Listing 1 - 9 of 9 |
Sort by
|
Choose an application
This book reveals for the first time declassified discussions that took place between the British, French and US governments for nuclear cooperation in the early to mid-1970s. In doing so, it sets the scene for the top secret upgrade to Britain's Polaris force, codenamed Chevaline, and how this could have brought down Harold Wilson's Labour government of 1974-1976. It also analyses how NATO strategy evolved in this period in order to be capable of a flexible response to Warsaw Pact aggression - a response that, if enacted, could well have been apocalyptic.
Choose an application
This book reveals for the first time the historic deliberations regarding the Chevaline upgrade to Britain's Polaris force, the decisions to procure the Trident C-4 and then D-5 system from the Americans in 1980 and 1982. It also details the highly controversial decision to base Ground Launched Cruise Missiles in the UK in 1983. Chevaline was one of the most expensive and technically difficult defence projects the British had yet undertaken. It took much of its rationale from intelligence assessments of Soviet anti-ballistic missiles which had planted doubts as to the effectiveness of Polaris as the UK's strategic deterrent. The Polaris-Chevaline system remained in service until it was gradually replaced with Trident in 1994. The first deal over Trident (the C-4 decision in 1980) was informed by the Chevaline experience and the penalties of a lack of commonality with the United States. The decision benefitted from a comprehensive study known as the Duff-Mason Report which was the key background document used by the Conservative government of Mrs. Thatcher in the purchase of C-4. The decision to opt for the increased striking power of Trident II D-5 was also driven by the penalties of time-limited commonality with the Americans. It remains operational with both the Royal Navy and United States Navy.
Choose an application
Choose an application
"Kristan Stoddart brings together an outstanding treatise of one of the most important subjects in international security of our times... This book offers innovative insights for scholars interested in the security and strategy of cyberwarfare, as well as those interested in understanding the security dynamics of the modern world more generally." -Christian Kaunert, Professor of International Security, Dublin City University & University of South Wales. "This book provides an exciting level of insight and detail into one of the most obscure and less explored areas of cyberspace studies. It is very informative and extremely interesting to read and I am certain it will be a necessary resource for students and academics in the field of cyber-related studies, international politics and beyond." - Vasileios Karagiannopoulos, Reader in Cybercrime and Cybersecurity and Director of the Cybercrime Awareness Clinic, University of Portsmouth, UK. This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of 'cyberwar'. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members). Kristan Stoddart is Associate Professor in Cyber Threats in the School of Social Sciences at Swansea University, UK, a member of Swansea's Cyber Threats Research Centre (CYTREC), and Visiting Professor at the University of South Wales. He currently holds a grant looking at EU resilience Against Hybrid Warfare. From 2014-17, he worked on a £1.2 million project which analyzed SCADA systems and the Cyber Security Lifecycle co-funded by Airbus Group and the Welsh government from which this book draws.
Social problems --- Politics --- Criminology. Victimology --- Criminal law. Criminal procedure --- Law --- Polemology --- Computer. Automation --- veiligheid (mensen) --- politiek --- criminologie --- criminaliteit --- vrede --- terrorisme --- computerbeveiliging --- computercriminaliteit --- Computer crimes --- Computer networks --- Cyberspace operations (Military science) --- Prevention. --- Security measures.
Choose an application
Choose an application
Choose an application
Choose an application
Based on a detailed analysis of archives and high level interviews this book looks at the role of beliefs, culture and identity in the making of British nuclear policy from 1945 through to the present day.
Nuclear weapons --- Government policy --- Great Britain --- History, Military --- Politics and government --- Atomic weapons --- Fusion weapons --- Thermonuclear weapons --- Weapons of mass destruction --- No first use (Nuclear strategy) --- Nuclear arms control --- Nuclear disarmament --- Nuclear warfare --- Since 1900
Choose an application
"Security studies, also known as international security studies, is an academic subfield within the wider discipline of international relations that examines organized violence, military conflict, and national security. Meant to serve as an introduction to the field of security studies, Contextualizing Security is a collection of original essays, primary source lectures, and previously published material in the overlapping fields of security studies, political science, sociology, journalism, and philosophy. It offers both graduate and undergraduate students a grasp on both foundational issues and more contemporary debates in security studies. Nineteen chapters cover security studies in the context of homeland security and liberty, U.S. foreign policy, lessons from the Cold War, science and technology policy, drones, cybersecurity, the War on Terror, migration, study-abroad programs, the surveillance state, Africa, and China"--
Listing 1 - 9 of 9 |
Sort by
|