18 Items

Book - Georgetown University Press

Strategy in the Second Nuclear Age: Power, Ambition, and the Ultimate Weapon

    Editors:
  • Toshi Yoshihara
  • John R. Holmes
| October 2012

Strategy in the Second Nuclear Age assembles a group of distinguished scholars to grapple with the matter of how the United States, its allies, and its friends must size up the strategies, doctrines, and force structures currently taking shape if they are to design responses that reinforce deterrence amid vastly more complex strategic circumstances.

Book Chapter

North Korea's Nuclear Weapons Program: Motivations, Strategy, and Doctrine

| October 2012

Despite continuing efforts to convince North Korea to relinquish its nuclear capability, it appears increasingly unlikely that it will ever do so. Pyongyang might be willing to curtail or freeze certain parts of the program but the likelihood of North Korean denuclearization is quickly fading. With Pyongyang likely to retain some level of nuclear-weapons capability, analysis turns to an assessment of how these weapons might be integrated into its defense posture. Using deterrence theory as the analytical framework, this chapter examines possible avenues for North Korea's nuclear weapons strategy and doctrine.

Book Chapter

Falling Prey to Cybercrime: Implications for Business and the Economy

| February 2012

As American businesses, inventors, and artists market, sell, and distribute their products worldwide via the Internet, the threat from criminals and criminal organizations who want to profit illegally from their hard work grows. The threat from other nations wanting to jump start their industries without making the intellectual investment is even more disturbing. This fleecing of America must stop. We can no longer afford complacency and silence—we must find and use as many market levers as possible to change the path we are on.

Book - Aspen Institute

Securing Cyberspace: A New Domain for National Security

| February 2012

This book is a collection of papers commissioned for the 2011 Aspen Strategy Group workshop, a bipartisan meeting of top national security experts. The papers examine the complexities of the emerging cyber threat, as well as the possibilities and inherent challenges of crafting effective domestic and international cyber policy. Authors explore topics such as the economic impact of cybercrime, cyber as a new dimension of warfare, the revolutionary potential of Internet freedom, and the future realities the United States will face in the new age of heightened Internet connectivity.

teaser image

Book - Cornell University Press

Exporting the Bomb: Technology Transfer and the Spread of Nuclear Weapons

| April 2010

Matthew Kroenig's book, Exporting the Bomb: Technology Transfer and the Spread of Nuclear Weapons, was published by Cornell University Press. Kroenig argues that nearly every country with a nuclear weapons arsenal received substantial help at some point from a more advanced nuclear state. Understanding why states provide sensitive nuclear assistance not only adds to our knowledge of international politics but also aids in international efforts to control the spread of nuclear weapons.

Book - Cambridge University Press

Seeds of Disaster, Roots of Response: How Private Action Can Reduce Public Vulnerability

| September 2006

Seeds of Disaster, Roots of Response ... describes effective and sustainable approaches — both business strategies and public policies — to ensure provision of critical services in the event of disaster.