Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

The Vietnam War: The Definitive Illustrated History
The Vietnam War: The Definitive Illustrated History

Created in association with the Smithsonian Institution, this authoritative guide chronicles America's fight against Communism in southeast Asia during the 1960s and 1970s, and comprehensively explores the people, politics, events, and lasting effects of the Vietnam War.

Honoring those who served in the war at home or abroad,...

The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Multi-Sensor Data Fusion with MATLAB®
Multi-Sensor Data Fusion with MATLAB®

Using MATLAB® examples wherever possible, Multi-Sensor Data Fusion with MATLAB explores the three levels of multi-sensor data fusion (MSDF): kinematic-level fusion, including the theory of DF; fuzzy logic and decision fusion; and pixel- and feature-level image fusion. The authors elucidate DF...

Communication, Interpreting and Language in Wartime: Historical and Contemporary Perspectives (Palgrave Studies in Languages at War)
Communication, Interpreting and Language in Wartime: Historical and Contemporary Perspectives (Palgrave Studies in Languages at War)

This edited book provides a multi-disciplinary approach to the topics of translation and cross-cultural communication in times of war and conflict. It examines the historical and contemporary experiences of interpreters in war and in war crimes trials, as well as considering policy issues in communication difficulties in war-related...

Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day
Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day

A ground-breaking account of the first 24 hours of the D-Day invasion told by a symphony of incredible accounts of unknown and unheralded members of the Allied – and Axis – forces.

An epic battle that involved 156,000 men, 7,000 ships and 20,000 armoured vehicles, D-Day was, above all, a tale of
...

Warriors of Anatolia: A Concise History of the Hittites
Warriors of Anatolia: A Concise History of the Hittites
The Hittites in the Late Bronze Age became the mightiest military power in the Ancient Near East. Yet their empire was always vulnerable to destruction by enemy forces; their Anatolian homeland occupied a remote region, with no navigable rivers; and they were cut off from the sea. Perhaps most seriously, they suffered chronic...
The Early Roman Expansion into Italy: Elite Negotiation and Family Agendas
The Early Roman Expansion into Italy: Elite Negotiation and Family Agendas
This book presents a radical new interpretation of Roman expansion in Italy during the fourth and third centuries BCE. Nicola Terrenato argues that the process was accomplished by means of a grand bargain that was negotiated between the landed elites of central and southern Italy, while military conquest played a much smaller role than is...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy