The Resource Interpreting China's grand strategy : past, present, and future, Michael D. Swaine, Ashley J. Tellis

Interpreting China's grand strategy : past, present, and future, Michael D. Swaine, Ashley J. Tellis

Label
Interpreting China's grand strategy : past, present, and future
Title
Interpreting China's grand strategy
Title remainder
past, present, and future
Statement of responsibility
Michael D. Swaine, Ashley J. Tellis
Creator
Contributor
Author
Subject
Language
eng
Summary
China's continuing rapid economic growth and expanding involvement in global affairs pose major implications for the power structure of the international system. To more accurately and fully assess the significance of China's emergence for the United States and the global community, it is necessary to gain a more complete understanding of Chinese security thought and behavior. This study addresses such questions as: What are China's most fundamental national security objectives? How has the Chinese state employed force and diplomacy in the pursuit of these objectives over the centuries? What s
Member of
Action
digitized
Cataloging source
N$T
Dewey number
355/.033051
Illustrations
  • illustrations
  • maps
Index
index present
LC call number
UA835
LC item number
.S82 2000eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
Project Air Force
Label
Interpreting China's grand strategy : past, present, and future, Michael D. Swaine, Ashley J. Tellis
Publication
Note
"MR-1121-AF."
Bibliography note
Includes bibliographical references (pages 243-272) and index
http://library.link/vocab/branchCode
  • net
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Cover; Preface; Contents; Maps, Figures, and Table; Summary; Acknowledgements; Acronyms; Chronology of Chinese History; Chapter One -- China as a National Security Concern; Chapter Two -- China's Security Problem; Chapter Three -- The Historical Context; Border Defense and Periphery Control; Fluctuations in Periphery Control and Regime Boundaries; The Use of Force; The Use of Noncoercive Security Strategies; The Influence of Domestic Leadersip Politics; Chapter Four -- China's Current Security Strategy: Features and Implications; Factors Shaping China's Calculative Security Strategy
Control code
ocm48139740
Dimensions
unknown
Extent
1 online resource (xx, 283 pages)
Form of item
online
Isbn
9780833048301
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations, maps
http://library.link/vocab/ext/overdrive/overdriveId
22573/ctt4v4f
http://library.link/vocab/recordID
.b19783681
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
  • (OCoLC)48139740
  • sks0585375836
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...