Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Six-Legged Soldiers: Using Insects as Weapons of War
Six-Legged Soldiers: Using Insects as Weapons of War
"Six-Legged Soldiers is an excellent account of the affect arthropod-borne diseases have had on warfare...This book will inspire readers to understand...threats and prepare new methods to combat them."--Nature, November 2008

"Both science and military history buffs will learn much from Lockwood, a self-described skeptic
...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld

During his campaign for reelection in 1996, the Internet-savvy President Bill Clinton used the slogan “Building a Bridge to the 21st Century.” It turns out that the bridge is operated and maintained in cyber form, and that malevolent actors can practice their black arts to disrupt or destroy the bridge, its cyber traffic, and all...

50 Battles That Changed the World
50 Battles That Changed the World
Any attempt to list the 50 most important battles in all history is necessarily subjective. To list them in order of importance is an even greater exercise of chutzpah. Nevertheless, people have been listing decisive battles since Sir Edward Creasy, a lawyer who taught history, a century-and-a-half ago. Other compilers include...
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...

Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

Souls under Siege: Stories of War, Plague, and Confession in Fourteenth-Century Provence
Souls under Siege: Stories of War, Plague, and Confession in Fourteenth-Century Provence

In Souls under Siege, Nicole Archambeau explores how the inhabitants of southern France made sense of the ravages of successive waves of plague, the depredations of mercenary warfare, and the violence of royal succession during the fourteenth century. Many people, she finds, understood both plague and war...

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

“Part John le Carré and more parts Michael Crichton . . . spellbinding.” –The New Yorker

From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a
...

The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization
The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization

Perhaps the preeminent conventional fighting force in the world, the United States Marine Corps owes much of its modern-day success to the adoption of a combat philosophy known as maneuver warfare. Maneuver warfare uses speed, surprise, and concentrated force to exploit an opponent’s weakness and enables the Marines to achieve maximum...

A Social History of Byzantium
A Social History of Byzantium
Western civilization owes an incalculable cultural and historical debt to the Byzantine Empire. Before falling to the Ottoman Turks in the mid-fifteenth century, the empire flourished for more than a thousand years, bridging the ancient and modern worlds. Byzantium profoundly influenced the pattern of cultural and political development in the lands...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy