national security

Type: 
Topical Term
Subfield: 
a
Alias: 
national security

The Invisible soldiers

how America outsourced our security
Private security is an industry that is indispensable to American foreign and military policy. When the Bush administration used security contractors to supplement the military during the war in Iraq, private contractors began to eventually exceed traditional troops in what some now regard as America's first contractor war. Today the industry continues to explore a vast array of new markets for its armed and unarmed security and defensive services. What is the risk for the United States as we increasingly depend on contractors for our security?.

Domestic terrorism

2015
A collection of essays that provides varying perspectives on issues related to domestic terrorism and national security.

The 9

final report of the National Commission on Terrorist Attacks upon the United States
2004
Presents the final report of the bipartisan 9/11 Commission, assembled to discuss the causes of the terrorist attacks on the U.S., and what needs to be done to prevent such attacks from happening again.

Undocumented immigration and homeland security

2017
This book covers the history of immigration enforcement and its agencies, and explains in detail the legal process of deportation.

The other space race

Eisenhower and the quest for aerospace security
Explores the history of the earlier, secret "space race" conducted by the U.S. Air Force under the auspices of President Eisenhower between 1954 and 1961, the goal of which was to establish either a network of unarmed satellites to give advanced warning of Soviet movements, or else hypersonic armed vehicles that could achieve low orbit for attacks. Explores the history of these endeavors and why neither was ultimately implemented before the wider known space race in the later 1960s.

Border security

2016
The United States has two of the longest unfortified borders in the world . . . and people arrive daily by air from outside the country, too. At those borders and airports are the border security officers who are on the front lines of making sure our nation is protected. They use their training, skill, and the latest technology to keep the bad guys out. Inside, learn how they keep our borders safe, every day, around the clock. Adventure, courage, talent . . . and service--they can all be found in the stories of brave men and women who go . . . ON A MISSION. Each title in this series contains color photos, close ups of key tools and technology used on each mission, and back matter including: an index, further reading lists for books and internet resources, and a series glossary. Mason Crest's editorial team has placed Key Icons to Look for throughout the books in this series in an effort to encourage library readers to build knowledge, gain awareness, explore possibilities and expand their viewpoints through our content rich non-fiction books. Key Icons are as follows: Words to Understand are shown at the front of each chapter with definitions. These words are then used in the prose throughout that chapter, and are emboldened, so that the reader is able to reference back to the definitions- building their vocabulary and enhancing their reading comprehension. Sidebars are highlighted graphics with content rich material within that allows readers to build knowledge and broaden their perspectives by weaving together additional information to provide realistic and holistic perspectives. Text Dependent Questions are placed at the end of each chapter. They challenge the reader's comprehension of the chapter they have just read, while sending the reader back to the text for more careful attention to the evidence presented there. Research Projects are provided at the end of each chapter as well and provide readers with suggestions for projects that encourage deeper research and analysis. A Series Glossary of Key Terms is included in the back matter contains terminology used throughout the series. Words found here broaden the reader's knowledge and understanding of terms used in this field.

Selling the Korean War

propaganda, politics, and public opinion in the United States, 1950-1953
2008
Explores how the Truman and Eisenhower administrations used propaganda to shape public discourse about the Korean War, influence media coverage, and gain political support for waging the war.

Nothing to hide

the false tradeoff between privacy and security
2011

Hawk

Raptor's communications expert, Staff Sergeant Brian "Hawk" Bledsoe, is struggling with his inner demons, leaving him on the verge of an "other than honorable" discharge. Plagued with corrupted intel, Raptor team continues to track down the terrorist playing chess with their lives. Afghan pilot Fekiria Haidary is devastated when a systems glitch on her aircraft forces a weapons launch on a safe target. And when the deadly bombing separates Hawk from the team, he must make an impossible choice: save his brothers-in-arms, or save the woman and children depending on him to survive a brutal snowstorm.

Raptor 6

Captain Dean Watters keeps his mission and his team in the forefront of his laser-like focus. So when these two things are threatened by hackers, Dean's Special Forces training kicks into high gear. Failing to stop the hackers from stealing national security secrets from the military's secure computers and networks isn't an option. Zahrah Zarrick is a missionary teacher to Afghan children in Mazar-e Sharif. And a target. When Zahrah is captured because of her expertise in quantum cryptology, endangering the US national security, Dean is forced to crack the lockbox around his heart--a move that might come at the highest cost.

Pages

Subscribe to RSS - national security