 |
|
|
|
 Warfare and Weaponry in Dynastic Egypt
Defence. Attack. Symbolism. The development of warfare in any society provides an evocative glance into the lives (and deaths) of our predecessors. This is never more the case than with that most enticing of ancient civilizations, Ancient Egypt. Follow Rebecca Dean through the fascinating world of mysterious figures such as... |  |  A History of Modern Urban Operations
This book investigates the complexities of modern urban operations?a particularly difficult and costly method of fighting, and one that is on the rise. Contributors examine the lessons that emerge from a range of historical case studies, from nineteenth-century precedents to the Battle of Shanghai; Stalingrad, German town clearance, Mandalay,... |  |  Information Operations PlanningInformation operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with... |
|
|
 Conquest in Cyberspace: National Security and Information WarfareWith billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies... |  |  Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane... |  |  Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer DebatesPEERS, PIRATES, AND PERSUASION: RHETORIC IN THE PEER-TO-PEER DEBATES investigates the role of rhetoric in shaping public perceptions about a novel technology: peer-to-peer file-sharing networks. While broadband Internet services now allow speedy transfers of complex media files, Americans face real uncertainty about whether peer-to-peer file... |
|
 |  |  The Slayer's Guide To DerroThe derro have long been a mysterious race, hiding in darkness, their presence frequently but a whisper. Brought to the fore in this supplement, their culture, habitats, methods of warfare, and more are detailed in full so as to be usable by game masters and players alike.
The dwarven racesarequitediverse,but perhapsthe most deviant,... |  |  Hack Proofing Your Web ApplicationsAs a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |