In the common defense: national security law for perilous times
The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage nat...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2007
|
Schlagworte: | |
Online-Zugang: | BSB01 UBG01 Volltext |
Zusammenfassung: | The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 online resource (xiv, 404 pages) |
ISBN: | 9780511509759 |
DOI: | 10.1017/CBO9780511509759 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043927477 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 161202s2007 |||| o||u| ||||||eng d | ||
020 | |a 9780511509759 |c Online |9 978-0-511-50975-9 | ||
024 | 7 | |a 10.1017/CBO9780511509759 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511509759 | ||
035 | |a (OCoLC)967420226 | ||
035 | |a (DE-599)BVBBV043927477 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-473 | ||
082 | 0 | |a 343.73/01 |2 22 | |
100 | 1 | |a Baker, James E. |d 1960- |e Verfasser |4 aut | |
245 | 1 | 0 | |a In the common defense |b national security law for perilous times |c James E. Baker |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2007 | |
300 | |a 1 online resource (xiv, 404 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | |a Perilous times : describing the threat -- The meaning of national security -- National security law -- Constitutional framework -- Electronic surveillance : constitutional law applied -- National security process -- Intelligence -- Use of military force -- Homeland security -- The national security lawyer | |
520 | |a The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance | ||
650 | 4 | |a Recht | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a National security / Law and legislation / United States | |
650 | 4 | |a National security / United States | |
650 | 4 | |a Terrorism / United States / Prevention | |
650 | 4 | |a Civil rights / United States | |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | 2 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 3 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 4 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-87763-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-107-63891-4 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511509759 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029336556 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9780511509759 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511509759 |l UBG01 |p ZDB-20-CBO |q UBG_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176856219385856 |
---|---|
any_adam_object | |
author | Baker, James E. 1960- |
author_facet | Baker, James E. 1960- |
author_role | aut |
author_sort | Baker, James E. 1960- |
author_variant | j e b je jeb |
building | Verbundindex |
bvnumber | BV043927477 |
collection | ZDB-20-CBO |
contents | Perilous times : describing the threat -- The meaning of national security -- National security law -- Constitutional framework -- Electronic surveillance : constitutional law applied -- National security process -- Intelligence -- Use of military force -- Homeland security -- The national security lawyer |
ctrlnum | (ZDB-20-CBO)CR9780511509759 (OCoLC)967420226 (DE-599)BVBBV043927477 |
dewey-full | 343.73/01 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.73/01 |
dewey-search | 343.73/01 |
dewey-sort | 3343.73 11 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
doi_str_mv | 10.1017/CBO9780511509759 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03642nmm a2200625zc 4500</leader><controlfield tag="001">BV043927477</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161202s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511509759</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-50975-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511509759</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511509759</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967420226</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043927477</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.73/01</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Baker, James E.</subfield><subfield code="d">1960-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">In the common defense</subfield><subfield code="b">national security law for perilous times</subfield><subfield code="c">James E. Baker</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 404 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Perilous times : describing the threat -- The meaning of national security -- National security law -- Constitutional framework -- Electronic surveillance : constitutional law applied -- National security process -- Intelligence -- Use of military force -- Homeland security -- The national security lawyer</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security / Law and legislation / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism / United States / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Civil rights / United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-87763-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-107-63891-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511509759</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029336556</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511509759</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511509759</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBG_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV043927477 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:38:50Z |
institution | BVB |
isbn | 9780511509759 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029336556 |
oclc_num | 967420226 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG |
owner_facet | DE-12 DE-473 DE-BY-UBG |
physical | 1 online resource (xiv, 404 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO UBG_PDA_CBO |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Baker, James E. 1960- Verfasser aut In the common defense national security law for perilous times James E. Baker Cambridge Cambridge University Press 2007 1 online resource (xiv, 404 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Perilous times : describing the threat -- The meaning of national security -- National security law -- Constitutional framework -- Electronic surveillance : constitutional law applied -- National security process -- Intelligence -- Use of military force -- Homeland security -- The national security lawyer The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance Recht Terrorismus National security / Law and legislation / United States National security / United States Terrorism / United States / Prevention Civil rights / United States Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Innere Sicherheit (DE-588)4127888-4 s Sicherheitspolitik (DE-588)4116489-1 s Terrorismus (DE-588)4059534-1 s Bekämpfung (DE-588)4112701-8 s 1\p DE-604 Erscheint auch als Druckausgabe 978-0-521-87763-3 Erscheint auch als Druckausgabe 978-1-107-63891-4 https://doi.org/10.1017/CBO9780511509759 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Baker, James E. 1960- In the common defense national security law for perilous times Perilous times : describing the threat -- The meaning of national security -- National security law -- Constitutional framework -- Electronic surveillance : constitutional law applied -- National security process -- Intelligence -- Use of military force -- Homeland security -- The national security lawyer Recht Terrorismus National security / Law and legislation / United States National security / United States Terrorism / United States / Prevention Civil rights / United States Sicherheitspolitik (DE-588)4116489-1 gnd Terrorismus (DE-588)4059534-1 gnd Bekämpfung (DE-588)4112701-8 gnd Innere Sicherheit (DE-588)4127888-4 gnd |
subject_GND | (DE-588)4116489-1 (DE-588)4059534-1 (DE-588)4112701-8 (DE-588)4127888-4 (DE-588)4078704-7 |
title | In the common defense national security law for perilous times |
title_auth | In the common defense national security law for perilous times |
title_exact_search | In the common defense national security law for perilous times |
title_full | In the common defense national security law for perilous times James E. Baker |
title_fullStr | In the common defense national security law for perilous times James E. Baker |
title_full_unstemmed | In the common defense national security law for perilous times James E. Baker |
title_short | In the common defense |
title_sort | in the common defense national security law for perilous times |
title_sub | national security law for perilous times |
topic | Recht Terrorismus National security / Law and legislation / United States National security / United States Terrorism / United States / Prevention Civil rights / United States Sicherheitspolitik (DE-588)4116489-1 gnd Terrorismus (DE-588)4059534-1 gnd Bekämpfung (DE-588)4112701-8 gnd Innere Sicherheit (DE-588)4127888-4 gnd |
topic_facet | Recht Terrorismus National security / Law and legislation / United States National security / United States Terrorism / United States / Prevention Civil rights / United States Sicherheitspolitik Bekämpfung Innere Sicherheit USA |
url | https://doi.org/10.1017/CBO9780511509759 |
work_keys_str_mv | AT bakerjamese inthecommondefensenationalsecuritylawforperiloustimes |