熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
上市日期(可複選) | |
電子書(可複選) | |
其他(可複選) |
搜尋結果共 280239 筆, 頁數 3 / 4671
呈現:
Legitimacy: First Principles and Efficacy in R2P Operations
Legal positivists dominate discussions concerning legitimacy in military operations. From their pers... more |
|||
Operational Arctic: The Potential for Crisis of Conflict in the Arctic Region and Application of Operational Art
This study examines the potential for international crisis or conflict in the Arctic region in the n... more |
|||
The Defense Science Board Report on Technology and Innovation Enable for Superiority in 2030
In March 2012, the Under Secretary of Defense for Acquisition, Technology and Logistics requested th... more |
|||
Task Force Smith and the 24th Infantry Division in Korea, July 1950
When the 24th Infantry Division deployed to Korea in July 1950 it experienced a series of defeats fr... more |
|||
The Role of Religion in the Mexican Drug War
The Global War on Terror has highlighted the importance of understanding the cultural aspects of the... more |
|||
A History of the U.S. Army Officer Corps, 1900-1990
With the assistance of the Strategic Studies Institute of the U.S. Army War College, the Army s Offi... more |
|||
Russian Military Transformation: Goal in Sight?
The depth and scale of change that the Russian military has undergone during the last 5 years of tra... more |
|||
The Chinese People’s Liberation Army and Information Warfare
On November 23, 2013, China s Ministry of National Defense spokesman announced that a new air defens... more |
|||
Central Asia’s Shrinking Connectivity Gap: Implications for U.s. Strategy
Once sealed off from the rest of the world during the Soviet times, the states of Central Asia today... more |
|||
Nuclear Weapons Materials Gone Missing: What Does History Teach?
In 2009, the President of the United States spotlighted nuclear terrorism as one of the top threats ... more |
|||
Electoral College Reform: Contemporary Issues for Congress
The electoral college method of electing the President and Vice President was established in Article... more |
|||
Chinese Lessons from Other Peoples’ Wars
The annual Conference on the Chinese People s Liberation Army (PLA) took place at the U.S. Army War ... more |
|||
Restraint in Urban Warfare: The Canadian Attack on Groningen, Netherlands, 13-16 April 1945
Urban terrain presents significant tactical challenges to attacking armies, limiting weapons effects... more |
|||
Civilization’s Drying Cradle: Water Politics in the Tigris-euphrates River Basin
The finite water supply of the Tigris and Euphrates rivers is increasingly imbalanced with the deman... more |
|||
Worthy of His Sufferings: How Strategic Leaders Learned from Failure
History provides numerous examples of leaders who failed at some point in their career, yet went on ... more |
|||
Understanding British Strategic Failure in America 1780-1783
The War for American Independence was a complex, unconventional, and violent political struggle for ... more |
|||
The Security Concerns of the Baltic States As NATO Allies
Although the Cold War never went very hot, it still left behind a great deal of fallout. One of the ... more |
|||
Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure
Over the past decade, the cyber threat to critical infrastructure has grown to potentially catastrop... more |
|||
Security Cooperation and Deterrence in Korea
The United States insufficient investment in security assistance and cooperation to build the capac... more |
|||
Field Marshal William Slim and the Power of Leadership
On 15 January 1942 the Japanese invaded Burma. Within months, the Japanese occupied the country and ... more |
|||
The National Guard in the Spanish-american War and Philippine Insurrection, 1898-1899
The National Guard s origins trace back to the militia of the first settlements in America. Since it... more |
|||
Assault on the Uss Liberty: Deliberate Action or Tragic Accident
The USS Liberty was an unarmed electronic intelligence gathering naval vessel patrolling in internat... more |
|||
A Regiment Like No Other: The 6th Marine Regiment at Belleau Wood
This book addresses the unique composition of the 6th U.S. Marine Regiment and the role they played ... more |
|||
Irregular Pen and Limited Sword: Psywar, Psyop, and Miso in Counterinsurgency
Insurgency and counterinsurgencies differ from conventional warfare in that military strength alone ... more |
|||
Truman’s Atomic Bomb Decision: An Attack on Japan’s Center of Gravity
Truman s decision to use nuclear weapons to end the War in the Pacific is the subject of much debate... more |
|||
General Creighton Abrams and the Operational Approach of Attrition in the Vietnam War
This book proposes that the United States Armed Forces consistently followed a strategy of attrition... more |
|||
Drug Trafficking Within Mexico: A Law Enforcement Issue or Insurgency?
The recent esculation of violence between rivial drug cartels, street gangs, and the government with... more |
|||
The Great White Father and Genocide
This book examines the genesis of the term genocide, presents the widely accepted formal definition,... more |
|||
Keeping Score Without the Body Count: Measuring Counterinsurgent Effectiveness According to Insurgent Tangible Resources
In 2001 and in 2003 the United States Army, along with coalition forces demonstrated their conventio... more |
|||
Rome in the Teutoburg Forest
Role cultural misunderstanding played on the tactical, operational, and strategic levels. The Roman ... more |
|||
Eisenhower’s Pursuit of Strategy: The Importance of Understanding the Influence of Leadership Styles on Strategic Decision Maker
Eisenhower preferred to build consensus for his strategies by using multiple communication technique... more |
|||
Afghanistan and Chechnya: Low Intensity Preludes to Another Revolution
This book proposes that the Russian LIC experiences in Afghanistan and Chechnya have accelerated dyn... more |
|||
Angels of Armageddon: The Royal Air Force in the Battle of Megiddo
Egypt and Palestine offered the British an opportunity to fight a war of movement. Unlike the Wester... more |
|||
The Effects of Terrorism on U.s. Foreign Policy: Learning from the Past
In studying the varying effects of terrorism on US foreign policy, the intent of the analysis presen... more |
|||
Cyber Warfare: "A New Dod Core Mission Area"
Cyberspace warfare is clearly a candidate for a new DoD core mission area. This work will explore ea... more |
|||
World War II: Did the German Actions in the Herero Rebellion of 1904-1908 Constitute Genocide?
The Herero filed lawsuit against Germany in 2001, demanding reparations for the alleged genocide dur... more |
|||
Al Qaida and Yemen: Is Our Current Policy Good Enough?
The internal challenges faced by the Government of Yemen clearly limit their capabilities to locate,... more |
|||
Yemen: Preventing the Next Afghanistan
The United States has a window of opportunity to implement a new US-Yemeni policy to secure vital na... more |
|||
How Did the Advancement in Weapons Technology Prior to World War One Influence the Rapid Evolution of German Infantry Tactics from 1914 to 1918?
Between 1870 and the start of World War I the technical development of weapons (machine guns, infant... more |
|||
Psychological Operations Supporting Counterinsurgency: 4th Psyop Group in Vietnam
Military and civilian agencies conducted Psychological Operations on an unprecedented scale during t... more |
|||
A "New" Dynamic in the Western Hemisphere Security Environment: The Mexican Zetas and the Other Private Armies
A new and dangerous dynamic has been introduced into the Mexican internal security environment. That... more |
|||
Legio Patria Nostra: The History of the French Foreign Legion Since 1962
The French Foreign Legion is an integral part of the recently professionalized French regular army, ... more |
|||
A Study in Leadership: The 761st Tank Battalion and the 92d Division
This book evaluates leadership in the 761st Tank Battalion and the 92d Division, two black units dur... more |
|||
Cyber Warfare: China’s Strategy to Dominate in Cyber Space
China s INEW doctrine combining network attack with electronic warfare supports the use of cyber war... more |
|||
Medium and High Altitude Unmanned Aircraft System Acquisition: An Efficiency Study of Magnitude and Capability
The procurement of medium and high altitude UAS has dramatically increased since 1988. The DOD now s... more |
|||
The Spectrum of Cyber Conflict from Hacking to Information Warfare: What Is Law
Our reliance on computers and information-based technologies within DOD has greatly increased our po... more |
|||
The Role of the Kingdom of Saudi Arabia Combating Terrorism
Terrorism currently presents a wide range of issues in the international arena. These are discussed ... more |
|||
Union Joint Operations in North Carolina During the Civil War
During the Civil War some of the earliest examples of joint operations in American Military history ... more |
|||
The American Revolutionary War: General Francis Marion, The Swamp Fox and Marine Corps War Fighting Doctrine
I have been interested in Francis Marion, the Swamp Fox of the Revolution, ever since reading of his... more |
|||
The American Revolutionary War: Miracles Can Happen. the Unification of Post Partisan Revolutionary South Carolina
This monograph analyzes the events that led to South Carolinas uncommon democratic unification foll... more |
|||
Are Homeowners in Denial About Their House Values ? Comparing Owner Perceptions With Transaction-based Indexes
The boom and bust of the housing market has been a prominent feature of the household financial land... more |
|||
Governance Reconsidered: How Boards, Presidents, Administrators, and Faculty Can Help Their Colleges Thrive
Revamp senior administration organization for more effective governance Governance Reconsidered: How... more |
|||
The South China Sea: Every Nation for Itself
To determine why ASEAN failed to reach consensus required answering four interrelated questions. Fir... more |
|||
Strategic Aggression: Conditions That Could Trigger Aggressive Military Action by the People’s Republic of China
Over the past two decades, China s rapid military expansion has raised concern among U.S. policy mak... more |
|||
Enhancing U.s. Counterterrorism Efforts: The Role of State and Local Actors
After more than a decade of revamping the United States counterterrorism apparatus, there remains cr... more |
|||
Union Logistics in the Vicksburg Campaign
Historians have examined the tactical aspects of the Vicksburg campaign in great detail. Since hundr... more |
|||
Supervisory Control and Data Acquisition (SCADA) in Liquid Pipelines: Safety Study
In the pipeline industry, Supervisory Control and Data Acquisition (SCADA) systems are used to colle... more |
|||
Marine Accident Report: Collision of the Tankship Elka Apollon With the Containership Msc Nederland Houston Ship Channel, Upper
This report discusses the October 29, 2011, collision of the tankship Elka Apollon with the containe... more |
|||
Genealogy Standards
Family historians depend upon thousands of people unknown to them. They exchange research with other... more |
|||
Aircraft Accident Report Decent Below Visual Glidepath and Collision With Terrain Delta Air Lines Flight 554 Mcdonnell Douglas Md-88, N914dl Laguardia Airport, New York
About 1638 eastern daylight time, on October 19, 1996, a McDonnell Douglas MD-88, N914DL, operated b... more |