Ukraine dominated international headlines as the Euromaidan protests engulfed Ukraine in 2013-2014 and Russia invaded the Crimea and the Donbas, igniting a new Cold War. Written from an insider's perspective by the leading expert on Ukraine, this book analyzes key domestic and external developments and provides an understanding as to why the nation's future is central to European security. In contrast with traditional books that survey a millennium of Ukrainian history, author Taras Kuzio provides a contemporary perspective that integrates the late Soviet and post-Soviet eras.
The book...
Ukraine dominated international headlines as the Euromaidan protests engulfed Ukraine in 2013-2014 and Russia invaded the Crimea and the Donbas, ig...
Why has Africa been the subject of so many accusations related to genocide? Indeed, the number of such allegations related to Africa has increased dramatically over the past 15 years. Popular racist mythology might suggest that Africans belong to "tribes" that are inherently antagonistic towards each other and therefore engage in "tribal warfare" which cannot be rationally explained. This is concept is wrong, as Timothy J. Stapleton explains in A History of Genocide in Africa the many conflicts that have plagued post-colonial Africa have had very logical explanations, and very few...
Why has Africa been the subject of so many accusations related to genocide? Indeed, the number of such allegations related to Africa has increased ...
As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity--from copyright infringement to phishing to online pornography--has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts--if any--could deter cybercrime in the highly networked and extremely fast-moving modern world? "Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century" seeks to address this tough question and enables readers...
As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled cr...
Recent terrorist actions in the United States and abroad make it clear that the subject of counterterrorism is as vital and as timely as ever. Edited by a leading authority on terrorism and security studies, this compendium offers a wide-ranging look at the most vital aspects of counterterrorism, from diplomacy and military action to the investigation and interdiction of terrorist finances.
Following an introduction, chapters offer insightful discussions of strategy, policy, tactical, and operational dimensions of counterterrorism. An interdisciplinary team of expert contributors...
Recent terrorist actions in the United States and abroad make it clear that the subject of counterterrorism is as vital and as timely as ever. Edit...
As countries across the globe continue to adjust their security operations to counter an increasingly volatile political landscape, the issue of how to identify and derail a host of violent groups remains of considerable interest. This comprehensive volume offers an examination of the effectiveness of contemporary counterinsurgency efforts, revealing which approaches offer the greatest chances of success internally, regionally, and internationally.
Featuring perspectives from experts and analysts in the field of irregular warfare and international security, this is an unparalleled...
As countries across the globe continue to adjust their security operations to counter an increasingly volatile political landscape, the issue of ho...
Sexual assault has been an aspect of the U.S. military historically and is today widely recognized as a significant problem with far-reaching repercussions. How does sexual assault negatively impact not only the victims themselves but also the U.S. military's strength, readiness, and morale? This book answers these questions and documents the problems with reporting and prosecuting sexual assault complaints within our armed forces, examines the current policy and laws to identify what changes are needed, and analyzes recent efforts to prevent sexual assault.
Author Rosemarie Skaine...
Sexual assault has been an aspect of the U.S. military historically and is today widely recognized as a significant problem with far-reaching reper...
The issues and current events of the Greater Middle East continue to hold deep implications for American geopolitical interests in the region as they have for many decades. An ideal resource for students in undergraduate courses on the Middle East and related regions as well as students in graduate programs of international studies or security studies, this textbook anthologizes recent, insightful analyses by top scholars on trends and events in the Middle East that bear crucially on regional and global security considerations, covering topics like Iran's nuclear ambitions; the rise, ebb,...
The issues and current events of the Greater Middle East continue to hold deep implications for American geopolitical interests in the region as th...
Recent terrorist actions in the United States and abroad make it clear that the subject of counterterrorism is as vital and as timely as ever. Edited by a leading authority on terrorism and security studies, this compendium offers a wide-ranging look at the most vital aspects of counterterrorism, from diplomacy and military action to the investigation and interdiction of terrorist finances.
Following an introduction, chapters offer insightful discussions of strategy, policy, tactical, and operational dimensions of counterterrorism. An interdisciplinary team of expert contributors...
Recent terrorist actions in the United States and abroad make it clear that the subject of counterterrorism is as vital and as timely as ever. Edit...
How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed.
The book addresses a chronology of events starting in...
How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? Wha...
As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity--from copyright infringement to phishing to online pornography--has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts--if any--could deter cybercrime in the highly networked and extremely fast-moving modern world? "Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century" seeks to address this tough question and enables readers...
As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled cr...