Up until the mid-1950s President Dwight D. Eisenhower believed that waging all-out war against an enemy
threatening to end your national existence was right, natural, and necessary. In the wake of World War Two
this was hardly a controversial position, as memories of Munich, Pearl Harbor, and Adolf Hitler had made the
notion of just...
Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...
The video game industry has grown explosively over the past decade
and is now a major provider of home entertainment. Since the North
American release of the Nintendo Entertainment System (NES) in
1985, game industry revenues have also grown substantially and, according
to the marketing research company NDP Group, grossed...
CryENGINE is a complete 3D game development solution that can run on multiple platforms. It is orientated around giving intuitive tools to the developer. A variety of interactive video games can be created using CryENGINE. CryENGINE is one of the most beginner-friendly engines out there to learn. If you are interested in diving into the...
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.
The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied...
"You have a lot of enemies, Hipolito. I heard rumors in jail that some of the people you busted are going to try to kill you, so you better watch yourself." U.S. Special Agent Hipolito Acosta had put lots of thugs in jail, but the death threat from an imprisoned convict was still a shock.
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...
Created in association with the Smithsonian Institution, this authoritative guide chronicles America's fight against Communism in southeast Asia during the 1960s and 1970s, and comprehensively explores the people, politics, events, and lasting effects of the Vietnam War.
Honoring those who served in the war at home or abroad,...
During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...
In this thoughtful social history of New Mexico's nuclear industry, Lucie Genay traces the scientific colonization of the state in the twentieth century from the points of view of the local people. Genay focuses on personal experiences in order to give a sense of the upheaval that accompanied the rise of the nuclear era. She...