Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Submarine Warfare An Illustrated History
Submarine Warfare An Illustrated History
The lure of underwater travel seems to have obsessed inventors almost as much as the wish to fly, but the first attempt to address practical problems did not come until the sixteenth century. In 1578 an Englishman called William Bourne wrote of a submersible boat in his book Inventions and Devices.

Although there is no evidence that
...
The Guru Guide to Marketing: A Concise Guide to the Best Ideas from Today's Top Marketers
The Guru Guide to Marketing: A Concise Guide to the Best Ideas from Today's Top Marketers
How can I differentiate my products from the competition?
Do customer retention and loyalty programs really work?
How do I increase a customer’s lifetime value to my company?
How can I build a strong brand and manage it wisely?

To find the answers to these and scores of other questions, turn to the experts at...

High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

Dirty Little Secrets of World War II: Military Information No One Told You...
Dirty Little Secrets of World War II: Military Information No One Told You...

Dirty Little Secrets of World War II exposes the dark, irreverent, misunderstood, and often tragicomic aspects of military operations during World War II, many of them virtually unknown even to military buffs. Like its successful predecessor, Dirty Little Secrets, Dunnigan and Nofi's new book vividly brings to life all...

Eberron Player's Guide: A 4th Edition D&D Supplement
Eberron Player's Guide: A 4th Edition D&D Supplement

The complete guide to building Eberron(R) characters.

The Eberron Player's Guide presents the film noir world of Eberron from the point of view of the adventurer exploring it. This product includes everything a player needs to create their character for a D&D(R) campaign in
...

The Cambridge Handbook of Information and Computer Ethics
The Cambridge Handbook of Information and Computer Ethics

Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...

Corporate Computer Security (3rd Edition)
Corporate Computer Security (3rd Edition)
The IT security industry has seen dramatic changes in the past decades. Security breaches, data theft, cyber attacks, and information warfare are now common news stories in the mainstream media. IT security expertise that was traditionally the domain of a few experts in large organizations has now become a concern for almost...
50 Battles That Changed the World
50 Battles That Changed the World
Any attempt to list the 50 most important battles in all history is necessarily subjective. To list them in order of importance is an even greater exercise of chutzpah. Nevertheless, people have been listing decisive battles since Sir Edward Creasy, a lawyer who taught history, a century-and-a-half ago. Other compilers include...
Wiki at War: Conflict in a Socially Networked World
Wiki at War: Conflict in a Socially Networked World
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide
...
Panther vs T-34: Ukraine 1943 (Duel)
Panther vs T-34: Ukraine 1943 (Duel)

Robert A. Forczyk provides a riveting and intense description of the design and development of these two deadly opponents, the Panther and the T-34, analyzing their strengths and weaknesses and describing their tactics, weaponry and training. Moreover he gives an insight into the lives of the tank crews themselves, who were caught up in the...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy