Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Gender in International Relations
Gender in International Relations
As a scholar and teacher of international relations, I have frequently asked myself the following questions: Why are there so few women in my discipline? If I teach the field as it is conventionally defined, why are there so few readings by women to assign to my students? Why is the subject matter of my discipline so distant from women's lived...
Manufacturing Advantage: War, the State, and the Origins of American Industry, 1776–1848 (Studies in Early American Economy and Society from the Library Company of Philadelphia)
Manufacturing Advantage: War, the State, and the Origins of American Industry, 1776–1848 (Studies in Early American Economy and Society from the Library Company of Philadelphia)

How manufacturing textiles and guns transformed the United States from colonial dependent to military power.

In 1783, the Revolutionary War drew to a close, but America was still threatened by enemies at home and abroad. The emerging nation faced tax rebellions, Indian warfare, and hostilities with France and...

Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Studies in Intelligence)
Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Studies in Intelligence)

This book provides an in-depth analysis of UK-US intelligence cooperation in the post-9/11 world.

Seeking to connect an analysis of intelligence liaison with the wider realm of Anglo-American Relations, the book draws on a wide range of interviews and consultations with key actors in both countries. The book is centred around two...

Historical Dictionary of Terrorism (Historical Dictionaries of Religions, Philosophies and Movements)
Historical Dictionary of Terrorism (Historical Dictionaries of Religions, Philosophies and Movements)
Terrorism has consistently dogged this supposedly modern and enlightened age. It has merely adopted new shapes and forms in keeping with the times. The causes have also evolved over the years, as old problems are solved and new ones created. Moreover, it has gone high-tech, like everything else. Thus, as this book convincingly shows, terrorism will...
Creating Game Art for 3D Engines (Game Development)
Creating Game Art for 3D Engines (Game Development)
Learn how to create commercial-quality game art and make it come alive in a 3D engine! "Creating Game Art for 3D Engines" is the ideal guide for the serious student or aspiring animator who wants to learn how to create and successfully export game art, from simple shapes to full-blown characters. Using Autodesk® 3ds Max® to...
Nuclear Energy: Principles, Practices, and Prospects
Nuclear Energy: Principles, Practices, and Prospects
"The material presented here is largely accessible to anyone interested in nuclear energy. This book is the best of its kind in providing a well-written survey of the science, technology, safety, and economics of the full range of nuclear issues, including power, waste, weapons, terrorism, biological effects, and the future of the nuclear...
Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling
Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling

"You have a lot of enemies, Hipolito. I heard rumors in jail that some of the people you busted are going to try to kill you, so you better watch yourself." U.S. Special Agent Hipolito Acosta had put lots of thugs in jail, but the death threat from an imprisoned convict was still a shock.


Acosta recounts
...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Building an RPG with Unity 2018: Leverage the power of Unity 2018 to build elements of an RPG., 2nd Edition
Building an RPG with Unity 2018: Leverage the power of Unity 2018 to build elements of an RPG., 2nd Edition

Build a high-end, multiplayer role-playing game (RPG) from scratch with C# and Unity 2018

Key Features

  • Get insights into Unity's user interface (UI) system and and build UIs for your RPG
  • Implement artificial intelligence (AI) to build intelligent entities that take...
Fuzzy Logic with Engineering Applications
Fuzzy Logic with Engineering Applications

Fuzzy logic is a simple phrase that actually refers to a large subject dealing with a set of methods to characterize and quantify uncertainty in engineering systems that arise from ambiguity, imprecision, fuzziness, and lack of knowledge.

This 15-chapter textbook remains the only major text that can be used for both undergraduate...

Radar Cross Section, 2nd Edition (Scitech Radar and Defense)
Radar Cross Section, 2nd Edition (Scitech Radar and Defense)
This is the second edition of the first and foremost book on this subject for self-study, training, and course work. Radar cross section (RCS) is a comparison of two radar signal strengths. One is the strength of the radar beam sweeping over a target, the other is the strength of the reflected echo sensed by the receiver. This book shows how the...
RPG Maker for Teens
RPG Maker for Teens

Welcome to RPG Maker for Teens! This book will help you learn a complete computer game software application engineered toward creating one particular game genre: role-playing games!

Role-playing games, also known as RPGs, are those sword-and-sorcery quest games that feature turn-based combat, inventories full of unique...

Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy