Entering the dragon's lair: Chinese antiaccess strategies and their implications for the United States
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
RAND Corp.
2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Project Air Force.". - "Prepared for the United States Air Force.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references (p. 117-129) Cover; Preface; Contents; Figures; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; The Antiaccess Challenge in Department of DefenseStrategy and Policy Publications; Previous Analyses of the Antiaccess Threat; Definition of Antiaccess; Approach; Chapter Two -- Contemporary Chinese Military Strategy; Sources of Chinese Strategy; Strategic Principles for Defeating a TechnologicallySuperior Adversary; Chinese Perceptions of U.S. Vulnerabilities; Chapter Three -- Elements of Chinese Military Strategy with Potential Implications for U.S. Theater Access; Attacks on C4ISR Systems U.S. strategists have become increasingly concerned that an adversary might use ?antiaccess? strategies to interfere with our ability to deploy or operate military forces overseas. The authors analyzed Chinese military-doctrinal publications to see what strategies China might employ in the event of a conflict with the United States. They then assessed how these strategies might affect U.S. military operations and identified ways to reduce these effects. It appears possible that China could use antiaccess strategies to defeat the United States in a conflict--not in the sense of destroying the U. |
Beschreibung: | 1 Online-Ressource (xxiv, 129 p.) |
ISBN: | 0833042572 9780833042576 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043065225 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0833042572 |c electronic bk. |9 0-8330-4257-2 | ||
020 | |a 9780833042576 |c electronic bk. |9 978-0-8330-4257-6 | ||
035 | |a (OCoLC)183651906 | ||
035 | |a (DE-599)BVBBV043065225 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 355/.033551 |2 22 | |
245 | 1 | 0 | |a Entering the dragon's lair |b Chinese antiaccess strategies and their implications for the United States |c Roger Cliff ... [et al.] |
264 | 1 | |a Santa Monica, CA |b RAND Corp. |c 2007 | |
300 | |a 1 Online-Ressource (xxiv, 129 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Project Air Force.". - "Prepared for the United States Air Force.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 | ||
500 | |a Includes bibliographical references (p. 117-129) | ||
500 | |a Cover; Preface; Contents; Figures; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; The Antiaccess Challenge in Department of DefenseStrategy and Policy Publications; Previous Analyses of the Antiaccess Threat; Definition of Antiaccess; Approach; Chapter Two -- Contemporary Chinese Military Strategy; Sources of Chinese Strategy; Strategic Principles for Defeating a TechnologicallySuperior Adversary; Chinese Perceptions of U.S. Vulnerabilities; Chapter Three -- Elements of Chinese Military Strategy with Potential Implications for U.S. Theater Access; Attacks on C4ISR Systems | ||
500 | |a U.S. strategists have become increasingly concerned that an adversary might use ?antiaccess? strategies to interfere with our ability to deploy or operate military forces overseas. The authors analyzed Chinese military-doctrinal publications to see what strategies China might employ in the event of a conflict with the United States. They then assessed how these strategies might affect U.S. military operations and identified ways to reduce these effects. It appears possible that China could use antiaccess strategies to defeat the United States in a conflict--not in the sense of destroying the U. | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Military Science |2 bisacsh | |
650 | 7 | |a HISTORY / Military / Other |2 bisacsh | |
650 | 7 | |a Access denial (Military science) |2 fast | |
650 | 7 | |a Military doctrine |2 fast | |
650 | 7 | |a Military policy |2 fast | |
650 | 7 | |a Strategic aspects of individual places |2 fast | |
650 | 7 | |a Militärdoktrin |2 swd | |
650 | 7 | |a Militärpolitik |2 swd | |
650 | 4 | |a Access denial (Military science) |z China | |
650 | 4 | |a Military doctrine |z China | |
650 | 0 | 7 | |a Militärpolitik |0 (DE-588)4065004-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Militärdoktrin |0 (DE-588)4424517-8 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
651 | 7 | |a China |0 (DE-588)4009937-4 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a China |0 (DE-588)4009937-4 |D g |
689 | 0 | 1 | |a Militärpolitik |0 (DE-588)4065004-2 |D s |
689 | 0 | 2 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a China |0 (DE-588)4009937-4 |D g |
689 | 1 | 1 | |a Militärdoktrin |0 (DE-588)4424517-8 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Cliff, Roger |e Sonstige |4 oth | |
710 | 2 | |a Project Air Force (U.S.) |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 0-8330-3995-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-8330-3995-8 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213911 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028489417 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213911 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213911 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175443648053248 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043065225 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)183651906 (DE-599)BVBBV043065225 |
dewey-full | 355/.033551 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355/.033551 |
dewey-search | 355/.033551 |
dewey-sort | 3355 533551 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04374nmm a2200685zc 4500</leader><controlfield tag="001">BV043065225</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833042572</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8330-4257-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833042576</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8330-4257-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183651906</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043065225</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355/.033551</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Entering the dragon's lair</subfield><subfield code="b">Chinese antiaccess strategies and their implications for the United States</subfield><subfield code="c">Roger Cliff ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">RAND Corp.</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 129 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Project Air Force.". - "Prepared for the United States Air Force.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 117-129)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; The Antiaccess Challenge in Department of DefenseStrategy and Policy Publications; Previous Analyses of the Antiaccess Threat; Definition of Antiaccess; Approach; Chapter Two -- Contemporary Chinese Military Strategy; Sources of Chinese Strategy; Strategic Principles for Defeating a TechnologicallySuperior Adversary; Chinese Perceptions of U.S. Vulnerabilities; Chapter Three -- Elements of Chinese Military Strategy with Potential Implications for U.S. Theater Access; Attacks on C4ISR Systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">U.S. strategists have become increasingly concerned that an adversary might use ?antiaccess? strategies to interfere with our ability to deploy or operate military forces overseas. The authors analyzed Chinese military-doctrinal publications to see what strategies China might employ in the event of a conflict with the United States. They then assessed how these strategies might affect U.S. military operations and identified ways to reduce these effects. It appears possible that China could use antiaccess strategies to defeat the United States in a conflict--not in the sense of destroying the U.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Military Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Military / Other</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Access denial (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Military doctrine</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Military policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Strategic aspects of individual places</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Militärdoktrin</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Militärpolitik</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Access denial (Military science)</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military doctrine</subfield><subfield code="z">China</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Militärpolitik</subfield><subfield code="0">(DE-588)4065004-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Militärdoktrin</subfield><subfield code="0">(DE-588)4424517-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Militärpolitik</subfield><subfield code="0">(DE-588)4065004-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">China</subfield><subfield code="0">(DE-588)4009937-4</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Militärdoktrin</subfield><subfield code="0">(DE-588)4424517-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cliff, Roger</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Project Air Force (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">0-8330-3995-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-8330-3995-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213911</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028489417</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213911</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213911</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd China (DE-588)4009937-4 gnd |
geographic_facet | USA China |
id | DE-604.BV043065225 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:22Z |
institution | BVB |
isbn | 0833042572 9780833042576 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028489417 |
oclc_num | 183651906 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxiv, 129 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | RAND Corp. |
record_format | marc |
spelling | Entering the dragon's lair Chinese antiaccess strategies and their implications for the United States Roger Cliff ... [et al.] Santa Monica, CA RAND Corp. 2007 1 Online-Ressource (xxiv, 129 p.) txt rdacontent c rdamedia cr rdacarrier "Project Air Force.". - "Prepared for the United States Air Force.". - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references (p. 117-129) Cover; Preface; Contents; Figures; Summary; Acknowledgments; Abbreviations; Chapter One -- Introduction; The Antiaccess Challenge in Department of DefenseStrategy and Policy Publications; Previous Analyses of the Antiaccess Threat; Definition of Antiaccess; Approach; Chapter Two -- Contemporary Chinese Military Strategy; Sources of Chinese Strategy; Strategic Principles for Defeating a TechnologicallySuperior Adversary; Chinese Perceptions of U.S. Vulnerabilities; Chapter Three -- Elements of Chinese Military Strategy with Potential Implications for U.S. Theater Access; Attacks on C4ISR Systems U.S. strategists have become increasingly concerned that an adversary might use ?antiaccess? strategies to interfere with our ability to deploy or operate military forces overseas. The authors analyzed Chinese military-doctrinal publications to see what strategies China might employ in the event of a conflict with the United States. They then assessed how these strategies might affect U.S. military operations and identified ways to reduce these effects. It appears possible that China could use antiaccess strategies to defeat the United States in a conflict--not in the sense of destroying the U. TECHNOLOGY & ENGINEERING / Military Science bisacsh HISTORY / Military / Other bisacsh Access denial (Military science) fast Military doctrine fast Military policy fast Strategic aspects of individual places fast Militärdoktrin swd Militärpolitik swd Access denial (Military science) China Military doctrine China Militärpolitik (DE-588)4065004-2 gnd rswk-swf Militärdoktrin (DE-588)4424517-8 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf China (DE-588)4009937-4 gnd rswk-swf China (DE-588)4009937-4 g Militärpolitik (DE-588)4065004-2 s USA (DE-588)4078704-7 g 1\p DE-604 Militärdoktrin (DE-588)4424517-8 s 2\p DE-604 Cliff, Roger Sonstige oth Project Air Force (U.S.) Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 0-8330-3995-4 Erscheint auch als Druck-Ausgabe, Paperback 978-0-8330-3995-8 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213911 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Entering the dragon's lair Chinese antiaccess strategies and their implications for the United States TECHNOLOGY & ENGINEERING / Military Science bisacsh HISTORY / Military / Other bisacsh Access denial (Military science) fast Military doctrine fast Military policy fast Strategic aspects of individual places fast Militärdoktrin swd Militärpolitik swd Access denial (Military science) China Military doctrine China Militärpolitik (DE-588)4065004-2 gnd Militärdoktrin (DE-588)4424517-8 gnd |
subject_GND | (DE-588)4065004-2 (DE-588)4424517-8 (DE-588)4078704-7 (DE-588)4009937-4 |
title | Entering the dragon's lair Chinese antiaccess strategies and their implications for the United States |
title_auth | Entering the dragon's lair Chinese antiaccess strategies and their implications for the United States |
title_exact_search | Entering the dragon's lair Chinese antiaccess strategies and their implications for the United States |
title_full | Entering the dragon's lair Chinese antiaccess strategies and their implications for the United States Roger Cliff ... [et al.] |
title_fullStr | Entering the dragon's lair Chinese antiaccess strategies and their implications for the United States Roger Cliff ... [et al.] |
title_full_unstemmed | Entering the dragon's lair Chinese antiaccess strategies and their implications for the United States Roger Cliff ... [et al.] |
title_short | Entering the dragon's lair |
title_sort | entering the dragon s lair chinese antiaccess strategies and their implications for the united states |
title_sub | Chinese antiaccess strategies and their implications for the United States |
topic | TECHNOLOGY & ENGINEERING / Military Science bisacsh HISTORY / Military / Other bisacsh Access denial (Military science) fast Military doctrine fast Military policy fast Strategic aspects of individual places fast Militärdoktrin swd Militärpolitik swd Access denial (Military science) China Military doctrine China Militärpolitik (DE-588)4065004-2 gnd Militärdoktrin (DE-588)4424517-8 gnd |
topic_facet | TECHNOLOGY & ENGINEERING / Military Science HISTORY / Military / Other Access denial (Military science) Military doctrine Military policy Strategic aspects of individual places Militärdoktrin Militärpolitik Access denial (Military science) China Military doctrine China USA China |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=213911 |
work_keys_str_mv | AT cliffroger enteringthedragonslairchineseantiaccessstrategiesandtheirimplicationsfortheunitedstates AT projectairforceus enteringthedragonslairchineseantiaccessstrategiesandtheirimplicationsfortheunitedstates |