Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Bion in New York and Sao Paulo: And Three Tavistock Seminars
Bion in New York and Sao Paulo: And Three Tavistock Seminars

These two talks given in 1977 and 1978 in New York and Sao Paulo respectively are an edited version of discussions and spontaneous contributions made by Bion, in the main without notes. This is a new 2019 edition, edited and introduced by Meg Harris Williams.

Wilfred Ruprecht Bion (1897–1979) was born in India in the days...
The Warrior Code: 11 Principles to Unleash the Badass Inside of You
The Warrior Code: 11 Principles to Unleash the Badass Inside of You

From American Grit co-star, former Marine Gunnery Sergeant Tee Marie Hanible comes the story of how she became a warrior...and how you can do it, too.

In The Warrior Code, entrepreneur, philanthropist, reality star, and retired Gunnery Sergeant Tee Marie Hanible serves up eleven principles to awaken...

Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)
Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)

Using the Pi Camera and a Raspberry Pi board, expand and replicate interesting machine learning (ML) experiments.  This book provides a solid overview of ML and a myriad of underlying topics to further explore. Non-technical discussions temper complex technical explanations to make the hottest and most complex topic in the...

Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Translating Statistics to Make Decisions: A Guide for the Non-Statistician

Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticians―and also statisticians who present statistical reports to non-statisticians―must avoid if statistical results are to be correctly used for...

Sound Studio: Audio techniques for Radio, Television, Film and Recording, Seventh Edition
Sound Studio: Audio techniques for Radio, Television, Film and Recording, Seventh Edition
'The standard work on the subject since Abbey Road was a two-track operation and mixing desks looked like recycled military equipment... its coverage remains unsurpassed.'
Music Tech Magazine -- Review

A much-anticipated revision of a classic text.

This classic work has inspired and
...
Computer Vision Beyond the Visible Spectrum (Advances in Pattern Recognition)
Computer Vision Beyond the Visible Spectrum (Advances in Pattern Recognition)
Recently, there has been a dramatic increase in the use of sensors in the non-visible bands. As a result, there is a need for existing computer vision methods and algorithms to be adapted for use with non-visible sensors, or for the development of completely new methods and systems. Computer Vision Beyond the Visible Spectrum is...
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

The Palgrave Handbook of Philosophy and Public Policy
The Palgrave Handbook of Philosophy and Public Policy
This book brings together a large and diverse collection of philosophical papers addressing a wide variety of public policy issues. Topics covered range from long-standing subjects of debate such as abortion, punishment, and freedom of expression, to more recent controversies such as those over gene editing, military drones, and statues...
Software Design for Resilient Computer Systems
Software Design for Resilient Computer Systems

This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. With this second edition of Software Design for Resilient Computer Systems the book is thoroughly updated to contain the newest advice...

Computer Games and Team and Individual Learning
Computer Games and Team and Individual Learning

Documents research on the impact of computer games on the learning of adults. Computer games and learning are characterized from a series of different theoretical and empirical viewpoints. Both civilian sector and military applications are presented. While effectiveness of game environments to support learning can be documented in terms of...

Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy