|
|
| | Submarine Warfare An Illustrated HistoryThe lure of underwater travel seems to have obsessed inventors almost as much as the wish to fly, but the first attempt to address practical problems did not come until the sixteenth century. In 1578 an Englishman called William Bourne wrote of a submersible boat in his book Inventions and Devices.
Although there is no evidence that... | | |
|
High-Level Data FusionMaster cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and... | | Cyberdeterrence and Cyberwar
This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus... | | Dirty Little Secrets of World War II: Military Information No One Told You...
Dirty Little Secrets of World War II exposes the dark, irreverent, misunderstood, and often tragicomic aspects of military operations during World War II, many of them virtually unknown even to military buffs. Like its successful predecessor, Dirty Little Secrets, Dunnigan and Nofi's new book vividly brings to life all... |
|
Eberron Player's Guide: A 4th Edition D&D Supplement
The complete guide to building Eberron(R) characters.
The Eberron Player's Guide presents the film noir world of Eberron from the point of view of the adventurer exploring it. This product includes everything a player needs to create their character for a D&D(R) campaign in... | | The Cambridge Handbook of Information and Computer Ethics
Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary... | | Corporate Computer Security (3rd Edition)
The IT security industry has seen dramatic changes in the past decades. Security
breaches, data theft, cyber attacks, and information warfare are now common news
stories in the mainstream media. IT security expertise that was traditionally the
domain of a few experts in large organizations has now become a concern for almost... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 |