|
Lost in transformation
|
Audra Mitchell |
"Peace interventions can promote violence, while conflict may be a crucial means for constraining and preventing it. This book explores these statements, re-thinking the relationships between peace, … |
OL16114226W |
|
Permanent emergency
|
Edmund S. Hawley |
"Since 2001 the TSA has accepted responsibility for protecting over two million people a day at U.S. airports and managing transportation operations around the world. But how effective is this beleag… |
OL16135166W |
|
Pandemic planning
|
David R. Black,J. Eric Dietz |
"Offering research and evidence-based guidelines for strategic plan development, this book draws on the lessons learned over three years of pandemic preparedness exercises. Collaborating with nationa… |
OL16557597W |
|
Rethinking the Vietnam War
|
John Dumbrell |
"This incisive new text provides a broad-ranging reassessment of the Vietnam war and its political and historical significance for America, Vietnam itself, their allies, the region and the world. Joh… |
OL16694930W |
|
Kill chain
|
Andrew Cockburn,Cockburn, Andrew |
"For the first time in our military history, how we wage war is being built around a single strategy: the tracking and elimination of "high value targets"--In other words, assassination by military d… |
OL17225367W |
|
The invisible soldiers
|
Ann Hagedorn |
"The story behind the ultimate American privatization, which has taken place gradually and almost invisibly: how we privatized our national security"-- |
OL17880486W |
|
The Snowden files
|
Luke Harding |
"IT BEGAN WITH A TANTALIZING, ANONYMOUS EMAIL: "I AM A SENIOR MEMBER OF THE INTELLIGENCE COMMUNITY." What followed was the most spectacular intelligence breach ever, brought about by one extraordinar… |
OL19710335W |
|
Storming the wall
|
Todd Miller,Tim Pabon |
"According to U.S. military planners, climate change now poses the #1 national security threat to the United States, even before terrorism. The Internal Displacement Monitoring Centre reports that a … |
OL19721814W |
|
Spying on democracy
|
Heidi Boghosian |
"Personal information contained in your emails, phone calls, GPS movements and social media is a hot commodity, and corporations are cashing in by mining and selling the data they collect about our p… |
OL19968860W |
|
Intelligence
|
James J. Wirtz,Loch K. Johnson |
"Intelligence: The Secret World of Spies, An Anthology, Fourth Edition, is the most up-to-date reader in intelligence studies. Editors Loch K. Johnson and James J. Wirtz present a diverse, comprehens… |
OL19983967W |
|
National insecurity
|
David J. Rothkopf |
"During the past decade America has crossed the fine line that separates national security from national insecurity. Major misadventures like the invasion of Iraq, the embrace of torture, the expansi… |
OL19987966W |
|
Don't wait for the next war
|
Wesley K. Clark |
"Can America have a real national strategy and move forward together without the focus of war? In the twentieth century, America came together to become the "Arsenal of Democracy," and emerged from W… |
OL19988520W |
|
The war on leakers
|
Lloyd C. Gardner |
"Four days before Pearl Harbor, in December 1941, someone leaked American contingency war plans to the Chicago Tribune. The small splash the story made was overwhelmed by the shock waves caused by th… |
OL20023203W |
|
The 50 worst terrorist attacks
|
Edward F. Mickolus |
"In the last 50 years, terrorists have committed hundreds of horrific acts of violence to further their causes. This accessible, single-volume text covers the most significant terrorist acts across c… |
OL20030464W |
|
China's Global Engagement
|
Avery Goldstein,Jacques deLisle |
viii, 439 pages ; 23 cm |
OL20210144W |
|
The handbook of security
|
M. L. Gill |
"The fully revised second edition of the Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. Including contributions from some of the world… |
OL23197130W |
|
Chechnya's terrorist network
|
Elena Pokalova |
"This expert's view into the strategic directions, tactics, leaders, and significant attacks connected to Chechen and North Caucasus terrorists examines the network's operations as well as the succes… |
OL23214758W |