Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 17 of 17 matches in All Departments
Besieged examines the most important sieges in history-the actions and motivations of attackers and defenders along with conditions inside and outside the city walls. From Joshua's assault on Jericho in the 15th century B.C. to the Russian attack on the Chechen capital of Grozny at the end of the 20th century, siege warfare has been a recurring theme in the human story. Again and again, engineers have built supposedly impregnable fortifications, only to see them overrun by an ingenious enemy. In Besieged, military historian Paul F. Davis analyzes the most crucial sieges in world history, such as the siege of Leningrad, which weakened the Nazi forces in World War II, and that of the Alamo, which culminated in independence for Texas. He also describes important sieges unfamiliar to most readers, such as that of Arcot, where a British victory halted the French takeover of southern India. In engaging, accessible language, Davis tracks the invention of new technologies, analyzes innovative tactics, and tells the human story of conditions both inside and outside the city walls. Examines 100 great sieges, from Jericho in 1405 B.C. to Grozny in 1997 Establishes the historical background of each siege, describes the siege itself in both military and human terms, and analyzes the results Provides more than 75 maps as well as tactical diagrams, archival photographs, and artworks Includes a glossary explaining unfamiliar military terms, from abatis to zig-zags
Surveys the one hundred most decisive battles in world history from the Battle of Megiddo in 1469 B.C. to Desert Storm, 1991.
This is a paperback buy-in of a cloth edition originally published in 2001 by ABC-CLIO at $85.00. From Joshua's attack on Jericho in the fifteenth century B.C. to the Russian attack on the Chechan capital of Grozny at the end of the twentieth century, Besieged covers the most important sieges around the world and throughout history. This fascinating volume examines the actions of both attackers and defenders, exploring the motivations of both, as well as surveying technical and tactical innovations and the condition both inside besieged positions and in the besiegers' ranks.
The United States Air Force's Center for Strategy and Technology was established at the Air War College in 1996. Its purpose is to engage in long-term strategic thinking about technology and its implications for United States national security. The Center (CSAT) focuses on education, research, and publications that support the integration of technology into national strategy and policy. This document is one of these publications.
This is a pre-1923 historical reproduction that was curated for quality. Quality assurance was conducted on each of these books in an attempt to remove books with imperfections introduced by the digitization process. Though we have made best efforts - the books may have occasional errors that do not impede the reading experience. We believe this work is culturally important and have elected to bring the book back into print as part of our continuing commitment to the preservation of printed works worldwide.
Title: Pyrna: a Commune; or, Under the Ice. By E. J. Davis.]Publisher: British Library, Historical Print EditionsThe British Library is the national library of the United Kingdom. It is one of the world's largest research libraries holding over 150 million items in all known languages and formats: books, journals, newspapers, sound recordings, patents, maps, stamps, prints and much more. Its collections include around 14 million books, along with substantial additional collections of manuscripts and historical items dating back as far as 300 BC.The NOVELS OF THE 18th & 19th CENTURIES collection includes books from the British Library digitised by Microsoft. The collection includes major and minor works from a period which saw the development and triumph of the English novel. These classics were written for a range of audiences and will engage any reading enthusiast. ++++The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to insure edition identification: ++++ British Library Davis; 1875. 8 . 12638.c.6.
Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might, along with other information, help detect potential violent attacks.
This book offers a description of a methodology and a prototype tool, Building Blocks To Composite Options Tool (BCOT), for identifying investment options for defense capability areas. It ensures that a broad range of options is considered initially, then uses a screening technique to narrow the range to those meriting more-extensive assessment in a fuller portfolio-analysis framework. BCOT extends classic economics and operations-research techniques and suggests pragmatic approximations, particularly in capabilities-based planning.
An overview of higher-level decision making and modern methods to improve decision support. A selective review of modern decision science and implications for decision-support systems. The study suggests ways to synthesize lessons from research on heuristics and biases with those from "naturalistic research." It also discusses modern tools, such as increasingly realistic simulations, multiresolution modeling, and exploratory analysis, which can assist decisionmakers in choosing strategies that are flexible, adaptive, and robust.
Making future DoD models and simulations more composable; A discussion of actions the Department of Defense could take to improve the composability of its future models and simulations, i.e., the ability to select and assemble components in various combinations to satisfy specific user requirements. Factors that determine what can be composed and the expense and risk of composing various components are examined, and suggestions are presented on both policies and investments that would enhance prospects for composability.
A metamodel approximates the behavior of a more complex model. A common and superficially attractive way to develop a metamodel is to generate large-model data and use off-the-shelf statistical methods without attempting to understand the model's internal workings. This report describes research illuminating why it can be important to improve the quality of metamodels by using even modest phenomenological knowledge to help structure them. The work helps to understand multiresolution, multiperspective modeling.
It may not be possible to deter fanatical terrorists, but members of terrorist systems may be amenable to influence. The U.S. counterterrorism strategy should therefore include political warfare, placing at risk things the terrorists hold dear, a credible threat of force against states or groups that support acquisition of weapons of mass destruction, and maintaining cooperation with other nations engaged in the war on terror, while also preserving core American values. (JDL)
Provides a definition of capabilities-based planning, puts it in the larger context of defense activities generally, and sketches an analytic architecture for carrying it out. Capabilities-based planning has become a central theme of defense planning. It is defined in broad terms in the 2001 Quadrennial Defense Review, but opinions differ about its details and how to implement it. This book reviews and extends ideas developed over the last decade regarding capabilities-based planning. It puts capabilities-based planning in the larger context of defense activities generally, sketches an analytic architecture for carrying it out, and offers recommendations about how to proceed, including a suggested architecture that emphasizes mission-level work and such concepts as mission-system analysis, exploratory analysis, and hierarchical portfolio methods for integration and tradeoffs in an economical framework. Capabilities-based planning is related to the objective of transforming U.S. forces to deal effectively with the changes taking place in military affairs. The book also emphasizes that the new paradigm of capabilities-based planning is particularly apt given the objective of transforming U.S. forces to deal effectively with the changes taking place in military affairs.
This study describes the motivation for multiresolution modeling within a single model or a family of models.
|
You may like...
Handbook of Research on Advanced…
Siddhartha Bhattacharyya, Pinaki Banerjee, …
Hardcover
R7,423
Discovery Miles 74 230
Research Developments in Computer Vision…
Rajeev Srivastava, S.K. Singh, …
Hardcover
R5,156
Discovery Miles 51 560
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R8,415
Discovery Miles 84 150
Research Developments in Biometrics and…
Rajeev Srivastava, S.K. Singh, …
Hardcover
R5,095
Discovery Miles 50 950
|