Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
International organization. --- Federation, International --- Global governance --- Interdependence of nations --- International administration --- International federation --- Organization, International --- World federation --- World government --- World order --- World organization --- Congresses and conventions --- International relations --- Peace --- Political science --- International agencies --- International cooperation --- Security, International --- World politics
Choose an application
Choose an application
'Powerful and compelling. One of the world's most prolific writers on military intelligence and U.S. public administration has woven together a concise and commanding book on NATO and its continued relevance in peace keeping and global security. A must read.' - Lorenda Naylor, PH.D., Associate Professor and Schaefer Center Faculty Fellow, College of Public Affairs, University of Baltimore, USA 'If you think NATO is a Cold War relic, this book will convince you of the contrary. History's longest lasting defense alliance will continue to play an important role in the XXI century. Utilizing recent information, the author explains how NATO has repeatedly risen to the occasion to address conflicts in Europe, North Africa, and the Middle East. It is also a critical approach that identifies and explains its shortcomings and new challenges.' - Javier Aguayo, PH.D., Assistant Professor of Political Science, York College of Pennsylvania, USA This book builds on the six years of hands-on experience that the author had while working in the North Atlantic Treaty Organization. It provides an overview and history of NATO, looks at the political and military components of the Alliance, as well as the military command from the perspective of real-world contemporary NATO operations and planning. The author also looks at the military training, lessons, and exercise components and how it prepares forces to support upcoming NATO Response Force (NRF) rotations to ensure that NATO is a viable threat deterrent and responsive organization to both Article 5 and non-Article 5 operations. This book will serve as a primer into the world's longest enduring Alliance and one that has made an impact on real world operations over the last 20 years in Europe (Bosnia and Kosovo), Africa (Libya), Asia (Afghanistan and Pakistan), and the Middle East (Iraq). John Michael Weaver, DPA (University of Baltimore), is Associate Professor of Intelligence Analysis, York College of Pennsylvania (USA), a retired lieutenant colonel from the US Army, and a retired civilian from the Intelligence Community of the US.
International relations. Foreign policy --- Politics --- International law --- Polemology --- Military engineering --- politiek --- internationale organisaties --- internationale betrekkingen --- defensie
Choose an application
"One of the prevailing issues regarding security to North America and more pointedly, the United States, gravitates on the topic of cyber threats confronting this nation. These threats are becoming more disruptive and destructive and many nations' infrastructure is vulnerable to them. This book makes use of a qualitative research methodology looking at a conventional understanding of the four instruments of power that include diplomacy, information, military and economic (D.I.M.E.) efforts through the use of the York Intelligence Red Team Model-Cyber (Modified) and seeing how adversaries are using them against the United States. Moreover, this project uses secondary data and makes use of the Federal Secondary Data Case Study Triangulation Model to ensure a balance of sources to dissect the problem"--Publisher's description.
Criminology. Victimology --- Law --- veiligheid (mensen) --- Cyberterrorism.
Choose an application
Intelligence service --- Political aspects. --- Counter intelligence --- Counterespionage --- Counterintelligence --- Intelligence community --- Secret police (Intelligence service) --- Public administration --- Research --- Disinformation --- Secret service
Choose an application
National security --- Strategic culture --- World politics --- Culture --- Military policy --- Homeland defense --- Homeland security
Choose an application
"The United States as the world's sole superpower is seeing its position wane as China and Russia look to reassert themselves as global powers. Moreover, there are many other security issues confronting the United States. This book provides an open source intelligence analysis of regions, countries and non-state actors from around the globe that could adversely impact the United States. Chapters in this book dissect issues using predominately qualitative analysis techniques focusing on secondary data sources in order to provide an unclassified assessment of threats as seen by the United States using two models (the York Intelligence Red Team Model and the Federal Secondary Data Case Study Triangulation Model). The key audience for this book includes the 17 members of the U.S. intelligence community, members of the U.S. National Security Council, allies of the United States, nongovernmental organizations (NGOs) looking to provide support abroad, and private sector companies considering expanding their operations overseas"--
Choose an application
"This is the second edition of an earlier work that looks at current threats to the United States. The US under a new presidential administration is looking to depart from globalization, though there are still inextricable linkages among all countries in the world. This book provides an open source intelligence analysis of regions, countries and non-state actors from around the world that could have an impact on the United States. These areas and actors are dissected using predominately qualitative analysis techniques focusing on secondary data sources in order to provide an open source intelligence look at threats as seen by the United States using two models (the York Intelligence Red Team Model and the Federal Secondary Data Case Study Triangulation Model). The key audience for this book includes the 17 members of the US intelligence community, members of the US National Security Council, governments of other countries that share the United States' assessment of current threats, nongovernmental organizations (NGOs) looking to provide support abroad, and private sector companies that are considering expanding their operations overseas"--
Choose an application
This book focuses on qualitative research centering on the "Five Eyes'' countries (the five countries with intelligence sharing relations: Australia, Canada, New Zealand, United Kingdom, and the United States) and how they are leveraging the instruments of national power to advance their position and to look for points of intersection where these countries will work with one another. This ten-chapter volume covers the following topics: overview, methodology, a chapter for each of the "Five Eyes" or FVEYs nations, analysis & findings, and conclusion. Tom Røseth, Ph.D. (University of Oslo) is an associate professor at the Norwegian Defence University College. John Michael Weaver, DPA (University of Baltimore), is Associate Professor of Intelligence Analysis, York College of Pennsylvania (USA), a retired lieutenant colonel from the US Army, and a retired civilian from the Intelligence Community of the US.
Intelligence service. --- International relations. --- World politics.
Choose an application
"One of the prevailing issues regarding security to North America and more pointedly, the United States, gravitates on the topic of cyber threats confronting this nation. These threats are becoming more disruptive and destructive and many nations' infrastructure is vulnerable to them. This book makes use of a qualitative research methodology looking at a conventional understanding of the four instruments of power that include diplomacy, information, military and economic (D.I.M.E.) efforts through the use of the York Intelligence Red Team Model-Cyber (Modified) and seeing how adversaries are using them against the United States. Moreover, this project uses secondary data and makes use of the Federal Secondary Data Case Study Triangulation Model to ensure a balance of sources to dissect the problem"--Publisher's description.
Cyberterrorism --- Computer security --- Prevention. --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Cyberterrorism.
Listing 1 - 10 of 14 | << page >> |
Sort by
|