Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
We gebruiken cookies om:
De website vlot te laten werken, de beveiliging te verbeteren en fraude te voorkomen
Inzicht te krijgen in het gebruik van de website, om zo de inhoud en functionaliteiten ervan te verbeteren
Je op externe platformen de meest relevante advertenties te kunnen tonen
Je cookievoorkeuren
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
The practitioners of hostile social manipulation employ social media, sophisticated forgeries, cyberbullying and harassment, distribution of rumors an...Lees meer
In order to defend itself and its national interests, and to maintain the trust of allies as a reliable security guarantor, the United States must mat...Lees meer
Nations rise and fall, succeed or fail in rivalries, and enjoy stability or descend into chaos because of a complex web of factors. One critical compo...Lees meer
The authors discuss the need and potential for normative constraints on cyber aggression. They describe how norms tend to arise, review the history of...Lees meer
Five years into the war on terror, we still don't understand the supposed "enemy." Official analyses of radical Islam remain simplistic and unhelpful ...Lees meer
The evolution of advanced information environments is rapidly creating a new category of possible cyberaggression that involves efforts to manipulate ...Lees meer
The U.S. National Security Strategy focuses on the expectation of a new era of growing international competition that the United States is expected to...Lees meer
The challenge of deterring territorial aggression is taking on renewed importance, yet discussion of it has lagged in U.S. military and strategy circl...Lees meer
As economic power diffuses across more countries and China becomes more dependent on the world economy, Chinese leaders are being forced to abandon th...Lees meer
In this report, RAND researchers identify eight common characteristics of gray zone aggression, develop a framework for assessing the health of U.S. a...Lees meer
Five years into the war on terror, we still don't understand the supposed "enemy." Official analyses of radical Islam remain simplistic and unhelpful ...Lees meer
As part of a larger study on the future of the post-World War II liberal international order, RAND researchers analyze the health of the existing orde...Lees meer
As part of a series of reports in which RAND researchers examine the established concepts of deterrence and develop a framework for evaluating the str...Lees meer
This unique collection of essays explores the intricacies of how the Internet has changed the way we currently approach international security, civil ...Lees meer
From Saddam Hussein's first bold threats in 1990 to the stunning ground phase of Desert Storm in early 1991, the crisis in the Gulf captured the world...Lees meer
This report seeks to address how the U.S. Army can most effectively project and employ land power in the Indo-Pacific, during competition and conflict...Lees meer
This book examines the role of risk management in the recent financial crisis and applies lessons from there to the national security realm. The most ...Lees meer
Nuclear Weapons in a Transformed World sets out to examine one of the most pressing issues of the twenty-first century: the future of nuclear weapons....Lees meer
In this study, RAND researchers examined the current role of security cooperation efforts as a tool in the emerging strategic competition among the Un...Lees meer
North Korea and the Bomb offers the first in-depth history of the biggest diplomatic challenge in the post-Cold War era - the North Korean nuclear pro...Lees meer
The authors examined potential implications of emerging technologies for deterrence in the context of U.S. national security policy. They identified l...Lees meer
This manuscript examines the increasingly important form of rivalry and statecraft that has become known as "gray zone strategies." In regions from Ea...Lees meer
This unique collection of essays explores the intricacies of how the Internet has changed the way we currently approach international security, civil ...Lees meer
The international system appears headed for a renewed era of intense competition among major powers. The authors sought to identify the factors that k...Lees meer