![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Trelawny Chris
Publisher: Routledge Ltd
ISSN: 1744-0378
Source: The RUSI Journal, Vol.158, Iss.1, 2013-02, pp. : 48-52
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Understanding Maritime Piracy Syndicate Operations
Security Studies, Vol. 21, Iss. 4, 2012-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Ethics, Law and Military Operations
Journal of Military Ethics, Vol. 10, Iss. 2, 2011-06 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Is There a Military Utility to Information Operations?
By J.N. Ager
Defense Analysis, Vol. 16, Iss. 3, 2000-12 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Net-centric or Networked Military Operations?
By Moon Terry
Defense and Security Analysis, Vol. 23, Iss. 1, 2007-03 ,pp. :