Informed by “recognized Civil War . . . experts”, this pictorial is “a detailed look at the soldiers who served with the Union and Confederate Armies.” (Jennifer Locke Jones, Chair and Curator, Division of Armed Forces History, Smithsonian National Museum of American History) In the world of historical painting, Don Troiani stands alone, universally acclaimed for the accuracy, drama, and sensitivity of his depictions of America’s past. His images, both stirring and informative, define the view Americans have of the epochal Civil War. In this new collection of Troiani artworks, ten years in the making, Troiani teams his signature large format battle paintings with detailed paintings of both Union and Confederate soldiers along with over three hundred photographs of uniforms, equipment, and artifacts from the nation’s most respected museum and private collections to give a full picture of the life of the Civil War soldier. Civil War uniform and equipment experts Earl J. Coates and Michael McAfee have contributed accompanying text. Includes fifty paintings and over three-hundred photographs.
Many accounts of the secession crisis overlook the sharp political conflict that took place in the Border South states of Delaware, Kentucky, Maryland, and Missouri. Michael D. Robinson expands the scope of this crisis to show how the fate of the Border South, and with it the Union, desperately hung in the balance during the fateful months surrounding the clash at Fort Sumter. During this period, Border South politicians revealed the region's deep commitment to slavery, disputed whether or not to leave the Union, and schemed to win enough support to carry the day. Although these border states contained fewer enslaved people than the eleven states that seceded, white border Southerners chose to remain in the Union because they felt the decision best protected their peculiar institution. Robinson reveals anew how the choice for union was fraught with anguish and uncertainty, dividing families and producing years of bitter internecine violence. Letters, diaries, newspapers, and quantitative evidence illuminate how, in the absence of a compromise settlement, proslavery Unionists managed to defeat secession in the Border South.
A history of the United States Army during the time it served as the vanguard of western expansion and a description of its uniforms and equipment in the late nineteenth century. Each volume in this ongoing series combines detailed and informative captions with over 100 rare and unusual images. These books are a must for anyone interested in American military uniforms.
This innovative new text focuses on the politics of international security: how and why issues are interpreted as threats to international security and how such threats are managed. After a brief introduction to the field and its major theories and approaches, the core chapters systematically analyze the major issues on the contemporary international security agenda. Each is examined according to a common framework that brings out the nature of the threat and the responses open to policy makers. From war, terrorism and weapons of mass destruction, through environmental and economic crises, to epidemics, cyber-war and piracy, the twenty-first century world seems beset by a daunting range of international security problems. At the same time, the academic study of security has become more fragmented and contested than ever before as new actors, issues and theories increasingly challenge traditional concepts and approaches. This new edition has been heavily revised to discuss for the failings of the Obama admiration and its strategic partners on a number of different security issues, and the constant, evolving instances of turmoil the world has experienced since, whilst providing the skills students need to conduct their own research of international security issues occurring outside of this text, and for issues yet to occur. Cyber security, the 'Arab Spring' revolutions, the Ebola outbreak, and the refugee crisis are just some examples of the plethora of subjects that Smith analyses within this text. This textbook is an essential for those studying international security, whether at undergraduate or postgraduate level as part of a degree in international relations, politics, and other social sciences more generally. New to this Edition: - Chapter on cyber security - Up-to-date issues and field coverage - New 'mini-case studies' in each chapter - Updated analytical/pedagogical framework Pioneering framework for students to apply theory and empirical evidence correctly to tackle analytical and comparative tasks concerning both traditional and non-traditional security issues
Aimed at addressing the difficulties associated with teaching often abstract elements of technical ethics, this book is an extended fictional case study into the complexities of technology and social structures in complex organizations. Within this case study, an accidental discovery reveals that the algorithms of Professor John Blackbriar are not quite what they were purported to be. Over the course of 14 newspaper articles, a nebula of professional malpractice and ethical compromise is revealed, ultimately destroying the career of a prominent, successful academic. The case study touches on many topics relevant to ethics and professional conduct in computer science, and on the social structures within which computer science functions. Themes range from the growing influence of generative AI to the difficulties in explaining complex technical processes to a general audience, also touching on the environmental consequences of blockchain technology and the disproportionate gender impacts of Coronavirus. Each new revelation in the case study unveils further layers of complexity and compromise, leading to new technical and social issues that need to be addressed. Directly aimed at making ethics in the digital age accessible through the use of real-world examples, this book appeals to computer science students at all levels of the educational system, as well as making an excellent accompaniment to lecturers and course convenors alike.
*Silver Medal Winner in Finance - 2024 Global Book Awards!* Cryptocurrency, a disruptive financial concept, promises a new decentralized finance and investment era. But do you understand its significance, and are you ready to take advantage of its potential? Join me on a journey that will expand your appreciation for Cryptocurrency and shed light on its long-term implications for global economies. Crypto and Bitcoin is a comprehensive exploration of the digital currency revolution. From the genesis of Bitcoin to a myriad of crypto-assets that followed, this book delves into the technological innovation that has challenged traditional financial systems and sparked a global conversation about the future of money. From the shadows of the 2008 financial crisis emerged a disruptive concept that promised a new era of decentralized finance. The world witnessed the birth, struggles, and triumphs of a novel asset fighting for legitimacy. The development of Bitcoin and Cryptocurrency is a tale of innovation that undeniably impacted traditional finance and banking, signaling the rise of crypto-assets, investment opportunities, and how we perceive value in the digital age. By reading this book, you will: Learn about Crypto and Bitcoin's birth and future from an author who mined Bitcoin starting in 2011. Explore crypto's early days with the Mt. Gox Hacks, Silk Road, and Onion Router (Tor). Delve into the diverse world of Cryptocurrencies, understanding their types, functions, and impact on the global economy. Discover everything about Crypto Wallets and Exchanges to make informed choices and optimize their benefits. Understand concepts crucial for navigating the complex finance and crypto investment world. Explore the topics of Cryptocurrency, the United States money supply, inflation rates, coin market capitalization, the principle of decentralization, and the Federal Reserve's policies. Learn the concepts of Initial Coin Offerings (ICOs), tokens, staking, swapping, and mining, thus simplifying complex ideas into manageable knowledge. Explore the intricate balance of Crypto Mining & Staking and its significant effect on the digital economy and the power grid. Learn strategies to secure your Crypto Investments in the constantly changing landscape of cyber threats. Investigate the potential risks associated with CBDCs and their possible effects on worldwide financial autonomy. Uncover how Cryptocurrency can defend privacy and freedom, ensuring your investments align with your rights. Explore the world of Decentralized Finance (DeFi), Smart Contracts, and Crypto Staking with Web 3.0 coming online. And much more! Order your copy today and start your journey to a better tomorrow! Crypto and Bitcoin is perfect for anyone interested in learning more about Bitcoin and looking to the future of Cryptocurrency, online trading, money, monetary policy, and financial technology innovation.
Will the universe expand forever? Or will it collapse in a Big Crunch within the next few billion years? If the Big Bang theory is correct in presenting the origins of the universe as a smooth fireball, how did the universe come to contain structures as large as the recently discovered "Great Wall" of galaxies, which stretches hundreds of millions of light years? Such are the compelling questions that face cosmologists today, and it is the excitement and wonder of their research that Michael Lemonick shares in this lively tour of the current state of astrophysics and cosmology. Here we visit observatories and universities where leading scientists describe how they envision the very early stages, the history, and the future of the universe. The discussions help us to make sense of many recent findings, including cosmic ripples, which supply evidence of the first billionth of a second of the universe; anomalous galactic structures such as the Great Wall, the Great Void, and the Great Attractor; and the mysterious presence of dark matter, massive but invisible. Lemonick assembles this information into a comprehensive, up-to-date picture of modern cosmology, and a portrait of its often contentious practitioners. Originally published in 1995. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
Disruption is changing the playing field – keep your successful business on top Thriving businesses on top of their game are targets for disruption. But for savvy business owners and managers who understand the coming changes, the time to future-proof their successful companies is now. Following over a decade of research into future trends, business reinvention and disruptive innovation, author Michael McQueen presents How to Prepare Now for What’s Next, a blueprint for top companies to thrive in turbulent times. McQueen brings rare insight to the topic of business disruption. The book first explores the notion of disruption itself, and confirms that the term is much more than just guru-speak. The book outlines the four primary forms of disruption that McQueen sees playing out over the next 5-10 years, and quickly moves on to the in-depth tools, tips and techniques that healthy businesses will need to stay on top. Use a simple tool to assess just how vulnerable to disruption your company is Read case studies, research and trend reports that highlight real-world examples to complement the book’s concepts Understand the four forms of disruption, namely widescale automation, empowered consumers, unconventional competition and emerging generations Apply the 9 keys to future-proof your business against disruption and make it impervious to change The time to act is now for the businesses who want to keep their edge, and How to Prepare Now for What’s Next is the guide to continue thriving.
This comprehensive volume offers a view of country music from a different perspective--using different areas of America to come to a better understanding and appreciation of America's music. Over 100 photographs, some in color.
In 1861 Captain James J. Morrison resigned his commission in the United States Cavalry, returned to his home in Cedartown, Georgia, and was soon authorized by the Confederate War Department to raise a regiment of cavalry. This book is the first complete history of the First Georgia Cavalry, who saw action in Tennessee, Kentucky, Virginia, Georgia, Alabama, Mississippi, South Carolina and North Carolina. A regimental roster includes more than 1,600 names with details of service provided, along with pre-war service, death and burial information in some cases.
The #1 bestselling sports almanac is the ultimate resource for sports professionals and fans everywhere. ESPN, the worldwide leader in sports, once again joins forces with Information Please(R) to bring enthusiasts the most authoritative sports reference book ever published. Whether they're looking for new world records, updating their trivia knowledge, or curious about the most intriguing sports stories of the past year, sports fans will welcome the latest edition of this bestselling almanac, and ESPN fans will find familiar segments from many of ESPN's outlets, including studio shows, radio, online, ESPN The Magazine, as well as: --In-depth statistics from ESPN's award-winning "Inside the Numbers" --Top Ten moments from each sport --Exclusive essays and analysis from your favorite ESPN personalities, including Chris Berman, Dan Patrick, Stuart Scott, Rich Eisen, and more --Hundreds of photographs --Thousands of graphics and tables --Fast access to all the facts: world records, champions, year-by-year, sport-by-sport --Full recap of the World Series, World Cup, and Ryder Cup --The ultimate resource for sports professionals and fans everywhere, the ESPN Information Please(R) Sports Almanac is clearly the champion in its field.
Magnetic Resonance Neuroimaging is a comprehensive volume that focuses on the newest fields of MRI from functional and metabolic mapping to the latest applications of neuro-interventional techniques. Each chapter offers critical discussions regarding available methods and the most recent advances in neuroimaging, including such topics as the use of diffusion and perfusion MRI in the early detection of stroke, the revolutionary advent of high-speed MRI for non-invasively mapping cortical responses to task activation paradigms, and the principles and applications of contrast agents. The chapters also discuss how these new advances are applied to problems in patients ranging in age from the newborn to the elderly, as well as disease states ranging from metabolic encephalopathy to cardiovascular disorders and stroke. Magnetic Resonance Neuroimaging will be a valuable text/reference for residents, research fellows, and clinicians in radiology, neuroradiology, and magnetic resonance imaging.
Discover the role of machine learning and artificial intelligence in business forecasting from some of the brightest minds in the field In Business Forecasting: The Emerging Role of Artificial Intelligence and Machine Learning accomplished authors Michael Gilliland, Len Tashman, and Udo Sglavo deliver relevant and timely insights from some of the most important and influential authors in the field of forecasting. You'll learn about the role played by machine learning and AI in the forecasting process and discover brand-new research, case studies, and thoughtful discussions covering an array of practical topics. The book offers multiple perspectives on issues like monitoring forecast performance, forecasting process, communication and accountability for forecasts, and the use of big data in forecasting. You will find: Discussions on deep learning in forecasting, including current trends and challenges Explorations of neural network-based forecasting strategies A treatment of the future of artificial intelligence in business forecasting Analyses of forecasting methods, including modeling, selection, and monitoring In addition to the Foreword by renowned researchers Spyros Makridakis and Fotios Petropoulos, the book also includes 16 "opinion/editorial" Afterwords by a diverse range of top academics, consultants, vendors, and industry practitioners, each providing their own unique vision of the issues, current state, and future direction of business forecasting. Perfect for financial controllers, chief financial officers, business analysts, forecast analysts, and demand planners, Business Forecasting will also earn a place in the libraries of other executives and managers who seek a one-stop resource to help them critically assess and improve their own organization's forecasting efforts.
What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution
With at least one case presentation for each of the mental disorders catalogued in DSM-5 -- and multiple cases for nearly half of the disorders -- Learning DSM-5® by Case Example has been meticulously designed to aid practitioners and students of all levels in psychology, psychiatry, social work, counseling, and psychiatric nursing develop internalized prototypes of DSM-5 disorders by first describing each disorder in relatable terms and subsequently illustrating how these symptom constellations manifest in real-life settings using clinical case material. The nearly 200 cases featured in this guide are drawn from the clinical experience of well over 100 clinicians, many of whom are well-known experts in particular areas of diagnosis and treatment. Sensitive to the fact that one of the hallmarks of mental disorders is the wide range of presentations that are encountered in a real-world setting, many of the disorders described include multiple cases that vary in symptom presentation, gender, age, clinical course, associated impairment in psychosocial functioning, and developmental factors, thus giving readers an appreciation for the heterogeneity typical of these disorders. Each case is complemented by a discussion that elaborates the ways in which the case conforms to the DSM-5 prototype or highlights those features of the case that illustrate the heterogeneity. With definitions of potentially unfamiliar medical and psychiatric terms, Learning DSM-5® by Case Example is an accessible resource for readers of all disciplines. And because it guides the reader through the organizational structure of DSM-5, it is also an ideal reference for courses on psychopathology or abnormal psychology.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.