Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Software Design for Resilient Computer Systems
Software Design for Resilient Computer Systems

This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. With this second edition of Software Design for Resilient Computer Systems the book is thoroughly updated to contain the newest advice...

Daring Missions of World War II
Daring Missions of World War II

Few World War II stories are more gripping than those fought behind enemy lines by spies, underground members, and special forces.

In his latest collection, Daring Missions of World War II, popular author and distinguished historian William Breuer brings to light largely unknown stories of behind-the-scenes bravery and covert...

The Paths of History
The Paths of History
"Igor Diakonoff's The Paths of History is a remarkable survey of world history by a Russian orientalist, using a Marxist interpretation as a point of departure."
Eric Hobsbawm, New Statesman & Society

"...this is an important
...
Six-Legged Soldiers: Using Insects as Weapons of War
Six-Legged Soldiers: Using Insects as Weapons of War
"Six-Legged Soldiers is an excellent account of the affect arthropod-borne diseases have had on warfare...This book will inspire readers to understand...threats and prepare new methods to combat them."--Nature, November 2008

"Both science and military history buffs will learn much from Lockwood, a self-described skeptic
...
Intuitionistic Fuzzy Aggregation and Clustering (Studies in Fuzziness and Soft Computing)
Intuitionistic Fuzzy Aggregation and Clustering (Studies in Fuzziness and Soft Computing)

The concept of intuitionistic fuzzy set (IFS) was originally introduced by Atanassov (1983) to extend the concept of the traditional fuzzy set. Each element in an IFS is expressed by an ordered pair which is called an intuitionistic fuzzy value (IFV) (or intuitionistic fuzzy number (IFN)), and each IFV is characterized by a membership degree,...

50 Battles That Changed the World
50 Battles That Changed the World
Any attempt to list the 50 most important battles in all history is necessarily subjective. To list them in order of importance is an even greater exercise of chutzpah. Nevertheless, people have been listing decisive battles since Sir Edward Creasy, a lawyer who taught history, a century-and-a-half ago. Other compilers include...
South Africa's Post-Apartheid Military: Lost in Transition and Transformation (Advanced Sciences and Technologies for Security Applications)
South Africa's Post-Apartheid Military: Lost in Transition and Transformation (Advanced Sciences and Technologies for Security Applications)
This timely book examines how the South African National Defence Force has adapted to the country’s new security, political and social environment since 1994. In South Africa’s changed political state, how has civilian control of the military been implemented and what does this mean for ‘defence in a democracy’? This...
Computer Games and Team and Individual Learning
Computer Games and Team and Individual Learning

Documents research on the impact of computer games on the learning of adults. Computer games and learning are characterized from a series of different theoretical and empirical viewpoints. Both civilian sector and military applications are presented. While effectiveness of game environments to support learning can be documented in terms of...

Bistatic SAR Data Processing Algorithms
Bistatic SAR Data Processing Algorithms

Synthetic Aperture Radar (SAR) is critical for remote sensing. It works day and night, in good weather or bad. Bistatic SAR is a new kind of SAR system, where the transmitter and receiver are placed on two separate platforms. Bistatic SAR is one of the most important trends in SAR development, as the technology renders SAR more flexible and...

Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

A Professional's Guide To Data Communication In a TCP/IP World
A Professional's Guide To Data Communication In a TCP/IP World
Resource provides a comprehensive picture of the Internet protocol stack and the role of TCP/IP in data communications. Offers a thorough understanding of advanced LAN and WAN technologies, an integrated view of bridging operations, and how to ensure privacy with virtual LAN. DLC: TCP/IP...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy