In the face of Islam's own internal struggles, it is not easy to see who we should support and how. This report provides detailed descriptions of subgroups, their stands on various issues, and what those stands may mean for the West. Since the outcomes can matter greatly to international community, that community might wish to influence them by providing support to appropriate actors. The author recommends a mixed approach of providing specific types of support to those who can influence the outcomes in desirable ways.
In the region of Central Asia and South Caucasus, what is the potential for armed conflict, and how might such outbreaks escalate to a level that could involve U.S. forces? The authors evaluate the key political, economic, and societal faultlines underlying the likelihood of conflict in the region, assessing their implications for regional stability and for U.S. interests and potential involvement over the next 10 to 15 years.
In the coming decade, NATO faces growing fiscal austerity and declining defense budgets. This study analyzes the impact of planned defense budget cuts on the capabilities of seven European members of NATO:the United Kingdom, France, Germany, Italy, Spain, the Netherlands, and Poland. The authors assess the implications of the cuts for NATO capabilities and strategy and for U. S. policy.
Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national institutions and infrastructures on potentially vulnerable elements of the U.S. national information infrastructure. To examine these effects, the authors conducted a series of exercises employing a methodology known as the Day After ... in which participants are presented with an information warfare crisis scenario and asked to advise the president on possible responses. Participants included senior national security community members and representatives from security-related telecommunications and information-systems industries. The report synthesizes the exercise results and presents the instructions from the exercise materials in their entirety.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.