- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The second edition of The New Era offers students and instructors a whole cloth, insightful perspective on the dynamic, changing patterns and orientations unleashed by the processes of globalization, technology, and the emerging "Second Cold War" era.
Andere Kunden interessierten sich auch für
- Donald M SnowCases in U.S. National Security48,99 €
- Jack A JarmonThe Cyber Threat and Globalization61,99 €
- Bruce Oliver NewsomeA Practical Introduction to Homeland Security117,99 €
- Terrence K KellyStabilization and Reconstruction Staffing: Developing U.S. Civilian Personnel Capabilities32,99 €
- Ralph PetersLines of Fire18,99 €
- Senate Committee on Homeland SecurityHunter Biden, Burisma, and Corruption: The Impact on U.S. Government Policy and Related Concerns12,99 €
- James DobbinsCoping with Iran33,99 €
-
-
-
The second edition of The New Era offers students and instructors a whole cloth, insightful perspective on the dynamic, changing patterns and orientations unleashed by the processes of globalization, technology, and the emerging "Second Cold War" era.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Globe Pequot Publishing Group Inc/Bloomsbury
- 2nd edition
- Seitenzahl: 376
- Erscheinungstermin: 24. Oktober 2019
- Englisch
- Abmessung: 226mm x 150mm x 13mm
- Gewicht: 499g
- ISBN-13: 9781538121603
- ISBN-10: 1538121603
- Artikelnr.: 57168591
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Globe Pequot Publishing Group Inc/Bloomsbury
- 2nd edition
- Seitenzahl: 376
- Erscheinungstermin: 24. Oktober 2019
- Englisch
- Abmessung: 226mm x 150mm x 13mm
- Gewicht: 499g
- ISBN-13: 9781538121603
- ISBN-10: 1538121603
- Artikelnr.: 57168591
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
By Jack A. Jarmon
Preface 1. The National Security Establishment The United State and the
World Stage A Brief History of the Structure The New Reorganization
Budgeting, and Planning in Support of Policy Striking a Balance between
Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New
Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics
The Role of the Private Sector The Status and Future of DHS Conclusion 3.
Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of
Weapons The Phenomenon of Social Media The Weaponization of Social Media
Audience Mapping, Targeted Messaging, and "Kompromat" The Weaponization of
Information Conclusion 4. Conflict and Economics Technology, the
Information Age, and the Costs of War Global Economics and Migration The
Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and
Contested Domain Information Technology vs Operational Technology National
Critical Infrastructure The Election Infrastructure Big Data Machine
learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6.
Cyberspace and Conflict What is Cyberspace? The Inception The
Militarization The Malware Advanced Persistent Threat (APT) The Onion
Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road
Initiative A Cyber Cold War "Kill with a Borrowed Sword" The Great Firewall
and the Great Cannon A Sprawling National Security Environment Conclusion
8. Russia Cold War 2.0 The Merger of Politics and Criminality Active
Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical
Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and
Anarchic Containerization Targeting, Screening, Scanning, and Inspecting
Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk
An Opaque and Expanding Environment Choke Points Conclusion 10. Politics,
Crime, and Terror Crime and Terrorism: Differences and Similarities Crime
and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border
Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological
& Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical
Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats
Biological Agents Synthetic Biology Biosecurity Policy Radiological and
Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The
Dirty Bomb Alternative Controlling proliferation Conclusion
World Stage A Brief History of the Structure The New Reorganization
Budgeting, and Planning in Support of Policy Striking a Balance between
Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New
Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics
The Role of the Private Sector The Status and Future of DHS Conclusion 3.
Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of
Weapons The Phenomenon of Social Media The Weaponization of Social Media
Audience Mapping, Targeted Messaging, and "Kompromat" The Weaponization of
Information Conclusion 4. Conflict and Economics Technology, the
Information Age, and the Costs of War Global Economics and Migration The
Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and
Contested Domain Information Technology vs Operational Technology National
Critical Infrastructure The Election Infrastructure Big Data Machine
learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6.
Cyberspace and Conflict What is Cyberspace? The Inception The
Militarization The Malware Advanced Persistent Threat (APT) The Onion
Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road
Initiative A Cyber Cold War "Kill with a Borrowed Sword" The Great Firewall
and the Great Cannon A Sprawling National Security Environment Conclusion
8. Russia Cold War 2.0 The Merger of Politics and Criminality Active
Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical
Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and
Anarchic Containerization Targeting, Screening, Scanning, and Inspecting
Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk
An Opaque and Expanding Environment Choke Points Conclusion 10. Politics,
Crime, and Terror Crime and Terrorism: Differences and Similarities Crime
and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border
Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological
& Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical
Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats
Biological Agents Synthetic Biology Biosecurity Policy Radiological and
Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The
Dirty Bomb Alternative Controlling proliferation Conclusion
Preface 1. The National Security Establishment The United State and the
World Stage A Brief History of the Structure The New Reorganization
Budgeting, and Planning in Support of Policy Striking a Balance between
Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New
Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics
The Role of the Private Sector The Status and Future of DHS Conclusion 3.
Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of
Weapons The Phenomenon of Social Media The Weaponization of Social Media
Audience Mapping, Targeted Messaging, and "Kompromat" The Weaponization of
Information Conclusion 4. Conflict and Economics Technology, the
Information Age, and the Costs of War Global Economics and Migration The
Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and
Contested Domain Information Technology vs Operational Technology National
Critical Infrastructure The Election Infrastructure Big Data Machine
learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6.
Cyberspace and Conflict What is Cyberspace? The Inception The
Militarization The Malware Advanced Persistent Threat (APT) The Onion
Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road
Initiative A Cyber Cold War "Kill with a Borrowed Sword" The Great Firewall
and the Great Cannon A Sprawling National Security Environment Conclusion
8. Russia Cold War 2.0 The Merger of Politics and Criminality Active
Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical
Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and
Anarchic Containerization Targeting, Screening, Scanning, and Inspecting
Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk
An Opaque and Expanding Environment Choke Points Conclusion 10. Politics,
Crime, and Terror Crime and Terrorism: Differences and Similarities Crime
and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border
Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological
& Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical
Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats
Biological Agents Synthetic Biology Biosecurity Policy Radiological and
Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The
Dirty Bomb Alternative Controlling proliferation Conclusion
World Stage A Brief History of the Structure The New Reorganization
Budgeting, and Planning in Support of Policy Striking a Balance between
Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New
Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics
The Role of the Private Sector The Status and Future of DHS Conclusion 3.
Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of
Weapons The Phenomenon of Social Media The Weaponization of Social Media
Audience Mapping, Targeted Messaging, and "Kompromat" The Weaponization of
Information Conclusion 4. Conflict and Economics Technology, the
Information Age, and the Costs of War Global Economics and Migration The
Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and
Contested Domain Information Technology vs Operational Technology National
Critical Infrastructure The Election Infrastructure Big Data Machine
learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6.
Cyberspace and Conflict What is Cyberspace? The Inception The
Militarization The Malware Advanced Persistent Threat (APT) The Onion
Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road
Initiative A Cyber Cold War "Kill with a Borrowed Sword" The Great Firewall
and the Great Cannon A Sprawling National Security Environment Conclusion
8. Russia Cold War 2.0 The Merger of Politics and Criminality Active
Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical
Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and
Anarchic Containerization Targeting, Screening, Scanning, and Inspecting
Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk
An Opaque and Expanding Environment Choke Points Conclusion 10. Politics,
Crime, and Terror Crime and Terrorism: Differences and Similarities Crime
and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border
Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological
& Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical
Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats
Biological Agents Synthetic Biology Biosecurity Policy Radiological and
Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The
Dirty Bomb Alternative Controlling proliferation Conclusion