Skip to main content
Confirm Action
Confirmation message
Alert
Alert message
Availability
Loading...
Details
Loading...
Add new Pick list
Title
Please enter your Pick list title in the required format.
Please enter a title for your new Pick list. Your Pick list title may contain only letters, numbers, spaces and underscores.
Description
Please enter a description for your new Pick list. Maximum length is 4000 characters.
Update Pick list
Title
Please enter your Pick list title in the required format.
Please enter a title for your Pick list. Your Pick list title may contain only letters, numbers, spaces and underscores.
Description
Please enter a description for your Pick list. Maximum length is 4000 characters.
Select target Pick list
Target Pick list
Remove records from the original Pick list
The records will only be copied into the target Pick list if left unchecked.
External display
Loading...
Share
Menu
Home
Print Collection
Cyber Defence
Leadership
Learning Science
Management
Military Science & Technology
Military History
Military Medicine & Psychology
Military & Strategic Studies
Political Science & International Studies
I Would Like to
Find out about Library Facilities
Ask the Librarian
Provide Feedback
MINDEF/SAF Publications
Air Force News
Air Force Training Command
Army News
Defence Industry and Systems Office
FOCUS: RSAF Safety Magazine
Navy News
Pioneer
Pointer
Pointer Monographs & Supplements
Pointer Monthly Essays
Other SAF Publications
NLB eResources
Digital Resources
Singapore History
Membership
Library Membership
Rules & Regulations
Register Now
Log in
Log in using your library account
Log in with your library account
Username
Please reenter your Username (e.g. SL_XXXXXX)
Please enter your Username (e.g. SL_XXXXXX)
Password
Please enter your password.
Forgot your password?
Log in
Hidden form elements
Header quickfind search
Search Terms
Online Resources
SAFTI MI Resources
Hidden form elements
Advanced search
Home
Back to previous set
Search results
Item category 2: POINTER Articles
Filter results
Loading...
Search results
Showing 11 - 20 of 460
Previous
page of search results
Next
page of search results
Options
Refine results
Reserve selections
Save selections
Save all
Filter results
Sort by
Author by title
Title
Date (latest first)
Date (earliest first)
Author by title
Series number
List view record 11: Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
List view anchor tag for record 11: Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Select record
11
: Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
0
Like
0
Dislike
Remove Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up from your active Pick list
Save Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up to your active Pick list
Add tags
for Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Add review
for Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Ang, Kheng Leong Benedict
In:
Pointer Vol. 26, No. 2 2000
View availability
for Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
View PDF
for Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Copies:
1
List view record 12: Fighting a Legitimate War-applying the just war tradition to contemporary military operations
List view anchor tag for record 12: Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Select record
12
: Fighting a Legitimate War-applying the just war tradition to contemporary military operations
0
Like
0
Dislike
Remove Fighting a Legitimate War-applying the just war tradition to contemporary military operations from your active Pick list
Save Fighting a Legitimate War-applying the just war tradition to contemporary military operations to your active Pick list
Add tags
for Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Add review
for Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Ang, Pei-Zheng Timothy
In:
Pointer Vol. 37, No. 2 2011
View availability
for Fighting a Legitimate War-applying the just war tradition to contemporary military operations
View PDF
for Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Copies:
1
List view record 13: The command of the Australian defence force
List view anchor tag for record 13: The command of the Australian defence force
Select record
13
: The command of the Australian defence force
0
Like
0
Dislike
Remove The command of the Australian defence force from your active Pick list
Save The command of the Australian defence force to your active Pick list
Add tags
for The command of the Australian defence force
Add review
for The command of the Australian defence force
The command of the Australian defence force
Baker, John
In:
Vol. 24(3), Jul/Sep, (1998), p7-22 Pointer Vol. 24, No. 3
View availability
for The command of the Australian defence force
View PDF
for The command of the Australian defence force
Copies:
1
List view record 14: Harnessing Commercial Technologies to Tackle Intelligence Information Overload
List view anchor tag for record 14: Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Select record
14
: Harnessing Commercial Technologies to Tackle Intelligence Information Overload
0
Like
0
Dislike
Remove Harnessing Commercial Technologies to Tackle Intelligence Information Overload from your active Pick list
Save Harnessing Commercial Technologies to Tackle Intelligence Information Overload to your active Pick list
Add tags
for Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Add review
for Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Bernard Tan
In:
Pointer Vol. 32, No. 3 2006
View availability
for Harnessing Commercial Technologies to Tackle Intelligence Information Overload
View PDF
for Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Copies:
1
List view record 15: Innovative Leadership – a case study of Tal Afar and implications for the SAF
List view anchor tag for record 15: Innovative Leadership – a case study of Tal Afar and implications for the SAF
Select record
15
: Innovative Leadership – a case study of Tal Afar and implications for the SAF
0
Like
0
Dislike
Remove Innovative Leadership – a case study of Tal Afar and implications for the SAF from your active Pick list
Save Innovative Leadership – a case study of Tal Afar and implications for the SAF to your active Pick list
Add tags
for Innovative Leadership – a case study of Tal Afar and implications for the SAF
Add review
for Innovative Leadership – a case study of Tal Afar and implications for the SAF
Innovative Leadership – a case study of Tal Afar and implications for the SAF
Bertram Ang
In:
Pointer Vol. 39, No. 3 2013
View availability
for Innovative Leadership – a case study of Tal Afar and implications for the SAF
View PDF
for Innovative Leadership – a case study of Tal Afar and implications for the SAF
Copies:
1
List view record 16: Advancement in simulation technology and its military application
List view anchor tag for record 16: Advancement in simulation technology and its military application
Select record
16
: Advancement in simulation technology and its military application
0
Like
0
Dislike
Remove Advancement in simulation technology and its military application from your active Pick list
Save Advancement in simulation technology and its military application to your active Pick list
Add tags
for Advancement in simulation technology and its military application
Add review
for Advancement in simulation technology and its military application
Advancement in simulation technology and its military application
Boh, Choun Kiat
In:
Pointer Vol. 25, No. 2 1999
View availability
for Advancement in simulation technology and its military application
View PDF
for Advancement in simulation technology and its military application
Copies:
1
List view record 17: Reflections on the new Indo-Pacific maritime and naval environment
List view anchor tag for record 17: Reflections on the new Indo-Pacific maritime and naval environment
Select record
17
: Reflections on the new Indo-Pacific maritime and naval environment
0
Like
0
Dislike
Remove Reflections on the new Indo-Pacific maritime and naval environment from your active Pick list
Save Reflections on the new Indo-Pacific maritime and naval environment to your active Pick list
Add tags
for Reflections on the new Indo-Pacific maritime and naval environment
Add review
for Reflections on the new Indo-Pacific maritime and naval environment
Reflections on the new Indo-Pacific maritime and naval environment
Boutilier, James A.
In:
Pointer Vol. 30, No. 2
View availability
for Reflections on the new Indo-Pacific maritime and naval environment
Copies:
1
List view record 18: Book Review : Cyber War: The Next Threat to National Security and What to Do about It
List view anchor tag for record 18: Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Select record
18
: Book Review : Cyber War: The Next Threat to National Security and What to Do about It
0
Like
0
Dislike
Remove Book Review : Cyber War: The Next Threat to National Security and What to Do about It from your active Pick list
Save Book Review : Cyber War: The Next Threat to National Security and What to Do about It to your active Pick list
Add tags
for Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Add review
for Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Brandon Koh
In:
Pointer Vol. 40, No. 1
View availability
for Book Review : Cyber War: The Next Threat to National Security and What to Do about It
View PDF
for Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Copies:
1
List view record 19: Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
List view anchor tag for record 19: Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Select record
19
: Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
0
Like
0
Dislike
Remove Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations from your active Pick list
Save Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations to your active Pick list
Add tags
for Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Add review
for Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Budde, Hans-Otto
In:
Pointer Vol. 34, No. 4 2009
View availability
for Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Copies:
1
List view record 20: Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
List view anchor tag for record 20: Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Select record
20
: Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
0
Like
0
Dislike
Remove Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China from your active Pick list
Save Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China to your active Pick list
Add tags
for Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Add review
for Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Cai Dexian
In:
Pointer Vol. 39, No. 2 2013
View availability
for Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
View PDF
for Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Copies:
1
List view record 11: Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Select record
11
: Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Remove Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up from your active Pick list
Save Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up to your active Pick list
Add tags
for Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Add review
for Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
0
Like
0
Dislike
Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Ang, Kheng Leong Benedict
In:
Pointer Vol. 26, No. 2 2000
View PDF
for Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
View availability
for Understanding the security environment in Southeast Asia ; a key to analysing the arms build-up
Copies:
1
List view record 12: Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Select record
12
: Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Remove Fighting a Legitimate War-applying the just war tradition to contemporary military operations from your active Pick list
Save Fighting a Legitimate War-applying the just war tradition to contemporary military operations to your active Pick list
Add tags
for Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Add review
for Fighting a Legitimate War-applying the just war tradition to contemporary military operations
0
Like
0
Dislike
Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Ang, Pei-Zheng Timothy
In:
Pointer Vol. 37, No. 2 2011
View PDF
for Fighting a Legitimate War-applying the just war tradition to contemporary military operations
View availability
for Fighting a Legitimate War-applying the just war tradition to contemporary military operations
Copies:
1
List view record 13: The command of the Australian defence force
Select record
13
: The command of the Australian defence force
Remove The command of the Australian defence force from your active Pick list
Save The command of the Australian defence force to your active Pick list
Add tags
for The command of the Australian defence force
Add review
for The command of the Australian defence force
0
Like
0
Dislike
The command of the Australian defence force
Baker, John
In:
Vol. 24(3), Jul/Sep, (1998), p7-22 Pointer Vol. 24, No. 3
View PDF
for The command of the Australian defence force
View availability
for The command of the Australian defence force
Copies:
1
List view record 14: Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Select record
14
: Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Remove Harnessing Commercial Technologies to Tackle Intelligence Information Overload from your active Pick list
Save Harnessing Commercial Technologies to Tackle Intelligence Information Overload to your active Pick list
Add tags
for Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Add review
for Harnessing Commercial Technologies to Tackle Intelligence Information Overload
0
Like
0
Dislike
Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Bernard Tan
In:
Pointer Vol. 32, No. 3 2006
View PDF
for Harnessing Commercial Technologies to Tackle Intelligence Information Overload
View availability
for Harnessing Commercial Technologies to Tackle Intelligence Information Overload
Copies:
1
List view record 15: Innovative Leadership – a case study of Tal Afar and implications for the SAF
Select record
15
: Innovative Leadership – a case study of Tal Afar and implications for the SAF
Remove Innovative Leadership – a case study of Tal Afar and implications for the SAF from your active Pick list
Save Innovative Leadership – a case study of Tal Afar and implications for the SAF to your active Pick list
Add tags
for Innovative Leadership – a case study of Tal Afar and implications for the SAF
Add review
for Innovative Leadership – a case study of Tal Afar and implications for the SAF
0
Like
0
Dislike
Innovative Leadership – a case study of Tal Afar and implications for the SAF
Bertram Ang
In:
Pointer Vol. 39, No. 3 2013
View PDF
for Innovative Leadership – a case study of Tal Afar and implications for the SAF
View availability
for Innovative Leadership – a case study of Tal Afar and implications for the SAF
Copies:
1
List view record 16: Advancement in simulation technology and its military application
Select record
16
: Advancement in simulation technology and its military application
Remove Advancement in simulation technology and its military application from your active Pick list
Save Advancement in simulation technology and its military application to your active Pick list
Add tags
for Advancement in simulation technology and its military application
Add review
for Advancement in simulation technology and its military application
0
Like
0
Dislike
Advancement in simulation technology and its military application
Boh, Choun Kiat
In:
Pointer Vol. 25, No. 2 1999
View PDF
for Advancement in simulation technology and its military application
View availability
for Advancement in simulation technology and its military application
Copies:
1
List view record 17: Reflections on the new Indo-Pacific maritime and naval environment
Select record
17
: Reflections on the new Indo-Pacific maritime and naval environment
Remove Reflections on the new Indo-Pacific maritime and naval environment from your active Pick list
Save Reflections on the new Indo-Pacific maritime and naval environment to your active Pick list
Add tags
for Reflections on the new Indo-Pacific maritime and naval environment
Add review
for Reflections on the new Indo-Pacific maritime and naval environment
0
Like
0
Dislike
Reflections on the new Indo-Pacific maritime and naval environment
Boutilier, James A.
In:
Pointer Vol. 30, No. 2
View availability
for Reflections on the new Indo-Pacific maritime and naval environment
Copies:
1
List view record 18: Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Select record
18
: Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Remove Book Review : Cyber War: The Next Threat to National Security and What to Do about It from your active Pick list
Save Book Review : Cyber War: The Next Threat to National Security and What to Do about It to your active Pick list
Add tags
for Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Add review
for Book Review : Cyber War: The Next Threat to National Security and What to Do about It
0
Like
0
Dislike
Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Brandon Koh
In:
Pointer Vol. 40, No. 1
View PDF
for Book Review : Cyber War: The Next Threat to National Security and What to Do about It
View availability
for Book Review : Cyber War: The Next Threat to National Security and What to Do about It
Copies:
1
List view record 19: Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Select record
19
: Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Remove Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations from your active Pick list
Save Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations to your active Pick list
Add tags
for Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Add review
for Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
0
Like
0
Dislike
Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Budde, Hans-Otto
In:
Pointer Vol. 34, No. 4 2009
View availability
for Protection, Command and Control, Reconnaissance and Effects : Key Capabilities for Success in Military Operations
Copies:
1
List view record 20: Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Select record
20
: Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Remove Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China from your active Pick list
Save Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China to your active Pick list
Add tags
for Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Add review
for Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
0
Like
0
Dislike
Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Cai Dexian
In:
Pointer Vol. 39, No. 2 2013
View PDF
for Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
View availability
for Hedging for Maximum Flexibility : Singapore’s Pragmatic Approach to Security Relations with the US and China
Copies:
1
Hidden form elements
Clear current selections
items currently selected
View my active Pick list
159
Items in my active Pick list
Redirect message
×
You will be redirected if there is no further actions on this page