A comprehensive guide to computer assisted exercises
Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large...
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...
The first true revision of the classic book from the bestselling author of The Leadership Challenge
As the world falls deeper into economic downturns and warfare, the question of credibility (how leaders gain and lose it) is more important than ever. Building on their research from The Leadership Challenge, James...
Although overshadowed by his contemporaries Adam Smith and David Hume, the Scottish philosopher Adam Ferguson strongly influenced eighteenth-century currents of political thought. A major reassessment of this neglected figure, Adam Ferguson in the Scottish Enlightenment: The Roman Past and Europe’s Future sheds new light on...
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. ...
A comprehensive examination of the effects of the shifting seasons on maritime trade, warfare and piracy durig antiquity, this book overturns many long-held assumptions concerning the capabilities of Graeco-Roman ships and sailors.
It is the long-standing belief among classical scholars that seafaring on
the ancient Mediterranean...
This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference...
Biotechnological advancements during the last half-century have forced humanity to come to grips with the possibility of a post-human future. The ever-evolving opinions about how society should anticipate this biotechnological frontier demand a language that will describe our new future and discuss its ethics. After the Genome brings...
The 1999 conflict between India and Pakistan near the town of Kargil in contested Kashmir was the first military clash between two nuclear-armed powers since the 1969 Sino-Soviet war. Kargil was a landmark event not because of its duration or casualties, but because it contained a very real risk of nuclear escalation. Until the Kargil...
Provides clear, concise, and basic descriptions and definitions to over 260 key people, events, and terms relating to the series of conflicts between France and England in the 14th and 15th centuries that later came to be known as the Hundred Years War.
The Encyclopedia of the Hundred Years War provides its users with clear,...
Society for First World War Studies. It is a selection of papers from a conference held in Innsbruck in late September 2011.
The society began as a small-scale attempt to bring together an international group of postgraduate and postdoctoral students who work on the First World War in 2001. Over the years, the habit developed...