Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...
This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. With this second edition of Software Design for Resilient Computer Systems the book is thoroughly updated to contain the newest advice...
Few World War II stories are more gripping than those fought behind enemy lines by spies, underground members, and special forces.
In his latest collection, Daring Missions of World War II, popular author and distinguished historian William Breuer brings to light largely unknown stories of behind-the-scenes bravery and covert...
"Igor Diakonoff's The Paths of History is a remarkable survey of world history by a Russian orientalist, using a Marxist interpretation as a point of departure."
"Six-Legged Soldiers is an excellent account of the affect arthropod-borne diseases have had on warfare...This book will inspire readers to understand...threats and prepare new methods to combat them."--Nature, November 2008
"Both science and military history buffs will learn much from Lockwood, a self-described skeptic...
The concept of intuitionistic fuzzy set (IFS) was originally introduced by Atanassov (1983) to extend the concept of the traditional fuzzy set. Each element in an IFS is expressed by an ordered pair which is called an intuitionistic fuzzy value (IFV) (or intuitionistic fuzzy number (IFN)), and each IFV is characterized by a membership degree,...
Any attempt to list the 50 most important battles in all history is necessarily
subjective. To list them in order of importance is an even greater exercise
of chutzpah. Nevertheless, people have been listing decisive battles since
Sir Edward Creasy, a lawyer who taught history, a century-and-a-half ago.
Other compilers include...
This timely book examines how the South African National Defence Force has adapted to the country’s new security, political and social environment since 1994. In South Africa’s changed political state, how has civilian control of the military been implemented and what does this mean for ‘defence in a democracy’? This...
Documents research on the impact of computer games on the learning of adults. Computer games and learning are characterized from a series of different theoretical and empirical viewpoints. Both civilian sector and military applications are presented. While effectiveness of game environments to support learning can be documented in terms of...
Synthetic Aperture Radar (SAR) is critical for remote sensing. It works day and night, in good weather or bad. Bistatic SAR is a new kind of SAR system, where the transmitter and receiver are placed on two separate platforms. Bistatic SAR is one of the most important trends in SAR development, as the technology renders SAR more flexible and...
During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...
Resource provides a comprehensive picture of the Internet protocol stack and the role of TCP/IP in data communications. Offers a thorough understanding of advanced LAN and WAN technologies, an integrated view of bridging operations, and how to ensure privacy with virtual LAN. DLC: TCP/IP...