Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
Violent nonstate actors must have the resources to carry out their activities. Disrupting their financing plays a critical role in degrading these gro...Savoir plus
Strategic imperatives sometimes compel the United States to work with partner nations that lack the characteristics that favor success in building par...Savoir plus
In 2014, the declaration of the Islamic State caliphate was hailed as a major victory by the global jihadist movement. But it was short-lived. Three y...Savoir plus
The Department of Defense conducts an assortment of building partner capacity (BPC) efforts. The needs and existing capabilities of various nations di...Savoir plus
RAND Arroyo Center was asked by U.S. Army Cyber Command's G35 office to develop and document an Army strategy for providing cyber support to corps and...Savoir plus
Over the past decade, especially, U.S. Marine Corps (USMC) intelligence has had to tailor its organization to meet the evolving demands of the operati...Savoir plus
The U.S. Department of Defense has struggled to assess the progress and effectiveness of its efforts to inform, influence, and persuade audiences in s...Savoir plus
The report tested the assertion that U.S. security cooperation (SC) can help reduce fragility in partner states. Based on an analysis of SC data and s...Savoir plus
Insurgency is the most prevalent form of armed conflict and the subject of countless studies, yet the U.S. military has only recently begun to review ...Savoir plus
How can the U.S. Department of Defense increase the effectiveness of its efforts to help partners build the capacity of their military and other secur...Savoir plus
In-depth case studies of 41 insurgencies since World War II break each conflict into phases and examine the trajectory that led to the outcome (insurg...Savoir plus
A RAND team conducted a Delphi expert elicitation exercise, the results of which offer an assessment of the contemporary security situation in Mexico ...Savoir plus
Building on a 2010 RAND study of the 30 insurgencies begun and completed between 1978 and 2008, this study added 41 new cases to the data set, allowin...Savoir plus
Despite the scope of the threat they pose to Mexico's security, violent drug-trafficking organizations are not well understood, and optimal strategies...Savoir plus
Harnessing the potential of old and new technology, state and nonstate actors alike dedicate significant effort to developing and employing informatio...Savoir plus
A collection of the 30 most recent resolved insurgencies, covering the period 1978 to 2008, along with a bank of 76 factors that helped or hindered th...Savoir plus
A key finding of previous RAND research on insurgencies worldwide since World War II was that an overall score on a scorecard of 15 equally weighted g...Savoir plus
Harnessing the power of old and new technology, state and nonstate actors alike dedicate significant effort to developing and employing information po...Savoir plus
The U.S. Department of Defense has struggled to assess the progress and effectiveness of its efforts to inform, influence, and persuade audiences in s...Savoir plus
A comprehensive review of historical insurgencies that ended in settlement after a military stalemate shows that these negotiations followed a similar...Savoir plus
Despite the scope of the threat they pose to Mexico's security, violent drug-trafficking organizations are not well understood, and optimal strategies...Savoir plus
It is difficult to achieve command and control and situational awareness of the information environment (IE) because it is not a physical place. Altho...Savoir plus