Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Dark Reunion (Vampire Diaries, No 4)
Dark Reunion (Vampire Diaries, No 4)

The Final Conflict...The Last Deadly Kiss

Elena
Now she rises from the dead to recreate the powerful vampire trio.

Stefan
Summoned by Elena, he keeps a promise to her and fights the most terrifying evil he's ever faced.

Damon
Joining the brother he once called enemy, Damon battles this new
...

TiVo Hacks
TiVo Hacks

Forget all you think you know about watching television. Throw out the concepts of channels and lineups. VCR+ codes, your daily paper's TV listings, even the ubiquitous TV Guide need not apply. Primetime is a ghost of television's past.

Secede from the tyranny of the TV grid. Gone are the...

A New History of the Peloponnesian War
A New History of the Peloponnesian War

This stimulating new study provides a narrative of the monumental conflict of the Peloponnesian War between Athens and Sparta, and examines the realities of the war and its effects on the average Athenian.

  • A penetrating new study of the Peloponnesian War between Athens and Sparta by an established scholar
    ...
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
The histories of modern war and childhood were the result of competing urgencies. According to ideals of childhood widely accepted throughout the world by 1900, children should have been protected, even hidden, from conflict and danger. Yet at a time when modern ways of childhood became increasingly possible for economic, social, and political...
Knowledge-Based Configuration: From Research to Business Cases
Knowledge-Based Configuration: From Research to Business Cases

Knowledge-based Configuration incorporates knowledge representation formalisms to capture complex product models and reasoning methods to provide intelligent interactive behavior with the user. This book represents the first time that corporate and academic worlds collaborate integrating research and commercial benefits of...

Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Tweak It: Make What Matters to You Happen Every Day
Tweak It: Make What Matters to You Happen Every Day

As the demands of work grow more intense, personal life can get shoved to the side. But resolving the job-versus-life conflict doesn't require the kind of big, disruptive, scary transformation that so many time-management "experts" recommend. In TWEAK IT, Cali Williams Yost proves that a comfortable work+life fit can be achieved...

Justice for Some: Law and the Question of Palestine
Justice for Some: Law and the Question of Palestine

Justice in the Question of Palestine is often framed as a question of law. Yet none of the Israel-Palestinian conflict's most vexing challenges have been resolved by judicial intervention. Occupation law has failed to stem Israel's settlement enterprise. Laws of war have permitted killing and destruction during Israel's...

The Anatomy of Peace: Resolving the Heart of Conflict
The Anatomy of Peace: Resolving the Heart of Conflict

NEW EDITION, REVISED AND UPDATED

What if conflicts at home, conflicts at work, and conflicts in the world stem from the same root cause?

What if we systematically misunderstand that cause?

And what if, as a result, we systematically perpetuate the very problems we think we are
...

The United States and Western Europe since 1945: From "Empire" by Invitation to Transatlantic Drift
The United States and Western Europe since 1945: From "Empire" by Invitation to Transatlantic Drift
`Offers a powerful argument, presents a sophisticated narrative, and is a magisterial, and, indeed, the best synthesis available of transatlantic relations since 1945 - a massive achievement.' Andreas W. Daum, Political Science Quarterly

Based on new and existing research by a world-class scholar, this is the first book in 20
...
Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy