Home | Amazing | Today | Tags | Publishers | Years | Search 
Dirty Little Secrets of World War II: Military Information No One Told You...
Dirty Little Secrets of World War II: Military Information No One Told You...

Dirty Little Secrets of World War II exposes the dark, irreverent, misunderstood, and often tragicomic aspects of military operations during World War II, many of them virtually unknown even to military buffs. Like its successful predecessor, Dirty Little Secrets, Dunnigan and Nofi's new book vividly brings to life all...

Eberron Player's Guide: A 4th Edition D&D Supplement
Eberron Player's Guide: A 4th Edition D&D Supplement

The complete guide to building Eberron(R) characters.

The Eberron Player's Guide presents the film noir world of Eberron from the point of view of the adventurer exploring it. This product includes everything a player needs to create their character for a D&D(R) campaign in
...

The Cambridge Handbook of Information and Computer Ethics
The Cambridge Handbook of Information and Computer Ethics

Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Artillery: An Illustrated History of Its Impact (Weapons and Warfare)
Artillery: An Illustrated History of Its Impact (Weapons and Warfare)
This volume traces the history of artillery and its place in society from the ancient world to the present. The term “artillery” is derived from the Latin ars, or artis, terms for “craft” that later evolved through the Old French atillier, meaning “to deck, adorn with care or arrange”; atil,...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Wiki at War: Conflict in a Socially Networked World
Wiki at War: Conflict in a Socially Networked World
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide
...
50 Battles That Changed the World
50 Battles That Changed the World
Any attempt to list the 50 most important battles in all history is necessarily subjective. To list them in order of importance is an even greater exercise of chutzpah. Nevertheless, people have been listing decisive battles since Sir Edward Creasy, a lawyer who taught history, a century-and-a-half ago. Other compilers include...
Corporate Computer Security (3rd Edition)
Corporate Computer Security (3rd Edition)
The IT security industry has seen dramatic changes in the past decades. Security breaches, data theft, cyber attacks, and information warfare are now common news stories in the mainstream media. IT security expertise that was traditionally the domain of a few experts in large organizations has now become a concern for almost...
Panther vs T-34: Ukraine 1943 (Duel)
Panther vs T-34: Ukraine 1943 (Duel)

Robert A. Forczyk provides a riveting and intense description of the design and development of these two deadly opponents, the Panther and the T-34, analyzing their strengths and weaknesses and describing their tactics, weaponry and training. Moreover he gives an insight into the lives of the tank crews themselves, who were caught up in the...

Australia (Modern World Nations)
Australia (Modern World Nations)

Americans find Australia both exotic and familiar. If you travel in Australia, many things will make you think you are still at home. At other times you will feel as if you are in some sort of a fantasy land.

Americans can at once identify with a wealthy, English-speaking country with high living standards. Both Australia and the...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy