Sea lanes and pipelines : energy security in Asia
Author(s)
Bibliographic Information
Sea lanes and pipelines : energy security in Asia
(PSI reports)
Praeger Security International, 2008
- :hbk
Available at / 6 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes bibliographical references (p. [239]-254) and index
Description and Table of Contents
Description
An unprecedented description of the critical energy situation throughout Asia, this book examines the energy resources, naval forces, and national strategies of the nations of that vast landmass, set against the priorities and resources of the United States. Energy security in Asia is crucial to the continued economic growth and hence the national security of the region's nations. Providing such security requires a combination of naval, political, and economic policies. Despite dramatic news coverage to the contrary, Cole's research reveals that the nations of the region-of which the United States must be counted-are in fact acting more together than apart in striving to ensure the security of scarce energy resources they all require.
No issue in today's international environment is more important than energy security. Even the North Korean nuclear development program must be taken as a subset of this subject. As the United States, the United Kingdom, and other nations have done in past decades, the People's Republic of China is striving to establish proprietorship of energy resources throughout their lifecycle, from recovery from the ground to sale in the market place. This important book demonstrates the vacuity of that paradigm, illustrating the multilateral nature of energy security.
Table of Contents
Dedication
List of Figures
Preface
List of Abbreviations
1 Introduction
2 Geography of the Region
3 Energy in Asia
4 Getting the Oil: Pipelines Ashore
5 Getting the Oil: Ships at Sea
6 Threats to the Sea Lines of Communications
7 Maritime Sovereignty Disputes
8 Maritime Strategies in Asia
9 Navies of Asia Maritime
10 Multilateralism and Maritime Security
11 Conclusion: Future Scenarios
Endnotes
Bibliography
Index
by "Nielsen BookData"