This new edition is a comprehensive guide to nearly 200 invasions, conquests, battles, and occupations, from ancient times to the present. Throughout history, invasions and conquests have played a remarkable role in shaping our world and defining our boundaries, both physically and culturally. -- Provided by publisher
CHAPTER ONE: Introduction -- Motivations for the Study -- Objectives -- Approach -- Background -- Deterrence -- Escalation -- Putting It Together: Influence Theory -- Structure of the Report -- CHAPTER TWO: Lessons from History and Psychology -- Historical Blunders -- Lessons from Cognitive Psychology -- Classes of Decisionmaking Error -- Cognitive Biases -- Prospect Theory -- Prevalence -- CHAPTER THREE: Cognitive Modeling and Thinking-Red Exercises -- Challenges and Approach -- Factor Trees -- Neutral Factor Trees -- Factor Trees to Convey Narratives and Anticipate Perfect Storms -- Models of Red -- Representing Limited Rationality -- Heuristic Factor-Tree Method -- Deliberate Method Highlighting Outcome Uncertainty -- Influence Actions and Strategies -- Candidate Actions for Influence. -- Influence Strategies -- Evaluating Influence Strategies -- Direct Estimates -- More-Systematic Assessment Using Factor Trees -- Deliberate Estimates Recognizing Outcome Uncertainties -- Seeking a Robust Strategy -- CHAPTER FOUR: Illustration: Hypothetical Crisis with China -- Initiating Scenario -- Factor Trees for China If Considering Acts of Aggression -- Alternative Models of China -- Insights from China-Watcher Literature -- Analytically Constructed Models of China -- Modeling China's Limited Rationality -- Heuristic Chinese Factor-Tree Assessment of Options -- Deliberate Chinese Evaluation of Options -- Some Circumspection: Is This Adding Value? -- Improved Procedures for Subsequent Exercises -- Crafting U.S. Influence Strategies -- Finding Targets for Influence -- Candidate Actions for Influence -- Influence Strategies -- Estimating Effects of U.S. Strategy -- Direct Assessments of U.S. Options -- More-Systematic Assessment -- Seeking a Robust U.S. Influence Strategy -- CHAPTER FIVE: Conclusions -- APPENDIX A. Mathematics of Thresholded Linear Weighted Sums -- APPENDIX B. Computational Version of Factor Tree Model -- APPENDIX C. Bayesian Updating of Red's Blue: Simple Artificial Intelligence -- APPENDIX D. Input Data for Model -- APPENDIX E. Simplifying Probabilistic Calculations.
Encyclopedia of Historical Warrior Peoples & Modern Fighting Groups -- Table of Contents -- List of Maps -- Preface -- List of Contributors -- Section One: Entries -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- P -- R -- S -- T -- U -- V -- W -- Z -- Section Two: Readings -- Introduction -- Letters Home from Roman Soldiers -- On Military Science from Libro XVI of Noctes Atticae by Aulus Gellius -- Epitoma Rei Militari by Flavius Vegetius Renatus -- Samurai Creed -- Thucydides on the History of the Peloponnesian War -- Truce of God by Bishopric of Terouanne
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Introduction: one man's gifts -- Epaminondas (418?-362 bc) -- Alexander (356-323 BC) -- Han Xin (?-196 BC) -- Hannibal (247-182 BC) -- Publius Cornelius Scipio Africanus (235-183 BC) -- Gaius Julius Caesar (100-48 BC) -- Belisarius (505?-568) -- Chinggis khan/subedei (1162?-1227) -- Jan Zizka (1360?-1424) -- Oda Nobunaga (1534-1582) -- Gustavus Adolphus (1594-1632) -- John Churchill, Duke of Marlborough (1650-1722) -- Frederick II (The Great) (1712-1786) -- Napoleon Bonaparte (1769-1821) -- Arthur Wellesley, 1st Duke of Wellington (1769-1852) -- Lessons learned
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
The authors argue that the United States is entering a period of discontinuity in its defense planning, something that future historians may see as a planning crisis. The causes are technology diffusion that is leveling aspects of the playing field militarily, geostrategic changes, and the range of potential adversaries. The authors see these as leading to (1) increasingly difficult force projection in some important circumstances; (2) a related block obsolescence of U.S. forces and concepts of operations; (3) the need for a new grand strategy in the Asia-Pacific region, where China is now a major regional power; and (4) the United States having to deal with a demanding mix of "complex operations" (e.g., counterinsurgency and stabilization) and traditional challenges. Obstacles exist to taking on these challenges. These include severe economic issues and the absence of consensus on the nature of next-generation forces and posturing. The paper presents three illustrative models for future concepts of operations, but all are very challenging. They and others will need to be explored with considerable innovation and experimentation. Finally, the papers argue for a comprehensive rebalancing of national security strategy, not just a rebalancing of military capabilities
Deterring terrorism is best approached as part of a broad effort to influence all elements of a terrorist system, and simple, conceptual models of decisionmaking can help in understanding how to affect others' behavior. The paper lays out a theory of how to use influence to affect elements of a terrorist system, touching on root causes, individual motivation, public support, and likely factors in the decisionmaking of terrorist organizations
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext: