals for nuclear ban treaty provisions, the work offers a path to a safer future through worldwide prohibition of weapons of mass destruction.

  • von James J. F. Forest
    107,00 €

    This book brings together three important dimensions of our everyday lives. First is digital-the online ecosystem of information providers and tools, from websites, blogs, discussion forums, and targeted email campaigns to social media, video streaming, and virtual reality. Second, influence-the most effective ways people can be persuaded, in order to shape their beliefs in ways that lead them to embrace one set of beliefs and reject others. And finally, warfare-wars won by the information and disinformation providers who are able to influence behavior in ways they find beneficial to their political, social, and other goals.The book provides a wide range of specific examples that illustrate the ways people are being targeted by digital influencers. There is much more to digital influence warfare than terrorist propaganda, "e;fake news,"e; or Russian efforts to manipulate elections: chapters examine post-truth narratives, fabricated "e;alternate facts,"e; and brainwashing and disinformation within the context of various political, scientific, security, and societal debates. The final chapters examine how new technical tools, critical thinking, and resilience can help thwart digital influence warfare efforts.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.