|
|
|
|
| | | | Violence at Sea: Piracy in the Age of Global TerrorismViolence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China... |
|
| | Carry On: Sound Advice from Schneier on Security
Up-to-the-minute observations from a world-famous security expert
Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon... | | Prehospital Trauma Care
Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,... |
|
Nuclear Energy: Principles, Practices, and Prospects"The material presented here is largely accessible to anyone interested in nuclear energy. This book is the best of its kind in providing a well-written survey of the science, technology, safety, and economics of the full range of nuclear issues, including power, waste, weapons, terrorism, biological effects, and the future of the nuclear... | | | | |
|
Computer Security in the 21st CenturyComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include... | | Advances in Artificial Intelligence for Privacy Protection and Security
In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,... | | My War Criminal: Personal Encounters with an Architect of Genocide
An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.
Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |