Spurred by security and safety challenges, research efforts in thermographic sensors have advanced greatly, resulting in better performance in remote surveillance, object recognition, guidance and so on.
This comprehensive survey provides a thorough account of the recent deployment of infrared sensors in modern applications of...
Information is a two edged sword that can both help and hinder modern society. The Art of Information Warfare is the first common-sense primer on the subject written for those interested in or requiring a practical orientation to the threats and issues associated with today's Information Society from military, corporate, and...
I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...
Linear Programming deals with the problem of minimizing or maximizing a
linear function in the presence of linear inequalities. Since the development of
the simplex method by George B. Dantzig in 1947, linear programming has been
extensively used in the military, industrial, governmental, and urban planning
fields, among others. The...
Dwarf Fortress may be the most complex video game ever made, but all that detail makes for fascinating game play, as various elements collide in interesting and challenging ways. The trick is getting started. In this guide, Fortress geek Peter Tyson takes you through the basics of this menacing realm, and helps you overcome the...
Ballistic Trauma: A Practical Guide provides a concise guide to the clinical and operational issues surrounding the management of the ballistic casualty. The book crystallizes the knowledge and experience accrued by those dealing with ballistic trauma on a regular basis and extends this to those who have to manage these...
R, an Open Source software, has become the de facto statistical computing environment. It has an excellent collection of data manipulation and graphics capabilities. It is extensible and comes with a large number of packages that allow statistical analysis at all levels – from simple to advanced – and in numerous fields...
A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this technology has extended to a range of civilian applications including environmental monitoring,...
This book examines North Korea’s nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea’s military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang’s...
Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...
Conquering cyber attacks requires a multi-sector, multi-modalapproach
Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....
The definitive, end-to-end guide to high-performance UWB system design
With the FCC's approval of new ultra wideband standards, UWB is poised to drive breakthroughs in both commercial and military communications. However, UWB system design is radically different from...