
Israeli Prisoner of War Policies: From the 1949 Armistice to the 2006 Kidnappings
Book
Israeli Prisoner of War Policies: From the 1949 Armistice to the 2006 Kidnappings examines the...

Hexen 2.0: Suzanne Treister
Suzanne Treister and Lars Bang Larsen
Book
HEXEN2.0 is the sequel to HEXEN 2039 which imagined new technologies for psychological warfare...

Abraham Hanibal: Prince of Logone, Pushkin's African Ancestor
Book
Hanibal [1697- 1761] was probably the most outstanding African in Europe in the 18th Century, his...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Scott Donaldson, Stanley Siegel, Chris K. Williams and Abdul Aslam
Book
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with...

Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security
Fei Hu, John D. Matyjas and Sunil Kumar
Book
Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview...

Allied Intelligence Handbook to the German Army 1939-45
Book
What did the British or American soldier know about the German Army? Was this knowledge accurate -...

Iron Desert - Fire Storm
Games and Entertainment
App
Iron Desert is a free cross-platform war game that can be played on any device. This is a game...

Breach of Containment
Book
A reluctant hero must prevent war in space and on Earth in this fast-paced military science fiction...
Science fiction

Operation Chastise: The RAF's Most Brilliant Attack of World War II
Book
The attack on Nazi Germany’s dams on May 17, 1943, was one of the most remarkable feats in...