In this Book

The Star Wars Controversy
summary

These essays from the journal International Security assess the technical feasibility and the strategic desirability of defense against ballistic missiles.

Originally published in 1986.

The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.

Table of Contents

  1. Cover
  2. restricted access Download |
  1. Title page, Copyright
  2. pp. i-iv
  3. restricted access Download |
  1. Contents
  2. p. v
  3. restricted access Download |
  1. The Contributors
  2. p. vii
  3. restricted access Download |
  1. Preface, Stephen Van Evera
  2. Stephen Van Evera
  3. pp. ix-xxi
  4. restricted access Download |
  1. The Star Wars Controversy: Contending Points of View
  2. p. 1
  1. The SDI in U.S. Nuclear Strategy
  2. Fred S. Hoffman
  3. pp. 3-14
  4. restricted access Download |
  1. Rhetoric and Realities in the Star Wars Debate
  2. James R. Schlesmer
  3. pp. 15-24
  4. restricted access Download |
  1. Why Even Good Defenses May Be Bad
  2. Charles L. Glaser
  3. pp. 25-56
  4. restricted access Download |
  1. Preserving the ABM Treaty
  2. Sidney D. Drellr Philip J. Farley, David Holloway
  3. pp. 57-97
  4. restricted access Download |
  1. Do We Want the Missile Defenses We Can Build?
  2. Charles L. Glaser
  3. pp. 98-130
  4. restricted access Download |
  1. Ballistic Missile Defense and the Atlantic Alliance
  2. David S. Yost
  3. pp. 131-162
  4. restricted access Download |
  1. Principal Official Documents of the Star Wars Controversy
  2. pp. 163-169
  3. restricted access Download |
  1. Contents
  2. p. 171
  3. restricted access Download |
  1. 1. Introduction
  2. pp. 173-176
  3. restricted access Download |
  1. 2. Booster Characteristics
  2. pp. 177-184
  3. restricted access Download |
  1. 3. Directed Energy Weapon Concepts for Boost Phrase Intercept
  2. pp. 185-208
  3. restricted access Download |
  1. 4. Other Essential Elements of a Boost-Phase Intercept System
  2. pp. 209-214
  3. restricted access Download |
  1. 5. Countermeasures to Boost-Phase Intercept
  2. pp. 215-224
  3. restricted access Download |
  1. 6. A Word on "Old" BMD and "New" BMD
  2. pp. 225-228
  3. restricted access Download |
  1. 7. A Hypothetical system Architecture
  2. pp. 229-234
  3. restricted access Download |
  1. 8. Defensive Goals I: The Perfect Defense
  2. pp. 235-242
  3. restricted access Download |
  1. 9. Defensive Goals II: Less-Than-Perfect Defense
  2. pp. 243-250
  3. restricted access Download |
  1. 10. Principal Judgments and Observations
  2. pp. 251-254
  3. restricted access Download |
  1. Appendix
  2. pp. 255-271
  3. restricted access Download |
  1. Ballistic Missile Defenses and U.S. National Security ("Hoffman Report")
  2. pp. 273-274
  1. Acknowledgements
  2. p. 275
  3. restricted access Download |
  1. Preface
  2. p. 276
  3. restricted access Download |
  1. Contents
  2. p. 277
  3. restricted access Download |
  1. A. Major conclusions and Recommendations
  2. pp. 279-282
  3. restricted access Download |
  1. B. Supporting Rationale
  2. pp. 283-290
  3. restricted access Download |
  1. The Strategic Defense Initiative: Defense Technologies Study ("Fletcher Report")
  2. pp. 291-295
  3. restricted access Download |
  1. CONTENTS
  2. p. 297
  3. restricted access Download |
  1. PREFACE
  2. p. 299
  3. restricted access Download |
  1. SUMMARY AND CONCLUSIONS OF THE DEFENSIVETECHNOLOGIES STUDY
  2. pp. 301-317
  3. restricted access Download |
  1. ORGANIZATION
  2. p. 319
  3. restricted access Download |
  1. DEFENSIVE TECHNOLOGIES STUDY TEAM MEMBERSHIP
  2. pp. 320-322
  3. restricted access Download |
  1. GLOSSARY
  2. pp. 323-327
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.