Darling of high society, creator of the "New Look", Dior shot to international fame almost overnight at the age of 47. At first his creations provoked angry accusations of unpatriotic extravagance, but women everywhere soon warmed to his hour-glass lines and long, rustling skirts. In this work, Dior's most characteristic designs...
The Reformation was a seismic event in European history, one which left an indelible mark on the modern world. In this Very Short Introduction, Peter Marshall illuminates the causes and consequences of this pivotal movement in western Christianity. The Reformation began as an argument about what Christians needed to do to be saved, but...
In the 21st century myriad earth systems – atmospheric systems, ocean systems, land systems, neo-Liberal capitalism – are in crisis. These crises are deeply related. Taking diverse and multiple forms, they have diverse and multiple consequences and are evidenced in such things as war, everyday violence, hate and...
“Masterly. An epic story of four Japanese-American families and their sons who volunteered for military service and displayed uncommon heroism… Propulsive and gripping, in part because of Mr. Brown’s ability to make us care deeply...
Die heutige Bildpraxis – wie sie sich beispielsweise in der Cyborg Art, Virtual Architecture oder Bio Art zeigt – befreit die Aktivität des Bildes, die bisher in der ästhetischen virtuellen Dimension eingesperrt war. Das Bild selbst kann sich nun als Lebewesen behaupten, indem es sich in einem Körper oder Material...
Mathematical disputes offer indisputable proof that great mathematical minds are calculating in more ways than one. Fueled by greed, jealousy, ambition, and ego, they have plots worthy of a soap opera, pitting brother against brother, father against son, and student against mentor.
In the sixteenth century, Cardano and Tartaglia battled...
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
When Garland Publishing invited me several years ago to edit an encyclopedia of the Scientific Revolution, I welcomed the opportunity. Here was a means of providing a wider audience with the fruits of the most recent scholarly research on a fascinating complex of events that helped shape the modern world. The study of the origins of modern science...
For all the buzz about trendy IT techniques, data processing is still at the core of our systems, especially now that enterprises all over the world are confronted with exploding volumes of data. Database performance has become a major headache, and most IT departments believe that developers should provide simple SQL code to...
An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.
Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a...
In The Sexual Economy of War, Andrew Byers argues that in the early twentieth century, concerns about unregulated sexuality affected every aspect of how the US Army conducted military operations. Far from being an exercise marginal to the institution and its scope of operations, governing sexuality was, in fact, integral to...