Description |
1 online resource |
Contents |
Introduction -- Part I. The Establishment and the New Security Environment -- The National Security Establishment -- A Brief History of the Structure -- The New Security Reorganization -- A Balance Between Domestic and Foreign Affairs -- Conclusion -- Policies and Processes in the New Geopolitics -- A Brief History of Strategy -- An Era of New Weaponry and Geopolitics -- Budgeting and Planning in Support of Policy -- Conclusion -- Industrial Age Warfare and Information Age Weapons -- Asymmetric Warfare -- The Public Good of National Defense -- Enlisting the Stakeholders -- Forms of Collaborations -- Preparing for the Next War -- Conclusion -- The New Arena of Conflict and Economic Competition -- Technology, The Information Age and the Costs of War -- A World of Weapons -- Warfare and Globalization -- International Crime and Terrorism -- Conclusion -- Part II. Threats and Challenges -- The Maritime Supply Chain Containerization Targeting, Screening, Scanning, and Inspecting Trusted Shippers and Layered defenses -- Calculating the Dangers and the Risk Strong Markets and Weak Security -- An Opaque and Expanding Risk Environment -- Criminals, Terrorists, and Pirates -- The Explosion of Trade and the Transparency -- Deficit Conclusion -- Cyberwar: New Battlefronts, Old and New Enemies -- Cyberspace -- The Inception of Cyberspace -- The Militarization of Cyberspace -- A Return to the Cold War Net War and Net Warriors -- Vulnerabilities and Critical Infrastructure -- Conclusion -- Terrorism Versus Crime: Nexus of Economics and Politics -- From Central Asia to the Balkans -- The Russian Connection -- The Western Crime-Terror Nexus -- The Tri-Border Area: Paraguay, Argentina, Brazil -- The Chinese Triads -- The Globalization of Crime and Terror -- Conclusion -- The Chemical, Biological, Radiological, Nuclear Threat (CBRN) -- The Chemical Threat -- Chemical Warfare Threats, Countermeasures, and Disarmament -- The Biological Threat -- Biological Warfare -- Biological Agents -- Bio-security -- Policy -- The Radiological Nuclear Threat -- What is Radioactivity? -- So You Want to Build a Bomb? -- The Dirty Bomb -- Alternative Controlling -- Proliferation -- Conclusion -- Part III. Policy Implications and the Public -- Private Partnership -- Industrial Policy and Defense Policy -- Total Quality Control and Security Tax Credits -- Security Benefits Business Conclusion -- Conclusion -- List of abbreviations -- Glossary -- Bibliography -- Index |
Summary |
This core text for international security, strategy, war studies students is a timely and comprehensive study of the realities of national security in the United States today. Pulling together different areas, such as the logistics of the supply chain, the crime-terrorist nexus, and cyberwarfare, the book offers an extensive tour of today's emerging threats, introducing the uncertainties of the transition between legacy and reactive structures |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
National security -- United States.
|
|
Civil defense -- United States.
|
|
Terrorism -- United States -- Prevention
|
|
Weapons of mass destruction.
|
|
Computer networks -- Security measures.
|
|
Arms control.
|
|
HISTORY -- Military -- Other.
|
|
TECHNOLOGY & ENGINEERING -- Military Science.
|
|
Arms control.
|
|
Civil defense.
|
|
Computer networks -- Security measures.
|
|
Military policy.
|
|
National security.
|
|
Terrorism -- Prevention.
|
|
Weapons of mass destruction.
|
SUBJECT |
United States -- Military policy.
http://id.loc.gov/authorities/subjects/sh85140379
|
Subject |
United States.
|
Form |
Electronic book
|
ISBN |
9781442224124 |
|
1442224126 |
|
1306551633 |
|
9781306551632 |
|