Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
Shaped by often very dramatic events, international security and the international system have changed significantly in recent years. The conclusion of the Cold War, the emergence of new political systems, the growth of significant threats such as terrorism, and the development of new security doctrines have driven global transformation. These...
Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios.
Overview
Learn about all the mandatory security measures for modern day applications using...
Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking...
Modify gameplay, add textures, and integrate amazing effects
Develop intense environments, then share your design with players online
How cool would it be to build your own levels and customized weapons for Half-Life 2? This book will get you ready to mod so you can enjoy the ultimate gaming...
Tales of Physicists and Mathematicians is a translation of a book that was published in Russia in 2001 and is based on articles that appeared from 1960–1980. The first edition of the book, less than half the size of the current one, was published in the Soviet Union in 1981 and in English in 1988. Thus the book has its own history, and I...
The rapid advance of technology has changed and influenced how we think about gathering digital
evidence. Soon after the attacks on the World Trade Center in New York City on September 11,
2001, many young men and women volunteered to serve their country in different ways. For those
who did not choose the military, options included...
"A deeply felt and moving account from an enterprising and conscientious news photographer who worked the always-busy beat of the Middle East in the last, great days of film photography." Rod Nordland, Chief Foreign Correspondent, Newsweek
"Reading Danger Pay was a harrowing experience. Being a photojournalist...
In this two-part textbook, methods are presented for analysis and synthesis of the steady state
and perturbed state (open and closed loop) stability and control of fixed wing aircraft.
Part I contains Chapters 1-6 and Appendices A-D. Part Ð contains Chapters 7-12 as well
as Appendix E.
A unique regulatory testing and troubleshooting guide for engineers and technicians
In today’s growing high-technology environment, engineering product designers are regularly faced with the problem of electromagnetic interference that can affect optimal product performance and prevent compliance with today’s stringent regulatory...
Back in 1973 this author published National Suicide: Military Aid to the Soviet Union, itself a sequel to a three volume academic study, Western Technology and Soviet Economic Development, published by the Hoover Institution, Stanford University. These four books are detailed verifiable catalogs of Western technology used and in use by the Soviet...
In this two-part textbook, methods are presented for analysis and synthesis of the steady state
and perturbed state (open and closed loop) stability and control of fixed wing aircraft.
Part I contains Chapters 1-6 and Appendices A-D. Part II contains Chapters 7-12 as well
as Appendix E.