Crime and Intelligence Analysis: An Integrated Real-Time Approach, 2nd Edition, covers everything crime analysts and tactical analysts need to know to be successful.
Crime and Intelligence Analysis: An Integrated Real-Time Approach, 2nd Edition, covers everything crime analysts and tactical analysts need to know to be successful.
Strategic Survey 2020 The Annual Assessment of GeopoliticsThe worst pandemic in a century tested governments, strained societies and frayedinternational ties during the year to mid-2020.
Strategic Survey 2020 The Annual Assessment of GeopoliticsThe worst pandemic in a century tested governments, strained societies and frayedinternational ties during the year to mid-2020.
The United States-Australia alliance has been an important component of the US-led system of alliances that has underpinned regional security in the Indo-Pacific since 1945.
The United States-Australia alliance has been an important component of the US-led system of alliances that has underpinned regional security in the Indo-Pacific since 1945.
Rapid technological advances in the field of robotics and autonomous systems (RAS) are transforming the international security environment and the conduct of contemporary conflict.
Rapid technological advances in the field of robotics and autonomous systems (RAS) are transforming the international security environment and the conduct of contemporary conflict.
As the fourth largest military spender in the world, India has a huge defence economy supported by a budget amounting to nearly $67 billion in 2020-21.
As the fourth largest military spender in the world, India has a huge defence economy supported by a budget amounting to nearly $67 billion in 2020-21.
Islamic State's Online Activity and Responses provides a unique examination of Islamic State's online activity at the peak of its "e;golden age"e; between 2014 and 2017 and evaluates some of the principal responses to this phenomenon.
Islamic State's Online Activity and Responses provides a unique examination of Islamic State's online activity at the peak of its "e;golden age"e; between 2014 and 2017 and evaluates some of the principal responses to this phenomenon.
During World War II, Britain enjoyed spectacular success in the secret war between hostile intelligence services, enabling a substantial and successful expansion of British counter-espionage which continued to grow in the Cold War era.
During World War II, Britain enjoyed spectacular success in the secret war between hostile intelligence services, enabling a substantial and successful expansion of British counter-espionage which continued to grow in the Cold War era.
As a British Intelligence Officer during World War II, Hugh Trevor-Roper was expressly forbidden from keeping a diary due to the sensitive and confidential nature of his work.
On 10 May 1941, Rudolf Hess, then the Deputy F hrer, parachuted over Renfrewshire in Scotland on a mission to meet with the Duke of Hamilton, ostensibly to broker a peace deal with the British government.
Words of Intelligence: An Intelligence Professionals Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels.
Preventing Catastrophe is written by two authors who are experienced "e;Washington hands"e; and who understand the interplay between intelligence and policymaking.
This interdisciplinary Handbook provides an in-depth analysis of the complex security phenomenon of disinformation and offers a toolkit to counter such tactics.
This interdisciplinary Handbook provides an in-depth analysis of the complex security phenomenon of disinformation and offers a toolkit to counter such tactics.
Zimmerman traces the early development of the mission from Britain's initial attempts at technical cooperation in World War I and unsuccessful efforts to restart it in the late 1930s.
Lola Carlyle Reveals All is a brilliantly enjoyable rom-com from New York Times bestseller Rachel Gibson - perfect for fans of Jill Shalvis, Jo Watson and Christina Lauren.
In 2013, Edward Snowden revealed that the NSA and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of security .
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.