9.11後のアメリカの安全保障<br>State of Recovery : The Quest to Restore American Security after 9/11

個数:
  • ポイントキャンペーン

9.11後のアメリカの安全保障
State of Recovery : The Quest to Restore American Security after 9/11

  • ウェブストア価格 ¥11,704(本体¥10,640)
  • Bloomsbury Academic(2014/07発売)
  • 外貨定価 US$ 52.95
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 530pt
  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 272 p.
  • 言語 ENG
  • 商品コード 9781628923254
  • DDC分類 355.033073

Full Description

In the decade that followed 9/11, technologies and technology policies became central to homeland security. For example, the U.S. erected new border defenses with remote sensors and biometric scanners, and deployed new autonomous air warfare capabilities, such as the drone program. Looking at efforts to restore security after 9/11, the work examines issues such as the rise in technology spending, the various scenarios of mass terror, and America's effort to ensure that future engagements will take place far from the homeland. Operation Iraqi Freedom, Iran's emergence as nuclear threat, and North Korea's acceleration of its missile program are analyzed along with the "axis of evil" and America's effort to create a ballistic missile shield to thwart this emerging threat to its security. By focusing on the technologies of homeland security rather than on cyber warfare itself, the work offers a unique and needed survey that will appeal to anyone involved with the study and development of homeland and strategic security.

Contents

Foreword: Innovation Leads the Way: From 'Long War' to Longer Peace
by Ambassador David T. Killion / Introduction / Part I: Technology to the Rescue / 1: Moore's Law and the Evolution of Security Technology / 2: Information Security in a World of Cyber Insecurity / 3: Document Fraud: From Criminal to Terrorist Enterprise / 4: Business Continuity in Dangerous Times / Part II. Securing our Borders / 5: Border Security and the War on Terror / 6: Counterterrorism Mentors: Allied Insights and Lessons / 7: Enhanced Border Surveillance for the Post 9/11 World / 8: Less Lethal Border Security Solutions: Midway Between 'Shout' and 'Shoot' / 9: Securing the Maritime Front: Protecting America's Seaports / 10: Securing the Southern Front / 11: Securing the Northern Front / Part III Protecting The Populace / 12 Air Rage: Aviation Insecurity After 9/11 / 13: Truck Bombing Shifts Into High Gear / 14: Underground Tremors: Securing the Metro / 15: Courtroom Violence and the War Against the U.S. Government / 16: Black Sunday Redux / 17: Special Delivery: Letter-Bombs Continue to Deliver a Lethal Message / 18: Bracing for Bioterror / 19: Nuclear Terrorism After 9/11: Rethinking the Unthinkable / Part IV: Ensuring our Survival: Thinking About the Unthinkable After 9/11 / 20: Nuclear Weapons and the War on Terror: Halting the Spread / 21: False Alarm: Saddam, WMD, And the GWOT's First Side Show / 22: Power Vacuum: Saddam's Fall and the Rise of Iran / 23: Nuclear Ambitions: Emergent Ballistic Missile Threats / 24: Securing the 'High Frontier': Missile Defense, from Hype to Hope / 25: The Axis of Evil Revisited: Reflection and Reassessment / Bibliography / Index

最近チェックした商品