Catalog Search Results
Author
Description
From the earliest human records, warfare has been both an organizing focus and a prime source of political motivation. Countless battles have been fought in the course of colonizing the planet, and the experience has created a legacy of military confrontation that many people consider immutable. Since preparations for war and the occasional conduct of it have been central preoccupations for virtually all the major states throughout time, it is widely...
Author
Description
"Hulnick explains the need to revamp U.S. intelligence operations from a system focused on a single Cold War enemy to one offering more flexibility in combating non-state actors (including terrorists, spies, and criminals) like those responsible for the attacks of September 11, 2001. Offering possible solutions not to be found in the federal commission's official report, Hulnick's work examines what is really necessary to make intelligence and homeland...
Description
"The United Nations' 50th anniversary in 1995 prompted the world to reflect on how peacekeeping has changed over the decades. Soldiers for Peace, an anthology of thirteen essays by journalists, peacekeepers, and military historians - often in provocative disagreement with one another - provides a substantive, objective overview for buffs, students, and general readers - anyone who wants to get smart fast about this vital subject." "Essays include...
Author
Description
American Reference Books Annual Rimanelli offers a mammoth book with quite a few commendable features-thousands of entries, helpful organizational charts, lists of acronyms, photographs of key players, a committees listing, a detailed chronology of NATO's history, and an extensive bibliography.This title would be a useful addition to every library if an interest in European history, politics, and international relations exists.
12) Cyber blockades
Author
Description
This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise...
Author
Description
A diplomatic historian examines six major international wars involving the United States and concludes that American involvement was unjustified in each case. America's national security was not in fact sufficiently threatened to merit a call to arms. The author analyzes the events leading up to each war and the justification of wars in general. His book combines lively history with lucid and relevant general argument.
Author
Description
How does the United States use its enormous power in the world? According to the author, the United States furnishes to other countries the services that governments provide within the countries they govern. He describes the contributions that American power makes to global security and prosperity, the shortcomings of American foreign policy, and how other countries have come to accept, resent, and exert influence on America's global role. And he...
Author
Description
"Despite its impressive size and population, economic vitality, and drive to upgrade its military, China remains a vulnerable nation surrounded by powerful rivals and potential foes. Understanding China's foreign policy means fully appreciating these geostrategic challenges, which persist even as the country gains increasing influence over its neighbors. Andrew J. Nathan and Andrew Scobell analyze China's security concerns on four fronts: at home,...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request