Home | Amazing | Today | Tags | Publishers | Years | Search 
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The papers in this book present, for the first time, the world of warfare, both defensive and offensive, from the Classical periods to end of the Middle Ages in one collection. These scholarships have attracted ancient writers and generals and nowadays historians, archaeologists and researchers poliorcetics. Military historiography and...
An Axiomatic Study of God: A Defence of the Rationality of Religion (Philosophical Analysis)
An Axiomatic Study of God: A Defence of the Rationality of Religion (Philosophical Analysis)
Weingartner shows that an essential part of natural or philosophical theology and even a part of theology can be treated axiomatically. God’s essence, omniscience, omnipotence, creating activity, and all-goodness are described by axioms and by theorems proved from them.

The purpose of thi s book i s to show that...
Archives and Human Rights (Routledge Approaches to History)
Archives and Human Rights (Routledge Approaches to History)

Why and how can records serve as evidence of human rights violations, in particular crimes against humanity, and help the fight against impunity? Archives and Human Rights shows the close relationship between archives and human rights and discusses the emergence, at the international level, of the principles of the right to...

Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
South Africa's Post-Apartheid Military: Lost in Transition and Transformation (Advanced Sciences and Technologies for Security Applications)
South Africa's Post-Apartheid Military: Lost in Transition and Transformation (Advanced Sciences and Technologies for Security Applications)
This timely book examines how the South African National Defence Force has adapted to the country’s new security, political and social environment since 1994. In South Africa’s changed political state, how has civilian control of the military been implemented and what does this mean for ‘defence in a democracy’? This...
France and the World since 1870 (International Relations and the Great Powers)
France and the World since 1870 (International Relations and the Great Powers)
Here, John Keiger examines the subtle forces that have shaped France's international relations, from material aspects such as geography, demography, and economics, to more abstract features of France's national identity such as the notion of state and the impulse to spread French culture. The
first study of its kind in English, the book is
...
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
Aircraft Systems: Mechanical, Electrical and Avionics Subsystems Integration
The Aerospace and Defence industry has been at the forefront of systems engineering for many decades. The imperatives of commercial success and / or military need have compelled those in the Industry to seize the opportunities offered by taking a systems engineering approach to solve a variety of complex problems.

The insights offered by
...
Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium
Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium

It is widely anticipated that autonomous vehicles will have a transformational impact on military forces and will play a key role in many future force structures. As a result, many tasks have already been identified that unmanned systems could undertake more readily than humans. However, for this to occur, such systems will need to be agile,...

Free Radicals in Biology and Medicine
Free Radicals in Biology and Medicine

Free Radicals in Biology and Medicine has become a classic text in the field of free radical and antioxidant research. Now in its fifth edition, the book has been comprehensively rewritten and updated whilst maintaining the clarity of its predecessors. Two new chapters discuss 'in vivo' and 'dietary' antioxidants, the first...

Programming for Peace: Computer-Aided Methods for International Conflict Resolution and Prevention
Programming for Peace: Computer-Aided Methods for International Conflict Resolution and Prevention
From its beginning in the fifties of the last century, Artificial Intelligence was heavily supported by “defence agencies” in order to make “better warfare”.

But, if an AI researchers assumes that her/his discipline really can deliver results—otherwise s/he would be a dishonest researcher—then why not
...
Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
Crowd Simulation
Crowd Simulation
There has been a growing interest in crowd simulation particularly in the commercial sector where it is used in security, defence, entertainment and the movie industry. This field is now reaching maturity and there is a need for a book that focuses entirely on methods and techniques for crowd simulation, this book fills that gap.

The topics...

Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy