Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
The Guru Guide to Marketing: A Concise Guide to the Best Ideas from Today's Top Marketers
The Guru Guide to Marketing: A Concise Guide to the Best Ideas from Today's Top Marketers
How can I differentiate my products from the competition?
Do customer retention and loyalty programs really work?
How do I increase a customer’s lifetime value to my company?
How can I build a strong brand and manage it wisely?

To find the answers to these and scores of other questions, turn to the experts at...

Submarine Warfare An Illustrated History
Submarine Warfare An Illustrated History
The lure of underwater travel seems to have obsessed inventors almost as much as the wish to fly, but the first attempt to address practical problems did not come until the sixteenth century. In 1578 an Englishman called William Bourne wrote of a submersible boat in his book Inventions and Devices.

Although there is no evidence that
...
Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Organic Pollutants: An Ecotoxicological Perspective, Second Edition
Organic Pollutants: An Ecotoxicological Perspective, Second Edition
A companion to he much praised Principles of Ecotoxicology the book covers organic pollutants in greater depth and detail than has been covered in a textbook before. The first part of the book covers issues such as chemical warfare; metabolism of pollutants in animals and plants; environmental fate; and effects within ecosystems. This is followed...
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters is a game of tactical combat, or what some like to refer as a thinking shooter. Unlike most shooter games, which send a player through an essentially linear course, killing everything in sight, or others that require the player to find special keys or cards to get through a locked door, Freedom Fighters lets the player concentrate...
Radio Engineering for Wireless Communication and Sensor Applications (Artech House Mobile Communications Series)
Radio Engineering for Wireless Communication and Sensor Applications (Artech House Mobile Communications Series)
The word radio means techniques that are used in transmitting and receiving information or power in the atmosphere or free space, or in transmission lines utilizing electromagnetic waves—so-called radio waves—but also the equipment needed therein.

This book provides the reader with the basics in radio engineering, the
...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Acres of Skin: Human Experiments at Holmesburg Prison
Acres of Skin: Human Experiments at Holmesburg Prison
In the first expose of unjust medical experimentation since David Rothman's Willowbrook's Wars, Allen M. Hornblum releases devastating stories from within the walls of Philadelphia's Holmesburg Prison. For more than two decades, from the mid-1950s through the mid-1970s, inmates were used, in exchange for a few dollars, as guinea pigs...
e-Business Strategies for Virtual Organizations (Computer Weekly Professional)
e-Business Strategies for Virtual Organizations (Computer Weekly Professional)
'e-Business Strategies for Virtual Organizations' enables IT managers and directors to develop and implement IT strategies and infrastructures for new models of doing business based on the Internet.

The authors provide a brief introduction to the concepts and strategic issues surrounding information warfare, managing organizational
...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy