You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book ...
To defeat your enemies you must know them well. In wartime, however, enemy codemakers make that task much more difficult. If you cannot break their codes and read their messages, you may discover too late the enemy's intentions. That's why codebreakers were considered such a crucial weapon during World War II. In Secret Messages, David Alvarez provides the first comprehensive analysis of the impact of decoded radio messages (signals intelligence) upon American foreign policy and strategy from 1930 to 1945. He presents the most complete account to date of the U.S. Army's top-secret Signal Intelligence Service (SIS): its creation, its struggles, its rapid wartime growth, and its contributions ...
The fourth edition of the Handbook of Human Factors and Ergonomics has been completely revised and updated. This includes all existing third edition chapters plus new chapters written to cover new areas. These include the following subjects: Managing low-back disorder risk in the workplace Online interactivity Neuroergonomics Office ergonomics Social networking HF&E in motor vehicle transportation User requirements Human factors and ergonomics in aviation Human factors in ambient intelligent environments As with the earlier editions, the main purpose of this handbook is to serve the needs of the human factors and ergonomics researchers, practitioners, and graduate students. Each chapter has a strong theory and scientific base, but is heavily focused on real world applications. As such, a significant number of case studies, examples, figures, and tables are included to aid in the understanding and application of the material covered.
The incredible story of how Chiang Kai-shek's defeated army came to dominate the Asian drug trade After their defeat in China's civil war, remnants of Chiang Kai-shek's armies took refuge in Burma before being driven into Thailand and Laos. Based on recently declassified government documents, The Secret Army: Chiang Kai-shek and the Drug Warlords of the Golden Triangle reveals the shocking true story of what happened after the Chinese Nationalists lost the revolution. Supported by Taiwan, the CIA, and the Thai government, this former army reinvented itself as an anti-communist mercenary force, fighting into the 1980s, before eventually becoming the drug lords who made the Golden Triangle a h...
"This is the story of the Allied codebreakers puzzling through the most difficult codebreaking problems that ever existed.
George W. Bush's "Mission Accomplished" banner in 2003 and the misleading linkages of Saddam Hussein to the 9/11 terrorist attacks awoke many Americans to the techniques used by the White House to put the country on a war footing. Yet Bush was simply following in the footsteps of his predecessors, as the essays in this standout volume reveal in illuminating detail. Written in a lively and accessible style, Selling War in a Media Age is a fascinating, thought-provoking, must-read volume that reveals the often-brutal ways that the goal of influencing public opinion has shaped how American presidents have approached the most momentous duty of their office: waging war.
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.
Calendars of Mesoamerican civilisations are subjected to what is categorised as “ritual practices of time”. This book is a comparative explication of rituals of time of four calendars: the Long Count calendar, the 260-day calendar, the 365-day calendar and the 52-years calendar. Building upon a comparative analytical model, the book contributes new theoretical insights about ritual practices and temporal philosophies. This comprehensive investigation analyses how ritual practices are represented and conceptualised in intellectual systems and societies. The temporal ritual practices are systematically analysed in relation to calendar organisation and structure, arithmetic, cosmogony and chronometry, spatial-temporality (cosmology), natural world, eschatology, sociology, politics, and ontology. It is argued that the 260-day calendar has a particular symbolic importance in Mesoamerican temporal philosophies and practices.