

Author: Moon Terry
Publisher: Routledge Ltd
ISSN: 1475-1801
Source: Defense and Security Analysis, Vol.23, Iss.1, 2007-03, pp. : 55-67
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Essay: Military Space in the Era of Network-Centric Operations
The Military Balance, Vol. 104, Iss. 1, 2004-01 ,pp. :




Ethics, Law and Military Operations
Journal of Military Ethics, Vol. 10, Iss. 2, 2011-06 ,pp. :


Is There a Military Utility to Information Operations?
By J.N. Ager
Defense Analysis, Vol. 16, Iss. 3, 2000-12 ,pp. :


Moral Dynamics andMilitary Operations
Defense and Security Analysis, Vol. 25, Iss. 1, 2009-03 ,pp. :