|
|
Showing 1 - 25 of
250 matches in All Departments
In May 1776 more than two hundred Indian warriors descended the St.
Lawrence River to attack Continental forces at the Cedars, west of
Montreal. In just three days' fighting, the Native Americans and
their British and Canadian allies forced the American fort to
surrender and ambushed a fatally delayed relief column. In Down the
Warpath to the Cedars, author Mark R. Anderson flips the usual
perspective on this early engagement and focuses on its Native
participants - their motivations, battlefield conduct, and the
event's impact in their world. In this way, Anderson's work
establishes and explains Native Americans' centrality in the
Revolutionary War's northern theater. Anderson's dramatic, deftly
written narrative encompasses decisive diplomatic encounters,
political intrigue, and scenes of brutal violence but is rooted in
deep archival research and ethnohistorical scholarship. It sheds
new light on the alleged massacre and atrocities that other
accounts typically focus on. At the same time, Anderson traces the
aftermath for Indian captives and military hostages, as well as the
political impact of the Cedars reaching all the way to the
Declaration of Independence. The action at the Cedars emerges here
as a watershed moment, when Indian neutrality frayed to the point
that hundreds of northern warriors entered the fight between crown
and colonies. Adroitly interweaving the stories of diverse
characters - chiefs, officials, agents, soldiers, and warriors -
Down the Warpath to the Cedars produces a complex picture, and a
definitive account, of the Revolutionary War's first Indian
battles, an account that significantly expands our historical
understanding of the northern theater of the American Revolution.
In the summer of 1499 Leonardo di Vinci is hired by Cesare Borga as
a military engineer. Leonardo begins to work on a steam canon that
had originally been an idea of Archimedes of Syracuse some 1500
years earlier. Cesare invites Leonardo to his headquarters for
diner to learn more about Archimedes. He soon discovers that
Leonardo seems to know a great deal about Archimedes. Leonardo has
in his possession a wooden chest filled with drawings and ideas
from Archimedes. In the course of the evening, Leonardo tells
Cesare all about the life of Archimedes. With the help of documents
from the chest, Leonardo tells the story of Archimedes of Syracuse,
and how he made many discoveries in mathematics and science.
Archimedes determined the true value of pi (3.14159) before the
concept of a zero was understood. He discovered the laws of levers,
equilibrium, and bouyancy. He invented many machines including war
machines that held the might of the Roman army at bay for a year.
At the request of his king, Archimedes visits Alexandria and the
great library there. He had corresponded with many of the great
scholars who resided at the nearby museum. While in Alexandria he
falls in love with Princess Helena, and inspite of their age
difference, they marry and return to Syracuse. Soon Helena gives
birth to their only child, a daughter they name Arsinoe. For nearly
fifty years, Syracuse experiences peace, and avoids being drawn
directly into the frequent conflicts between Rome and Carthage.
However, eventually war comes to Syracuse, and Archimedes must use
all his vast knowledge to defend Syracuse and his very family from
the Romans invaders. As Leonardo concludes his story, Cesare offers
to purchase the chest of ideas from Leonardo. Leonardo declines the
offer a leaves Cesare's headquarters, taking the chest and its
secrets with him. Who know which of Leonardo de Vinci's inventions
were really the brainchild of Archimedes of Syracuse?
"Knowing the beauty of life, a gift, a home, holds the weapon of
contentment, so never sway ..." In "Reaching for the Beauty and
Facts of Life, " Betty Anderson shares her first compilation of
free-verse poetry that encourages you to take a second look at the
world in which we all live and embrace differences, fears, and
loves of all humankind. With the hope that her poems will influence
thinking and create new ideas within each of us, Anderson-a teacher
who has always incorporated poetry into her classroom-not only
challenges cultural biases and religious perspectives, but also
provides charming views of nature and the antics of children as she
traces a lyrical journey through life. While incorporating subtle
life lessons into her poetry about friendship, family, and love,
Anderson also interweaves historical elements, as she shares the
contributions of African Americans and awakens others to the fears
we all face in today's world. This moving collection of poetry will
persuade you to reach into your heart and soul to create memorable
changes and accept the beauty of life.
Now that there's software in everything, how can you make anything
secure? Understand how to engineer dependable systems with this
newly updated classic In Security Engineering: A Guide to Building
Dependable Distributed Systems, Third Edition Cambridge University
professor Ross Anderson updates his classic textbook and teaches
readers how to design, implement, and test systems to withstand
both error and attack. This book became a best-seller in 2001 and
helped establish the discipline of security engineering. By the
second edition in 2008, underground dark markets had let the bad
guys specialize and scale up; attacks were increasingly on users
rather than on technology. The book repeated its success by showing
how security engineers can focus on usability. Now the third
edition brings it up to date for 2020. As people now go online from
phones more than laptops, most servers are in the cloud, online
advertising drives the Internet and social networks have taken over
much human interaction, many patterns of crime and abuse are the
same, but the methods have evolved. Ross Anderson explores what
security engineering means in 2020, including: How the basic
elements of cryptography, protocols, and access control translate
to the new world of phones, cloud services, social media and the
Internet of Things Who the attackers are - from nation states and
business competitors through criminal gangs to stalkers and
playground bullies What they do - from phishing and carding through
SIM swapping and software exploits to DDoS and fake news Security
psychology, from privacy through ease-of-use to deception The
economics of security and dependability - why companies build
vulnerable systems and governments look the other way How dozens of
industries went online - well or badly How to manage security and
safety engineering in a world of agile development - from
reliability engineering to DevSecOps The third edition of Security
Engineering ends with a grand challenge: sustainable security. As
we build ever more software and connectivity into safety-critical
durable goods like cars and medical devices, how do we design
systems we can maintain and defend for decades? Or will everything
in the world need monthly software upgrades, and become unsafe once
they stop?
PROJECT SYNOPSIS "Running The Corporate Rapids" My intention was to
create a book on the organizational and psychological ramifications
of transforming traditional corporate cultures into flexible,
dynamic, agile business enterprises. This is not a new theme, in
fact, much has been written on the subject by several authors. What
differentiates this work from that of previous publications is that
it is written from the perspective of someone that has been "in the
trenches" as both an operational CEO and a Business Consultant.
Previous attempts at "how to" books on this subject have dealt
largely with the structural/organizational aspects of this
transformation and have not effectively addressed the human
behavioral component. In fact, in an article in the Wall Street
Journal, an interview was conducted with the authors of
Re-engineering the Corporation, Michael Hammer and James Champy in
which The Journal stated "But the book, for all of its theoretical
elegance, glossed over the massive career disruptions caused by the
process. Re-engineering work usually required fewer workers and far
fewer managers. Managers resisted, stymieing many re-engineering
efforts." Both Hammer and Champy have agreed that they missed the
significant component --- the people. This is the exact area that
my book addresses. The book is a combination of theory, tools and
practical application formulas punctuated with anecdotal stories
from both operating and consulting experiences. This is a "shirt
sleeve," pragmatic guide to dealing with the problems, challenges
and opportunities facing managers and executives in every day
business situations. The message behind the book will be "Creating
a New Common Sense in Business." In the past American business has,
at best, given lip service to the concept of putting people first.
We have been resource based enterprises (money, bricks &
sticks, equipment, etc.) Today we have left the Industrial
(resource based) Era, have transition
Here is an exceptionally complete guide to making real smoked food
at home that tastes far better than commercially made products.
Learn the secrets of making bacon, ham, pastrami, jerky, sausage,
smoked cheese, smoked salmon and many more delicious smoked foods -
all at home with basic equipment that can either be purchased or
easily made in the workshop following the detailed instructions
provided in this book. The techniques covered here are unique to
the author, covered in no other book. These techniques allow anyone
to make great products with consistently excellent results.
Dry-aged meat is a meat lover s dream, featuring succulence and
flavor that no other meat can match. Typically such meats are
available only in elite steakhouse restaurants or high-end
specialty butcher shops, at a cost far beyond the pocketbook of
most consumers. But now this ultimate expression of meaty flavor is
available to all, with the surprisingly simple but detailed
instructions in this handy guide. All that s needed is a small
refrigerator, a fan, a remote thermometer, and this book. With
these tools anyone can dry age beef, duck, goose, lamb, goat,
venison and other game, and more. The book examines the cuts of
meat to choose and how to trim them. Exact, step-by-step
instructions for dry aging each kind of meat are covered in full.
It addresses health and food-safety concerns in detail, and gives
guidelines for how long each meat should be aged. Cooking notes are
also included. Any serious home cook will want to try the
surprisingly simple methods outlined in Dry Aging Meat at Home."
The (ISC)(2) (R) Systems Security Certified Practitioner (SSCP (R))
certification is one of the most important credentials an
information security practitioner can have. Having helped thousands
of people around the world obtain this distinguished certification,
the bestselling Official (ISC)2 Guide to the SSCP CBK (R) has
quickly become the book that many of today's security practitioners
depend on to attain and maintain the required competence in the
seven domains of the (ISC)(2) CBK. Picking up where the popular
first edition left off, the Official (ISC)2 Guide to the SSCP CBK,
Second Edition brings together leading IT security tacticians from
around the world to discuss the critical role that policy,
procedures, standards, and guidelines play within the overall
information security management infrastructure. Offering
step-by-step guidance through the seven domains of the SSCP CBK,
the text: Presents widely recognized best practices and techniques
used by the world's most experienced administrators Uses accessible
language, bulleted lists, tables, charts, and diagrams to
facilitate a clear understanding Prepares you to join the thousands
of practitioners worldwide who have obtained (ISC)(2) certification
Through clear descriptions accompanied by easy-to-follow
instructions and self-assessment questions, this book will help you
establish the product-independent understanding of information
security fundamentals required to attain SSCP certification.
Following certification it will be a valuable guide to addressing
real-world security implementation challenges.
Cognitive Psychology takes students to the forefront of the field
and introduces them to key discoveries of cognitive psychology.
With accessible and clear explanations, Anderson shows students how
mental processes are investigated and how we know what we know
about the mind. This book introduces students to both the cutting
edge findings of cognitive neuroscience and classic behavioural
studies. Experimental data, sample stimuli, brain images, and
research tasks woven throughout the text give students a real
understanding of how research is conducted and the excitement of
discovery. Fascinating examples and applications of cognitive
theory keep students engaged.
|
|