This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference...
A comprehensive guide to computer assisted exercises
Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large...
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...
The first true revision of the classic book from the bestselling author of The Leadership Challenge
As the world falls deeper into economic downturns and warfare, the question of credibility (how leaders gain and lose it) is more important than ever. Building on their research from The Leadership Challenge, James...
Although overshadowed by his contemporaries Adam Smith and David Hume, the Scottish philosopher Adam Ferguson strongly influenced eighteenth-century currents of political thought. A major reassessment of this neglected figure, Adam Ferguson in the Scottish Enlightenment: The Roman Past and Europe’s Future sheds new light on...
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. ...
A comprehensive examination of the effects of the shifting seasons on maritime trade, warfare and piracy durig antiquity, this book overturns many long-held assumptions concerning the capabilities of Graeco-Roman ships and sailors.
It is the long-standing belief among classical scholars that seafaring on
the ancient Mediterranean...
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...
Allied Fighting Effectiveness is a collection of scholarly papers focusing on a variety of different aspects of the major campaigns of North Africa, Sicily and Italy, ranging from operation TORCH to the end of the war in Europe.
Society for First World War Studies. It is a selection of papers from a conference held in Innsbruck in late September 2011.
The society began as a small-scale attempt to bring together an international group of postgraduate and postdoctoral students who work on the First World War in 2001. Over the years, the habit developed...
An exciting new edition of the popular introduction togame theory and its applications
The thoroughly expanded Second Edition presents a unique, hands-on approach to game theory. While most books on the subject are too abstract or too basic for mathematicians, Game Theory: An Introduction, Second...