AI for Digital Warfare explores how the weaponising of artificial intelligence can and will change how warfare is being conducted, and what impact it will have on the corporate world.
In September 1978, William Quandt, a member of the White House National Security Council staff, spent thirteen momentous days at Camp David, the presidential retreat in Maryland, where three world leaders were holding secret negotiations.
Ang describes the development of the Five Power Defence Arrangements (FPDA), an important security regional arrangement, from its inception to the present from the perspectives of the five FPDA allies.
Following the Japanese invasion of the islands in 1942, North Luzon was the staging area for several Filipino-American guerrilla bands who sought to gather intelligence and to destroy enemy military installations or supplies.
Local Government in the Soviet Union (1987) analyses the Soviet Union's limited success in improving local government between in the 1960s to 1980s, as the country made a drive toward centralized policy control.
The Blast Mitigation for Structures Program (BMSP) is a research and development activity conducted by the Defense Threat Reduction Agency (DTRA) to improve the performance of buildings that are targets of terrorist attack.
On a chilly autumn night in 1942, a German spy was rowed ashore from a U-boat off the Gaspé coast to begin a deadly espionage mission against the Allies.
After being wounded and awarded the Bronze Star for valor as a Marine infantry platoon commander in Vietnam, Arnold Punaro thought he'd left the battlefield behind.
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics.
This book, first published in 1986, argues that there is a special category of medium powers in the world - such as Britain, France, India, Brazil, Japan, China and others - which have sufficient military power to do something to protect their interests but which are not a match for the superpowers.
In September 1978, William Quandt, a member of the White House National Security Council staff, spent thirteen momentous days at Camp David, the presidential retreat in Maryland, where three world leaders were holding secret negotiations.
In September 2022, at a grandiose ceremony in the Kremlin, President Putin announced the incorporation into the Russian Federation of four provinces in southern and eastern Ukrainethe most significant attempted land seizure in Europe since World War II.
Soviet Foreign Policy Today (1991) is the culmination of almost 30 years of observations of Soviet foreign and domestic politics, written at the time of Gorbachev's great changes.
Presenting a global history of aerial bombardment, this book shows how certain European powers initiated aerial bombardment of civilians after World War I, and how it was an instrument of choice in World War II.
This book examines how international intelligence cooperation has come to prominence post-9/11 and introduces the main accountability, legal and human rights challenges that it poses.
The United States currently has no place to dispose of the high-level radioactive waste resulting from the production of the nuclear weapons and the operation of nuclear electronic power plants.
As the fourth largest military spender in the world, India has a huge defence economy supported by a budget amounting to nearly $67 billion in 2020-21.
As a British Intelligence Officer during World War II, Hugh Trevor-Roper was expressly forbidden from keeping a diary due to the sensitive and confidential nature of his work.
One of the great spectacles of modern naval history is the Imperial Japanese Navy's instrumental role in Japan's rise from an isolationist feudal kingdom to a potent military empire stridently confronting, in 1941, the world's most powerful nation.
A story of equipment failures, bad luck, poor planning and unbelievable courage written 25 years after the battle, this new book by Leigh Neville reveals the hard-hitting truth of what happened minute by minute in the dusty streets of Mogadishu.
This fascinating new collection of essays on Britain's Special Operations Executive (SOE) explores the 'non-military' aspects of British special operations in the Second World War.
This book, first published in 1984, carefully examine the political debate surrounding nuclear weapons and superpower polices in Cold War Western Europe.
This second edition of The Routledge Handbook of Civil-Military Relations offers a wide-ranging, internationally focused overview of the field of civil-military relations.
These vigorous lectures deal with some of the many ways in which the question of structure in poetry (here synonymous with the whole range of artistic creation in words) can be discussed.
Learning from Foreign Wars examines how the Russian army interpreted, and what lessons it learned from the wars in Europe between 1859 and 1871, and the American Civil War.
This book, first published in 1986, is a major study of semialignment and a review of the individual nations within NATO to which the model could be applied.
This new collection of essays, from leading British and Canadian scholars, presents an excellent insight into the strategic thinking of the British Empire.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.
This book examines terrorist and insurgent organisations and seeks to understand how such groups persist for so long, while introducing a new strategic doctrine for countering these organisations.
This book provides a short and accessible introduction to the theory of strategy, examines the general theory of strategy in accordance with 23 key Principles and explains its nature, functions, and intended consequences.
This unique and penetrating book surveys 100 years of military inefficiency from the Crimean War, through the Boer conflict, to the disasterous campaigns of the First World War and the calamities of the Second.
Spotlights how various entities are using the Internet to shape people's perceptions and decision-making, and describes detailed case studies as well as the tools and methods used to identify automated, fake accounts.