Shopping cart
Your cart empty!
Terms of use dolor sit amet consectetur, adipisicing elit. Recusandae provident ullam aperiam quo ad non corrupti sit vel quam repellat ipsa quod sed, repellendus adipisci, ducimus ea modi odio assumenda.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Do you agree to our terms? Sign up
This book confronts the paradox that as power grows, so can vulnerability. The basic reason for this is that the same factors that produce modern power –technological advancement and economic integration – also increase exposure to risk. The book suggests a way to mitigate U.S. and Chinese strategic vulnerabilities to each other. It is written from an American perspective, with U.S. interests foremost in mind. It ‘s core idea is that mutual strategic vulnerability calls for mutual strategic restraint. Testimonials: “In an era where the development of new technologies threatens to outstrip strategic doctrine, David Gompert and Phil Saunders offer a searching mediation on issues at the forefront of security. Policymakers on both sides of the Pacific will find much to consider iin this timely and important book” –Henry Kissinger “In this book, David Gompert and Phil Saunders make an important contribution to American strategic thinking and to the future of U.S.-China relations. Grounded in the international experience in nuclear deterrence yet fresh and novel, their recommendations for mutual strategic restraint in space and cyber relationships between the two countries are deep and compelling. Gompert and Saunders take a new look and come up with a practical way forward in areas that are difficult, important, sensationalized and little understood. Both interested citizens and government specialists and policymakers will benefit from their work.” – ADM Dennis Blair, USN (Ret.) former Director of National Intelligence and commander, U.S. Pacific Command
Comments