Of all the fronts fought on by the Jagdflieger during World War 2, the Russian, or Eastern, was easily the most lucrative in terms of targets for the experten. Marry an abundance of targets with the Luftwaffe’s best piston-engined fighter of the war – Focke-Wulf’s Fw 190 ‘Butcher Bird’ – and it quickly...
Western civilization owes an incalculable cultural and historical debt to the Byzantine Empire. Before falling to the Ottoman Turks in the mid-fifteenth century, the empire flourished for more than a thousand years, bridging the ancient and modern worlds. Byzantium profoundly influenced the pattern of cultural and political development in the lands...
Up until the mid-1950s President Dwight D. Eisenhower believed that waging all-out war against an enemy
threatening to end your national existence was right, natural, and necessary. In the wake of World War Two
this was hardly a controversial position, as memories of Munich, Pearl Harbor, and Adolf Hitler had made the
notion of just...
It has often been said that generals prepare for the next war by re-fighting the last. The Deepwater Horizon (DWH) oil spill was unlike any previous – an underwater well blowout 1,500 meters deep. Much has been learned in the wake of DWH and these lessons should in turn be applied to both similar oil spill scenarios...
David Kilcullen is one of the world's most influential experts on counterinsurgency and modern warfare. A Senior Counterinsurgency Advisor to General David Petraeus in Iraq, his vision of war dramatically influenced America's decision to rethink its military strategy in Iraq and implement "the surge."
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help...
Your insider's preview of the next release of Microsoft Windows.
What's new and improved in the newest release of the Microsoft Windows family of client operating systems? Which versions of Windows Vista are right for you and your organization? How will the new features and capabilities in Windows Vista improve security, make users more...
Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...
Since 2011 over 5.6 million Syrians have fled to Turkey, Lebanon, Jordan, and beyond, and another 6.6 million are internally displaced. The contemporary flight of Syrian refugees comes one century after the region's formative experience with massive upheaval, displacement, and geopolitical intervention: the First World War.
Despite the wealth of development knowledge, experience, and tools available today, a substantial percentage of software projects fail, often because requirements are not correctly determined and defined at the outset, or are not managed correctly as the project unfolds. This second edition of the popular text ...
Doody Enterprises : "Primary sources in this volume include reminiscences of John Brown Gordon, an ex-Confederate general; Louis Hughes, a former slave; Freedman's Burea Act; Frederick Douglass; Frances Butler Leigh, a plantation owner; Alexander Stephens, former Confederate vice president; Andrew Johnson; Charles Sumner; Hiram...