The Leading eBooks Store Online
3,629,807 members ⚫ 1,172,494 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Potomac Books 2011; US$ 24.00
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics. Information operations (IO), in which time zones are as important as national boundaries, is the use of modern technology to deliver... more...
- Stanford University Press 2015; US$ 65.00
In asymmetric interstate conflicts, great powers have the capability to coerce weak states by threatening their survival?but not vice versa. It is therefore the great power that decides whether to escalate a conflict into a crisis by adopting a coercive strategy. In practice, however, the coercive strategies of the U.S. have frequently failed. In... more...
- Potomac Books 2011; US$ 22.50
Introduced in 1998 by the Department of Defense, the concept of information operations (IO) proposed to revolutionize the ways in which warfare, diplomacy, and business were conducted. However, this transformation has not come to fruition. Two large gaps remain: between policy and theory, and between the funding needs of IO initiatives and the actual... more...
- Potomac Books 2011; US$ 29.95
The post-9/11 world has witnessed a rebirth of irregular and asymmetrical warfare, which, in turn, has led to an increase in conflicts between conventional armies and non-state armed groups. In their haste to respond to the threat from insurgencies, nations often fail to plan effectively not only for combat operations but also for withdrawal, which... more...
- Crowood 2015; US$ 18.89
In medieval times an individual often needed to defend his life, his family and his property, and mercenaries earned their living by hiring out their skills, while feudal noblemen regularly mustered their men-at-arms and their subordinate vassals and tenants to provide military service, even to the point of leading them on Crusades to the Holy Land... more...
- University of Virginia Press 2015; US$ 7.95
In the summer of 1965, President Lyndon B. Johnson faced an agonizing decision. On June 7, General William Westmoreland had come to him with a "bombshell" request to more than double the number of existing troops in Vietnam. LBJ, who wished to be remembered as a great reformer, not as a war president, saw the proposed escalation for what it was?the... more...
- Potomac Books 2011; US$ 24.95
In Leigh Armistead?s second edited volume on warfare in the Information Age, the authors explore the hype over possibilities versus actuality in their analysis of Information Operations (IO) today. First, leaders must better understand the informational element of national power, and second, their sole focus on technology must expand to include IO?s... more...
- University of Chicago Press 2015; US$ 34.00
The War Ledger provides fresh, sophisticated answers to fundamental questions about major modern wars: Why do major wars begin? What accounts for victory or defeat in war? How do victory and defeat influence the recovery of the combatants? Are the rules governing conflict behavior between nations the same since the advent of the nuclear era? The... more...
- Elsevier Science 2015; US$ 39.95
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization?s security posture is. This course is particularly suited to CISO?s and CTO?s that need to learn how to... more...