Home | Amazing | Today | Tags | Publishers | Years | Search 
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)

Allied Fighting Effectiveness is a collection of scholarly papers focusing on a variety of different aspects of the major campaigns of North Africa, Sicily and Italy, ranging from operation TORCH to the end of the war in Europe.

...
Cyber Security and IT Infrastructure Protection
Cyber Security and IT Infrastructure Protection

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...

Game Theory: An Introduction
Game Theory: An Introduction

An exciting new edition of the popular introduction to game theory and its applications

The thoroughly expanded Second Edition presents a unique, hands-on approach to game theory. While most books on the subject are too abstract or too basic for mathematicians, Game Theory: An Introduction, Second...

Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

Blitzkrieg: From the Ground Up
Blitzkrieg: From the Ground Up

An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.

The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied
...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

A History of Modern Urban Operations
A History of Modern Urban Operations
This book investigates the complexities of modern urban operations?a particularly difficult and costly method of fighting, and one that is on the rise. Contributors examine the lessons that emerge from a range of historical case studies, from nineteenth-century precedents to the Battle of Shanghai; Stalingrad, German town clearance, Mandalay,...
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
War and Childhood in the Era of the Two World Wars (Publications of the German Historical Institute)
The histories of modern war and childhood were the result of competing urgencies. According to ideals of childhood widely accepted throughout the world by 1900, children should have been protected, even hidden, from conflict and danger. Yet at a time when modern ways of childhood became increasingly possible for economic, social, and political...
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
From Pulitzer Prize finalist Annie Jacobsen, the untold USA Today bestselling story of the CIA's secret paramilitary units.


Surprise . . . your target. Kill . . . your enemy. Vanish . . . without a trace.


When
...
Digital Civil War: Confronting the Far-Right Menace
Digital Civil War: Confronting the Far-Right Menace
A frontline account of the social media battles raging between red and blue Americans – and how to find moral clarity in the chaos of digital civil war. 

Are rural white Christians the real Americans? Should teachers be armed or should the Second Amendment be repealed? Is abortion murder or
...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy