Learn how to utilize the ancient Japanese method of self-defense Jiu Jitsu is one of the oldest forms of self-defense, thought to have been practiced since 200 BCE. The form was created in feudal Japa
This book uses the development of steam propulsion in the United States Navy as a case study for how new technology affects the strategy of the United States at the operational and strategic levels. U
The U. S. Military is becoming increasingly dependent upon civilian commercial contractors to provide logistical support on the battlefield. Despite the current military philosophy on outsourcing, the
The advent of a Robotic Age in combat has set the stage for a renewed style of warfare: autonomous warfare. The outstanding feature of this new era is the arrival of robotics on the battlefield, but t
The purpose of this book was to obtain a historically rooted understanding of the development, application, and adaptation of the British COIN approach—one from which the US has borrowed heavily. It f
With its reduced operating costs and point-of-need (PON) delivery ability, the hybrid airship is one lift option that offers promising capabilities to meet the DoDs future logistical challenges throug
History provides numerous examples of leaders who failed at some point in their career, yet went on to become great leaders. Their example demonstrates that experiencing failure does not necessarily e
Although the Cold War never went very hot, it still left behind a great deal of fallout. One of the products of the end of the Soviet Union was the re-establishment of the independence of the three Ba
Over the past decade, the cyber threat to critical infrastructure has grown to potentially catastrophic dimensions. Critical Infrastructure protection has become a matter of national security, public
Cyberspace and its associated operations present both opportunities and challenges for military and United States Government decision-makers and planners. The Pentagon has formally recognized cyberspa
In 2001 and in 2003 the United States Army, along with coalition forces demonstrated their conventional superiority by routing the forces of the Taliban and the Iraqi Army. Since those conventional vi
Eisenhower preferred to build consensus for his strategies by using multiple communication techniques to convey his intent. If consensus was not achieved and his intent was not carried out he would ag
Since the mid-1990's, the Al Qaeda Network has expressed the desire to obtain a nuclear or radiological weapon for use against the United States. While international protocols exist that are designed
When focusing on toxic leadership, many researchers emphasize the symptoms of toxicity (individual characteristics, traits) and not the disease (culture, climate, outcomes). Although characteristics a
Every year, the DoD upgrades its information technology systems, allows new applications to connect to the network, and reconfigures the Enterprise to gain efficiencies. While these actions are to bet
Cyberspace warfare is clearly a candidate for a new DoD core mission area. This work will explore each of the primary missions of the U.S. Armed Forces and the U.S. DoD core mission areas. This analys
China‘s INEW doctrine combining network attack with electronic warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region comm