Immediately after news of the disaster at Little Bighorn spread across the nation in June of 1876, editors, artists, and writers made George A Custer into the battle's tragic hero. This study is of interest to Custer researchers, students, and enthusiasts.
A New Look at the South's Most Forgotten Combat Troops 1861-1865
This ground-breaking book takes an insightful and close "New Look" at one of the most fascinating subjects of the Civil War--the long-overlooked battlefield contributions of the most forgotten fighting men of the Civil War, Black Confederates. With the release of the popular 1989 film Glory, the American public first learned about the heroism ......
"The last train for the north leaves here tomorrow morning, Our soldiers are scattered along the railroad as hundred miles north, and as soon as that train passes, the work of destruction will commence. The railroad will be completely destroyed and every bridge burned. Then both armies (the armies of the Tennessee and Georgia) will assemble here, ......
Traditionally, security has been the realm of the state and its uniformed police. However, in the last two decades, many actors and agencies, including schools, clubs, housing corporations, hospitals, shopkeepers, insurers, energy suppliers and even private citizens, have enforced some form of security, effectively changing its delivery, and ......
Michael D. Cohen argues that nuclear weapons acquisition often does dangerously embolden the acquiring state to undertake coercion and aggression, but that this behavior moderates over time as leaders learn the dangers and limitations of nuclear coercion.
Michael D. Cohen argues that nuclear weapons acquisition often does dangerously embolden the acquiring state to undertake coercion and aggression, but that this behavior moderates over time as leaders learn the dangers and limitations of nuclear coercion.
Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems.
Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems.
NATO was an international security facilitator, a crisis-manager, and a liberal democratic club as much as a mutual-defense organization. However, Russia's re-entry into power politics has changed its strategic calculus. This volume places rapid-fire events in theoretical perspective and will be useful to foreign policy students and practitioners.