|
|
|
|
|
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full ... | | Freedom Fighters (Prima's Official Strategy Guide)Freedom Fighters is a game of tactical combat, or what some like to refer as a thinking shooter. Unlike most shooter games, which send a player through an essentially linear course, killing everything in sight, or others that require the player to find special keys or cards to get through a locked door, Freedom Fighters lets the player concentrate... | | Cyber Security and IT Infrastructure Protection
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and... |
|
Cyber Warfare and Cyber Terrorism (Premier Reference)The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic... | | Credibility: How Leaders Gain and Lose It, Why People Demand It
The first true revision of the classic book from the bestselling author of The Leadership Challenge
As the world falls deeper into economic downturns and warfare, the question of credibility (how leaders gain and lose it) is more important than ever. Building on their research from The Leadership Challenge, James... | | Data and Applications Security XVII: Status and ProspectsSecurity and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new... |
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |