Dragon days: time for "unconventional" tactics, illustrated
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Emerald Isle, NC
Posterity Press
2007
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references (p. 382-418) and index |
Beschreibung: | xxxi, 454 S. Ill. 22 cm |
ISBN: | 9780963869548 096386954X |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023223401 | ||
003 | DE-604 | ||
005 | 20080703 | ||
007 | t | ||
008 | 080319s2007 xxua||| |||| 00||| eng d | ||
010 | |a 2007930932 | ||
020 | |a 9780963869548 |9 978-0-9638695-4-8 | ||
020 | |a 096386954X |9 0-9638695-4-X | ||
035 | |a (OCoLC)178311198 | ||
035 | |a (DE-599)BVBBV023223401 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a U240 | |
082 | 0 | |a 355.02/180973 |2 22 | |
084 | |a 8 |2 ssgn | ||
100 | 1 | |a Poole, H. J. |d 1943- |e Verfasser |0 (DE-588)135806682 |4 aut | |
245 | 1 | 0 | |a Dragon days |b time for "unconventional" tactics, illustrated |c H. John Poole. Foreword by Ray L. Smith |
264 | 1 | |a Emerald Isle, NC |b Posterity Press |c 2007 | |
300 | |a xxxi, 454 S. |b Ill. |c 22 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 382-418) and index | ||
650 | 4 | |a Guerrilla warfare |z United States | |
650 | 4 | |a Counterinsurgency |z United States | |
650 | 0 | 7 | |a Guerilla |0 (DE-588)4022462-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
651 | 7 | |a Asien |0 (DE-588)4003217-6 |2 gnd |9 rswk-swf | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Guerilla |0 (DE-588)4022462-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a China |0 (DE-588)4009937-4 |D g |
689 | 1 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | 2 | |a Asien |0 (DE-588)4003217-6 |D g |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung BSBMuenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016409259&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016409259 |
Datensatz im Suchindex
_version_ | 1804137511976435712 |
---|---|
adam_text | Contents
List of Illustrations
ix
Foreword
xv
Preface
xvii
Introduction
xxiii
Acknowledgments
xxxi
Part One: Return of the Dragon
Chapter
1:
The Sino-Islamist Connection
3
Chapter
2:
Burma, Thailand, and Malaysia
25
Chapter
3:
Southern Philippines and Indonesia
37
Chapter
4:
Cambodia and Laos
65
Chapter
5:
Nepal and Bangladesh
79
Chapter
6:
India and Sri Lanka
91
Chapter
7:
Pakistan and Afghanistan
107
Part Two: A Viable Containment Strategy
Chapter
8:
What Hasn t Worked in the Past
145
Chapter
9:
The Law Enforcement Dimension
157
Chapter
10:
A Thorough Investigation
163
Chapter
11:
Pursuit and Arrest
175
Chapter
12:
The Sting
183
Chapter
13:
The Only Defense Is Unconventional
191
Part Three: Prerequisite Unconventional Warfare Skills
Chapter
14:
Finding an Enemy Weakness
199
Chapter
15:
Obscure Approach
215
Chapter
16:
Disguising the Attack
237
Chapter
17:
Precluding a Counterstroke
249
Chapter
18:
Rural Escape and Evasion
281
vii
Contents
--------------------------------------------------------------——--------
Chapter
19:
Enhancing Rural Terrain
303
Chapter
20:
Urban Escape and Evasion
327
Chapter
21:
Enhancing Urban Terrain
345
Afterword
367
Notes
375
Glossary
419
Bibliography
429
About the Author
449
Name Index
451
VIII
Illustrations
Maps
Chapter
1:
The Sino-Islamist Connection
1.1:
Eastern Oil Route from Africa
5
1.2:
The Malay Peninsula Bottleneck
9
1.3:
China
10
Chapter
2:
Burma, Thailand, and Malaysia
2.1:
The New Irrawaddy Conduit
31
2.2:
Old Burma Road
32
2.3:
Towns and Boundaries in Northwest Burma
33
2.4:
Golden-Triangle Buffer
34
Chapter
3:
Southern Philippines and Indonesia
3.1:
Philippine Island Chain
39
3.2:
Indonesia
45
3.3:
Sulawesi
56
Chapter
4:
Cambodia and Laos
4.1:
Once China s Closest Ally in Southeast Asia
67
4.2:
Laos
75
Chapter
5:
Nepal and Bangladesh
5.1:
The Jewel of South Asia
80
5.2:
The Road between Lhasa and Kathmandu
81
5.3:
Easy Access to the Bay of Bengal
83
ix
Illustrations
Chapter
6:
India and Sri Lanka
6.1:
Indian Subcontinent
93
6.2:
Communist Insurgency Corridor
94
6.3:
Naxalite-Targeted Areas as of August
2006 95
6.4:
Sri Lanka
99
Chapter
7:
Pakistan and Afghanistan
7.1:
The Afghan Provinces
113
7.2:
Area of Strategic Significance to the PRC
117
7.3:
Chinese Transportation Hub
121
7.4:
The Way through Jammu-Kashmir to Afghanistan
131
7.5:
Karakoram Highway
132
7.6:
The Two Reinforcement Routes from China
134
7.7:
Close-Up of Chitral Region
135
7.8:
Close-Up of Pamir Region
138-139
Chapter
19:
Enhancing Rural Terrain
19.1:
U.S. Guerrilla-Prepared Hides
315
19.2:
U.S. Guerrilla-Prepared Conduits
318
Chapter
20:
Urban Escape and Evasion
20.1:
From Citadel s SW Corner to Phu Cam Canal
330
20.2:
Up Phu Cam s Runoff Ditch Feeders to the Ridge
333
Chapter
21:
Enhancing Urban Terrain
21.1:
The Citadel s Walls and Many Gates
347
Figures
Chapter
7:
Pakistan and Afghanistan
7.1:
U.S. Army s Strategic Studies Institute Table
114-116
Chapter
8:
What Hasn t Worked in the Past
8.1:
GIs Now Spend Too Much Time on Defense
148
χ
Chapter
10:
A Thorough Investigation
Illustrations
10.1:
The Most Common Type of Hidden Evidence
168
10.2:
Crime Scene Search Patterns
171
10.3:
Most Indoor Searches Require the Zone Method
173
Chapter
11:
Pursuit and Arrest
11.1:
POW Procedures Still Apply
179
11.2:
All Suspects Are Presumed Innocent
181
Chapter
14:
Finding an Enemy Weakness
14.1:
Al-Qaeda s Strongpoint Defense in Waziristans
203
14.2:
Fort Affords Visibility
&
Fire at Base of All Walls
204
14.3:
Eastern Sappers Crawl through Barbed Wire
209
14.4:
UW Guerrilla Course for Reconnoitering
210-211
Chapter
15:
Obscure Approach
15.1:
UW Guerrilla Instruction for Approach March
216-217
15.2:
Mounds Provide a Horizon to Foes at Their Base
217
15.3:
Lighter Backgrounds Create False Horizons
218
15.4:
The Enemy s Position Looms
219
15.5:
What s Really of Interest Is on the Inside
220
15.6:
There s Only One Safe Way to Find Out What It Is
221
15.7:
Probable Gaps in Enemy Lines
222
15.8:
Sentries Have Limitations
223
15.9:
Distracters to a Sentry s Night Vision
225
15.10:
Distracters to a Sentry s Hearing
226
15.11:
Distracters to a Sentry s Attention
227
15.12:
Distracters to a Sentry s Ability to Act
229
15.13:
Time to Go
230
15.14:
The East-Asian Stalking Approach
231
15.15:
Penetration Sequence for Objective without Wire
232
15.16:
Getting In through a Vacant Watershed Ditch
233
15.17:
Getting In through Undefended Wet Ground
234
15.18:
Getting In through Uncleared Vegetation
235
xi
Illustrations
Chapter
16:
Disguising the Attack
16.1:
Much Depends on the Lowly Bush
239
16.2:
UW Guerrilla Course for Silent Rural Attack
239-240
16.3:
Most Forward Movement Must Be by Crawling
240
16.4:
Camouflage Netting May Help near Enemy Sentry
241
16.5:
There Are Several Ways to Silently Cross Wire
242
16.6:
Even Russians Climb Trees
243
16.7:
Urban Combat Requires Structure Climbing
244
16.8:
UW Guerrilla Course for Silent Urban Attack
245-246
16.9:
Passing an Asian Sentry Is More of a Chore
246
Chapter
17:
Precluding the Counterstroke
17.1:
UW Guerrilla Instruction for Noisy Attack
251
17.2:
The Inevitable Trip Flare
251
17.3:
American UW Noisy-Assault Specialist
258
17.4:
Mission Is to Retrieve Intelligence from Bunker
260
17.5:
Squads Crawl up Parallel Covered Lanes
261
17.6:
The Enemy s Lines from Up Close
261
17.7:
Each Squad Must Make Its Own Breach
262
17.8:
Bangalores Blown When Artillery Barrage Hits
263
17.9:
Lead Man Carries M-79 and Shoots Only Forward
264
17.10:
Others with Rifles Shoot Only to Side and Down
265
17.11:
Target of the Subsequent Attack
266
17:12:
Flying Columns Stalk the Target
268
17.13:
Shooters Know Fire Sectors at Limit of Advance
270
17.14:
Shooters Crawl Up and Silently Dispatch Sentries
271
17.15:
Center Team Retrieves Intelligence from Bunker
273
17:16:
Columns Leave the Same Way They Came In
274
17.17:
Columns Converge on Bunker from All Directions
276
17.18:
All Sentries Grenaded at Once
277
17.19:
Bunker Blown to Resemble Lucky Artillery Hit
278
Chapter
18:
Rural Escape and Evasion
18.1:
UW Instruction for Rural Escape/Evasion
286-287
18.2:
U.S. Infantrymen Get No E&E Training
287
18.3:
Even Russians Learn How to Hide in Plain Sight
289
xii
Illustrations
18.4:
The Eventual Encirclement
294
18.5:
Exfiltration Is Not That Hard
295
18.6:
Five Hide in Tree As One Diverts at Hollow Stump
297
18.7:
Five Hide under Roots As One Diverts at Stream
298
18.8:
Best After-Dark Back-Up Is Fake Mortar Attack
300
18.9:
Non-Firing Rush Away from Fused Firecrackers
301
Chapter
19:
Enhancing Rural Terrain
19.1:
Hiding Places beneath the Hummocks on Iwo Jima
306
19.2:
Main Tunnel beneath Bottom Tier of Huge Rooms
306
19.3:
More Than Just a Bomb Shelter on Luzon in
1945 307
19.4:
Korean Hill Covered with Escape Chambers
308
19.5:
Secret Exit by Trapdoor to Sealed Tunnel
308
19.6:
UW Instruction on How to Enhance Rural Terrain
312
19.7:
Certain Species of Trees Have Spreading Roots
313
19.8:
One-Man Escape Chamber from Scratch
313
19.9:
Spider Hole Preparation
316
19.10:
Taking Advantage of Every Fold in the Ground
316
19.11:
Five Hide in Bramble as One Diverts at Hole
322
19.12:
All Six at Hidden Depression in Fake Minefield
323
19.13:
Flash-Bang Maze to Break Contact
325
Chapter
20:
Urban Escape and Evasion
20.1:
Storm Drains and Sewers
334
20.2:
Crawl-Spaces beneath Houses
334
20.3:
Breezeways between Buildings
335
20.4:
Basements
336
20.5:
Ventilation Ducts
336
20.6:
Eaves
337
20.7:
Roofs and Attics
338
20.8:
UW Instruction for Urban Escape/Evasion
339
20.9:
Naturally Existing Escape Routes at U.S. Outpost
341
20.10:
Secretly Leaving the Outpost Building
342
20.11:
Remotely Set Fire-and-Firecracker Diversion
343
xiii
Illustrations
■
Chapter
21:
Enhancing Urban Terrain
21.1:
UW Instruction on How to Enhance Urban Terrain
353
21.2:
Storm Drain Feeder Branches Can Be Widened
353
21.3:
Removable Back to Obvious Shelter
356
21.4:
The Beginnings of a Fake Wall
357
21.5:
Exfiltration Lanes from CAP Platoon Outpost
358
21.6:
U.S. Guerrilla-Option Urban Hides
359
21.7:
U.S. Guerrilla-Option Urban Conduits
360
21.8:
Strings of American Safe Houses
361
21.9:
With Secret Safe Room, GIs Need Not Depart
362
21.10:
Today s GIs Need Training in UW
366
Afterword
A.1: Infantry Company Training Facilitator
371
xiv
|
adam_txt |
Contents
List of Illustrations
ix
Foreword
xv
Preface
xvii
Introduction
xxiii
Acknowledgments
xxxi
Part One: Return of the Dragon
Chapter
1:
The Sino-Islamist Connection
3
Chapter
2:
Burma, Thailand, and Malaysia
25
Chapter
3:
Southern Philippines and Indonesia
37
Chapter
4:
Cambodia and Laos
65
Chapter
5:
Nepal and Bangladesh
79
Chapter
6:
India and Sri Lanka
91
Chapter
7:
Pakistan and Afghanistan
107
Part Two: A Viable Containment Strategy
Chapter
8:
What Hasn't Worked in the Past
145
Chapter
9:
The Law Enforcement Dimension
157
Chapter
10:
A Thorough Investigation
163
Chapter
11:
Pursuit and Arrest
175
Chapter
12:
The Sting
183
Chapter
13:
The Only Defense Is Unconventional
191
Part Three: Prerequisite Unconventional Warfare Skills
Chapter
14:
Finding an Enemy Weakness
199
Chapter
15:
Obscure Approach
215
Chapter
16:
Disguising the Attack
237
Chapter
17:
Precluding a Counterstroke
249
Chapter
18:
Rural Escape and Evasion
281
vii
Contents
--------------------------------------------------------------——--------
Chapter
19:
Enhancing Rural Terrain
303
Chapter
20:
Urban Escape and Evasion
327
Chapter
21:
Enhancing Urban Terrain
345
Afterword
367
Notes
375
Glossary
419
Bibliography
429
About the Author
449
Name Index
451
VIII
Illustrations
Maps
Chapter
1:
The Sino-Islamist Connection
1.1:
Eastern Oil Route from Africa
5
1.2:
The Malay Peninsula Bottleneck
9
1.3:
China
10
Chapter
2:
Burma, Thailand, and Malaysia
2.1:
The New Irrawaddy Conduit
31
2.2:
Old Burma Road
32
2.3:
Towns and Boundaries in Northwest Burma
33
2.4:
"Golden-Triangle" Buffer
34
Chapter
3:
Southern Philippines and Indonesia
3.1:
Philippine Island Chain
39
3.2:
Indonesia
45
3.3:
Sulawesi
56
Chapter
4:
Cambodia and Laos
4.1:
Once China's Closest Ally in Southeast Asia
67
4.2:
Laos
75
Chapter
5:
Nepal and Bangladesh
5.1:
The Jewel of South Asia
80
5.2:
The Road between Lhasa and Kathmandu
81
5.3:
Easy Access to the Bay of Bengal
83
ix
Illustrations
Chapter
6:
India and Sri Lanka
6.1:
Indian Subcontinent
93
6.2:
Communist Insurgency "Corridor"
94
6.3:
Naxalite-Targeted Areas as of August
2006 95
6.4:
Sri Lanka
99
Chapter
7:
Pakistan and Afghanistan
7.1:
The Afghan Provinces
113
7.2:
Area of Strategic Significance to the PRC
117
7.3:
Chinese Transportation Hub
121
7.4:
The Way through Jammu-Kashmir to Afghanistan
131
7.5:
Karakoram Highway
132
7.6:
The Two Reinforcement Routes from China
134
7.7:
Close-Up of Chitral Region
135
7.8:
Close-Up of Pamir Region
138-139
Chapter
19:
Enhancing Rural Terrain
19.1:
U.S. Guerrilla-Prepared Hides
315
19.2:
U.S. Guerrilla-Prepared Conduits
318
Chapter
20:
Urban Escape and Evasion
20.1:
From Citadel's SW Corner to Phu Cam Canal
330
20.2:
Up Phu Cam's Runoff Ditch Feeders to the Ridge
333
Chapter
21:
Enhancing Urban Terrain
21.1:
The Citadel's Walls and Many Gates
347
Figures
Chapter
7:
Pakistan and Afghanistan
7.1:
U.S. Army's Strategic Studies Institute Table
114-116
Chapter
8:
What Hasn't Worked in the Past
8.1:
GIs Now Spend Too Much Time on Defense
148
χ
Chapter
10:
A Thorough Investigation
Illustrations
10.1:
The Most Common Type of Hidden Evidence
168
10.2:
Crime Scene Search Patterns
171
10.3:
Most Indoor Searches Require the Zone Method
173
Chapter
11:
Pursuit and Arrest
11.1:
POW Procedures Still Apply
179
11.2:
All Suspects Are Presumed Innocent
181
Chapter
14:
Finding an Enemy Weakness
14.1:
Al-Qaeda's Strongpoint Defense in Waziristans
203
14.2:
Fort Affords Visibility
&
Fire at Base of All Walls
204
14.3:
Eastern Sappers Crawl through Barbed Wire
209
14.4:
UW Guerrilla Course for Reconnoitering
210-211
Chapter
15:
Obscure Approach
15.1:
UW Guerrilla Instruction for Approach March
216-217
15.2:
Mounds Provide a Horizon to Foes at Their Base
217
15.3:
Lighter Backgrounds Create "False Horizons"
218
15.4:
The Enemy's Position Looms
219
15.5:
What's Really of Interest Is on the Inside
220
15.6:
There's Only One Safe Way to Find Out What It Is
221
15.7:
Probable Gaps in Enemy Lines
222
15.8:
Sentries Have Limitations
223
15.9:
Distracters to a Sentry's Night Vision
225
15.10:
Distracters to a Sentry's Hearing
226
15.11:
Distracters to a Sentry's Attention
227
15.12:
Distracters to a Sentry's Ability to Act
229
15.13:
Time to Go
230
15.14:
The East-Asian Stalking Approach
231
15.15:
Penetration Sequence for Objective without Wire
232
15.16:
Getting In through a Vacant Watershed Ditch
233
15.17:
Getting In through Undefended Wet Ground
234
15.18:
Getting In through Uncleared Vegetation
235
xi
Illustrations
Chapter
16:
Disguising the Attack
16.1:
Much Depends on the Lowly Bush
239
16.2:
UW Guerrilla Course for Silent Rural Attack
239-240
16.3:
Most Forward Movement Must Be by Crawling
240
16.4:
Camouflage Netting May Help near Enemy Sentry
241
16.5:
There Are Several Ways to Silently Cross Wire
242
16.6:
Even Russians Climb Trees
243
16.7:
Urban Combat Requires Structure Climbing
244
16.8:
UW Guerrilla Course for Silent Urban Attack
245-246
16.9:
Passing an Asian Sentry Is More of a Chore
246
Chapter
17:
Precluding the Counterstroke
17.1:
UW Guerrilla Instruction for Noisy Attack
251
17.2:
The Inevitable Trip Flare
251
17.3:
American UW Noisy-Assault Specialist
258
17.4:
Mission Is to Retrieve Intelligence from Bunker
260
17.5:
Squads Crawl up Parallel Covered Lanes
261
17.6:
The Enemy's Lines from Up Close
261
17.7:
Each Squad Must Make Its Own Breach
262
17.8:
Bangalores Blown When Artillery Barrage Hits
263
17.9:
Lead Man Carries M-79 and Shoots Only Forward
264
17.10:
Others with Rifles Shoot Only to Side and Down
265
17.11:
Target of the Subsequent Attack
266
17:12:
Flying Columns Stalk the Target
268
17.13:
Shooters Know Fire Sectors at Limit of Advance
270
17.14:
Shooters Crawl Up and Silently Dispatch Sentries
271
17.15:
Center Team Retrieves Intelligence from Bunker
273
17:16:
Columns Leave the Same Way They Came In
274
17.17:
Columns Converge on Bunker from All Directions
276
17.18:
All Sentries Grenaded at Once
277
17.19:
Bunker Blown to Resemble Lucky Artillery Hit
278
Chapter
18:
Rural Escape and Evasion
18.1:
UW Instruction for Rural Escape/Evasion
286-287
18.2:
U.S. Infantrymen Get No E&E Training
287
18.3:
Even Russians Learn How to Hide in Plain Sight
289
xii
Illustrations
18.4:
The Eventual Encirclement
294
18.5:
Exfiltration Is Not That Hard
295
18.6:
Five Hide in Tree As One Diverts at Hollow Stump
297
18.7:
Five Hide under Roots As One Diverts at Stream
298
18.8:
Best After-Dark Back-Up Is Fake Mortar Attack
300
18.9:
Non-Firing Rush Away from Fused Firecrackers
301
Chapter
19:
Enhancing Rural Terrain
19.1:
Hiding Places beneath the Hummocks on Iwo Jima
306
19.2:
Main Tunnel beneath Bottom Tier of Huge Rooms
306
19.3:
More Than Just a Bomb Shelter on Luzon in
1945 307
19.4:
Korean Hill Covered with Escape Chambers
308
19.5:
Secret Exit by Trapdoor to Sealed Tunnel
308
19.6:
UW Instruction on How to Enhance Rural Terrain
312
19.7:
Certain Species of Trees Have Spreading Roots
313
19.8:
One-Man Escape Chamber from Scratch
313
19.9:
Spider Hole Preparation
316
19.10:
Taking Advantage of Every Fold in the Ground
316
19.11:
Five Hide in Bramble as One Diverts at Hole
322
19.12:
All Six at Hidden Depression in Fake Minefield
323
19.13:
"Flash-Bang" Maze to Break Contact
325
Chapter
20:
Urban Escape and Evasion
20.1:
Storm Drains and Sewers
334
20.2:
Crawl-Spaces beneath Houses
334
20.3:
Breezeways between Buildings
335
20.4:
Basements
336
20.5:
Ventilation Ducts
336
20.6:
Eaves
337
20.7:
Roofs and Attics
338
20.8:
UW Instruction for Urban Escape/Evasion
339
20.9:
Naturally Existing Escape Routes at U.S. Outpost
341
20.10:
Secretly Leaving the Outpost Building
342
20.11:
Remotely Set Fire-and-Firecracker Diversion
343
xiii
Illustrations
■
Chapter
21:
Enhancing Urban Terrain
21.1:
UW Instruction on How to Enhance Urban Terrain
353
21.2:
Storm Drain Feeder Branches Can Be Widened
353
21.3:
Removable Back to Obvious Shelter
356
21.4:
The Beginnings of a Fake Wall
357
21.5:
Exfiltration Lanes from CAP Platoon Outpost
358
21.6:
U.S. Guerrilla-Option Urban Hides
359
21.7:
U.S. Guerrilla-Option Urban Conduits
360
21.8:
Strings of American Safe Houses
361
21.9:
With Secret Safe Room, GIs Need Not Depart
362
21.10:
Today's GIs Need Training in UW
366
Afterword
A.1: Infantry Company Training Facilitator
371
xiv |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Poole, H. J. 1943- |
author_GND | (DE-588)135806682 |
author_facet | Poole, H. J. 1943- |
author_role | aut |
author_sort | Poole, H. J. 1943- |
author_variant | h j p hj hjp |
building | Verbundindex |
bvnumber | BV023223401 |
callnumber-first | U - Military Science |
callnumber-label | U240 |
callnumber-raw | U240 |
callnumber-search | U240 |
callnumber-sort | U 3240 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)178311198 (DE-599)BVBBV023223401 |
dewey-full | 355.02/180973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.02/180973 |
dewey-search | 355.02/180973 |
dewey-sort | 3355.02 6180973 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
discipline_str_mv | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01971nam a2200529zc 4500</leader><controlfield tag="001">BV023223401</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080703 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080319s2007 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007930932</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780963869548</subfield><subfield code="9">978-0-9638695-4-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">096386954X</subfield><subfield code="9">0-9638695-4-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)178311198</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023223401</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U240</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.02/180973</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Poole, H. J.</subfield><subfield code="d">1943-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)135806682</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dragon days</subfield><subfield code="b">time for "unconventional" tactics, illustrated</subfield><subfield code="c">H. John Poole. Foreword by Ray L. Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Emerald Isle, NC</subfield><subfield code="b">Posterity Press</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxxi, 454 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">22 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 382-418) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guerrilla warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Counterinsurgency</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Guerilla</subfield><subfield code="0">(DE-588)4022462-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Asien</subfield><subfield code="0">(DE-588)4003217-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Guerilla</subfield><subfield code="0">(DE-588)4022462-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Asien</subfield><subfield code="0">(DE-588)4003217-6</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016409259&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016409259</subfield></datafield></record></collection> |
geographic | USA China (DE-588)4009937-4 gnd Asien (DE-588)4003217-6 gnd USA (DE-588)4078704-7 gnd |
geographic_facet | USA China Asien |
id | DE-604.BV023223401 |
illustrated | Illustrated |
index_date | 2024-07-02T20:16:58Z |
indexdate | 2024-07-09T21:13:28Z |
institution | BVB |
isbn | 9780963869548 096386954X |
language | English |
lccn | 2007930932 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016409259 |
oclc_num | 178311198 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | xxxi, 454 S. Ill. 22 cm |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Posterity Press |
record_format | marc |
spelling | Poole, H. J. 1943- Verfasser (DE-588)135806682 aut Dragon days time for "unconventional" tactics, illustrated H. John Poole. Foreword by Ray L. Smith Emerald Isle, NC Posterity Press 2007 xxxi, 454 S. Ill. 22 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references (p. 382-418) and index Guerrilla warfare United States Counterinsurgency United States Guerilla (DE-588)4022462-4 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf USA China (DE-588)4009937-4 gnd rswk-swf Asien (DE-588)4003217-6 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Guerilla (DE-588)4022462-4 s DE-604 China (DE-588)4009937-4 g Terrorismus (DE-588)4059534-1 s Asien (DE-588)4003217-6 g Digitalisierung BSBMuenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016409259&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Poole, H. J. 1943- Dragon days time for "unconventional" tactics, illustrated Guerrilla warfare United States Counterinsurgency United States Guerilla (DE-588)4022462-4 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4022462-4 (DE-588)4059534-1 (DE-588)4009937-4 (DE-588)4003217-6 (DE-588)4078704-7 |
title | Dragon days time for "unconventional" tactics, illustrated |
title_auth | Dragon days time for "unconventional" tactics, illustrated |
title_exact_search | Dragon days time for "unconventional" tactics, illustrated |
title_exact_search_txtP | Dragon days time for "unconventional" tactics, illustrated |
title_full | Dragon days time for "unconventional" tactics, illustrated H. John Poole. Foreword by Ray L. Smith |
title_fullStr | Dragon days time for "unconventional" tactics, illustrated H. John Poole. Foreword by Ray L. Smith |
title_full_unstemmed | Dragon days time for "unconventional" tactics, illustrated H. John Poole. Foreword by Ray L. Smith |
title_short | Dragon days |
title_sort | dragon days time for unconventional tactics illustrated |
title_sub | time for "unconventional" tactics, illustrated |
topic | Guerrilla warfare United States Counterinsurgency United States Guerilla (DE-588)4022462-4 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Guerrilla warfare United States Counterinsurgency United States Guerilla Terrorismus USA China Asien |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016409259&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT poolehj dragondaystimeforunconventionaltacticsillustrated |