This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.
This SpringerBrief evaluates the cooperative effort of sensor nodes to accomplish high-level tasks with sensing, data processing and communication. The metrics of network-wide convergence, unbiasedness, consistency and optimality are discussed through network topology, distributed estimation algorithms and consensus strategy. Systematic analysis reveals that proper deployment of sensor nodes and a small number of low-cost relays (without sensing function) can speed up the information fusion and thus improve the estimation capability of wireless sensor networks (WSNs). This brief also investigates the spatial distribution of sensor nodes and basic scalable estimation algorithms, the consensus-based estimation capability for a class of relay assisted sensor networks with asymmetric communication topology, and the problem of filter design for mobile target tracking over WSNs. From the system perspective, the network topology is closely related to the capability and efficiency of network-wide scalable distributed estimation. Wireless Sensor Networks: Distributed Consensus Estimation is a valuable resource for researchers and professionals working in wireless communications, networks and distributed computing. Advanced-level students studying computer science and electrical engineering will also find the content helpful.
This SpringerBrief presents key enabling technologies and state-of-the-art research on delivering efficient content distribution services to fast moving vehicles. It describes recent research developments and proposals towards the efficient, resilient and scalable content distribution to vehicles through both infrastructure-based and infrastructure-less vehicular networks. The authors focus on the rich multimedia services provided by vehicular environment content distribution including vehicular communications and media playback, giving passengers many infotainment applications. Common problems of vehicular network research are addressed, including network design and optimization, standardization, and the adaptive playout from a user’s perspective.
This Springer Brief covers emerging maritime wideband communication networks and how they facilitate applications such as maritime distress, urgency, safety and general communications. It provides valuable insight on the data transmission scheduling and protocol design for the maritime wideband network. This brief begins with an introduction to maritime wideband communication networks including the architecture, framework, operations and a comprehensive survey on current developments. The second part of the brief presents the resource allocation and scheduling for video packet transmission with a goal of maximizing the weights of uploaded video packets. Finally, an energy and content aware scheduling scheme is proposed for the most efficient vessel packet throughput. Based on the real ship route traces obtained from the navigation software BLM-Ship, simulation results demonstrate the viability of the proposed schemes. Conclusions and further research directions are discussed. Maritime Wideband Communication Networks: Video Transmission Scheduling is a valuable tool for researchers and professionals working in wireless communications and networks. Advanced-level students studying computer science and electrical engineering will also find the content valuable.
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future challenges and research problems are also identified. Using a Quality-of-Protection perspective, the authors provide valuable insights on security and privacy preservation for MHNs. Some promising solutions are proposed to accommodate the issues of secure health data transmission, misbehavior detection, health data processing with privacy preservation and access control in MHNs. Specifically, the secure health data aggregation explores social spots to help forward health data and enable users to select the optimal relay according to their social ties and health data priority. The secure aggregation achieves the desirable delivery ratio with reasonable communication costs and lower delay for the data in different priorities. A proposed misbehavior detection scheme distinguishes Sybil attackers from normal users by comparing their mobile contacts and pseudonym changing behaviors. The detection accuracy is high enough to resist various Sybil attacks including forgery. In addition, the health data processing scheme can analyze the encrypted health data and preserve user’s privacy at the same time. Attribute based access control can achieve fine-grained acces s control with user-defined access policy in MHNs. Security and Privacy for Mobile Healthcare Networks is designed for researchers and advanced-level students interested in healthcare security and secure data transmission.
This SpringerBrief focuses on the network capacity analysis of VANETs, a key topic as fundamental guidance on design and deployment of VANETs is very limited. Moreover, unique characteristics of VANETs impose distinguished challenges on such an investigation. This SpringerBrief first introduces capacity scaling laws for wireless networks and briefly reviews the prior arts in deriving the capacity of VANETs. It then studies the unicast capacity considering the socialized mobility model of VANETs. With vehicles communicating based on a two-hop relaying scheme, the unicast capacity bound is derived and can be applied to predict the throughput of real-world scenarios of VANETs. The downlink capacity of VANETs is also investigated in which access infrastructure is deployed to provide pervasive Internet access to vehicles. Different alternatives of wireless access infrastructure are considered. A lower bound of downlink capacity is derived for each type of access infrastructure. The last section of this book presents a case study based on a perfect city grid to examine the capacity-cost trade-offs of different deployments since the deployment costs of different access infrastructure are highly variable.
This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in parallel with macrocells in network control and resource management and address resource management in the backhaul with coordination constraints and wireless channel uncertainty. The final section of this brief summarizes and provides future research directions for this topic, including a proposed framework that has been evaluated through realistic simulations. Cognitive Resource Management for Heterogeneous Cellular Networks is designed for researchers and professionals working in wireless communications and networks. Advanced-level students studying electrical and computer engineering should also find the content helpful.
This book focuses on the current research on the dynamic spectrum sharing for efficient spectrum resource utilization, which covers the overlay spectrum sharing, underlay spectrum sharing and database-assisted spectrum sharing related research issues. Followed by a comprehensive review and in-depth discussion of the current state-of-the-art research literature and industry standardization, this book first presents a novel overlay spectrum sharing framework for dynamic utilization of available cellular frequency bands, formulates the dynamic spectrum sharing problem as a dynamic resource demand-supply matching problem, and accordingly develops a distributed fast spectrum sharing algorithm to solve the resource matching problem. A self-awareness power control approach for multi-hop routing selection is proposed, which can establish an effective and practical routing selection optimization in secondary access networks and minimize the interference to primary users. Finally, this book offers dynamic secondary access scheme for database-assisted spectrum sharing networks, which is targeted to support the prosperous wireless multimedia networking applications by leveraging the TV white spaces of geolocation databases while satisfying QoS guarantees of secondary users. The overlay spectrum sharing, underlay spectrum sharing, and database-assisted white spaces spectrum sharing research results that are presented in this book provide useful insights for the design of next generation wireless access networks. This book motivates a new line of thinking for efficient spectrum resource utilization and performance enhancements of future wireless access applications.
This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a new line of thinking for future sensor networking. Professionals, researchers, and advanced-level students in electrical or computer engineering will find the content valuable.
This book provides a comprehensive overview of wireless technologies for industrial network systems. The authors first describe the concept of industrial network systems and their application to industrial automation. They then go on to cover the role of sensing and control in industrial network systems, and the challenge of sensing and control in the industrial wireless environment. Then, the existing techniques for resource efficiency information transmission are introduced and studied. Afterward, the authors introduce sensing and control-oriented transmission for industrial network systems, which take advantage of spatial diversity gain to overcome the interference and fading, which in turn improves the transmission reliability without expending extra spectrum resources and enlarging the transmission delay. Subsequently, edge assisted efficient transmission schemes are introduced, which integrate the capacities of communication, computing, and control to relieve the contradiction of resource limitation and massive data. Finally, the authors discuss open research issues and future works about information transmission in industrial network systems.
This book provides a comprehensive investigation on new technologies for future vehicular networks. The authors propose different schemes to efficiently manage the multi-dimensional resources for supporting diversified applications. The authors answer the questions of why connected and automated vehicle technology should be considered; how the multi-access edge computing (MEC) and unmanned aerial vehicle (UAV) technologies can be helpful to vehicular networks; how to efficiently manage the multi-dimensional resources to support different vehicular applications with guaranteed quality-of-service (QoS) requirements; and how to adopt optimization and AI technologies to achieve resource management in vehicular networks. The book is pertinent to researchers, professionals, academics and students in vehicular technologies.
This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel cooperative vehicular communication framework together with a delicate linear cluster formation scheme and low-delay content forwarding approach to provide a flexible and efficient vehicular content distribution in the drive-thru Internet. The presented medium access control and vehicular content distribution related research results in this brief provide useful insights for the design approach of Wi-Fi enabled vehicular communications and it motivates a new line of thinking for the performance enhancements of future vehicular networking. Advanced-level students, researchers and professionals interested in vehicular networks or coordinated network sharing will find Cooperative Vehicular Communications in the Drive-thru Internet a valuable reference.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
This book provides an in-depth discussion on how to efficiently manage resources of heterogeneous wireless networks and how to design resource allocation algorithms to suit real world conditions. Efficiently managing resources of the networks is more crucial now, than ever before, to meet users’ rapidly increasing demand for higher data rates, better quality-of-service (QoS) and seamless coverage. Some of the techniques that can be incorporated within heterogeneous wireless networks to achieve this objective are interworking of the networks, user multi-homing and device-to-device (D2D) communication. Designing resource allocation algorithms to suit real world conditions is also important, as the algorithms should be deployable and perform well in real networks. For example, two of the conditions considered in this book are resource allocation intervals of different networks are different and small cell base stations have limited computational capacity. To address the first condition, resource allocation algorithms for interworking systems are designed to allocate resources of different networks at different time-scales. To address the second condition, resource allocation algorithms are designed to be able to run at cloud computing servers. More of such conditions, algorithms designed to suit these conditions, modeling techniques for various networks and performance analysis of the algorithms are discussed in the book. This book concludes with a discussion on the future research directions on the related fields of study. Advanced-level students focused on communication and networking will use this book as a study guide. Researchers and experts in the fields of networking, converged networks, small-cell networks, resource management, and interference management, as well as consultants working in network planning and optimization and managers, executives and network architects working in the networking industry will also find this book useful as a reference.
This brief examines current research on improving Vehicular Networks (VANETs), examining spectrum scarcity due to the dramatic growth of mobile data traffic and the limited bandwidth of dedicated vehicular communication bands and the use of opportunistic spectrum bands to mitigate congestion. It reviews existing literature on the use of opportunistic spectrum bands for VANETs, including licensed and unlicensed spectrum bands and a variety of related technologies, such as cognitive radio, WiFi and device-to-device communications. Focused on analyzing spectrum characteristics, designing efficient spectrum exploitation schemes, and evaluating the date delivery performance when utilizing different opportunistic spectrum bands, the results presented in this brief provide valuable insights on improving the design and deployment of future VANETs.
This book provides a comprehensive review and in-depth discussion of the state-of-the-art research literature and propose energy-efficient computation offloading and resources management for mobile edge computing (MEC), covering task offloading, channel allocation, frequency scaling and resource scheduling. Since the task arrival process and channel conditions are stochastic and dynamic, the authors first propose an energy efficient dynamic computing offloading scheme to minimize energy consumption and guarantee end devices’ delay performance. To further improve energy efficiency combined with tail energy, the authors present a computation offloading and frequency scaling scheme to jointly deal with the stochastic task allocation and CPU-cycle frequency scaling for minimal energy consumption while guaranteeing the system stability. They also investigate delay-aware and energy-efficient computation offloading in a dynamic MEC system with multiple edge servers, and introduce an end-to-end deep reinforcement learning (DRL) approach to select the best edge server for offloading and allocate the optimal computational resource such that the expected long-term utility is maximized. Finally, the authors study the multi-task computation offloading in multi-access MEC via non-orthogonal multiple access (NOMA) and accounting for the time-varying channel conditions. An online algorithm based on DRL is proposed to efficiently learn the near-optimal offloading solutions. Researchers working in mobile edge computing, task offloading and resource management, as well as advanced level students in electrical and computer engineering, telecommunications, computer science or other related disciplines will find this book useful as a reference. Professionals working within these related fields will also benefit from this book.
This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consumption. Dynamic network planning adjusts cell density with traffic variations to provide on-demand service, which reduces network power consumption with quality of service provisioning during off-peak hours. With intra- or inter-tier traffic steering, cell density is dynamically optimized with regards to the instant traffic load for conventional homogeneous and multi-tier heterogeneous cellular networks, respectively. This book is beneficial for researchers and graduate students interested in traffic management and future wireless networking.
This book investigates the modeling and optimization issues in mobile social networks (MSNs). Firstly, the architecture and applications of MSNs are examined. The existing works on MSNs are reviewed by specifying the critical challenges and research issues. Then, with the introduction of MSN-based social graph and information dissemination mechanisms, the analytical model for epidemic information dissemination with opportunistic Links in MSNs is discussed. In addition, optimal resource allocation is studied based on a heterogeneous architecture, which provides mobile social services with high capacity and low latency. Finally, this book summarize some open problems and future research directions in MSNs. Written for researchers and academics, this book is useful for anyone working on mobile networks, network architecture, or content delivery. It is also valuable for advanced-level students of computer science.
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential – for example, blockchain, trusted execution environment, and indistinguishability obfuscation – and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
This book covers the fundamental principles, new theories and methodologies, and potential applications of hybrid intelligent networks. Chapters focus on hybrid neural networks and networked multi-agent networks, including their communication, control and optimization synthesis. This text also provides a succinct but useful guideline for designing neural network-based hybrid artificial intelligence for brain-inspired computation systems and applications in the Internet of Things. Artificial Intelligence has developed into a deep research field targeting robots with more brain-inspired perception, learning, decision-making abilities, etc. This text devoted to a tutorial on hybrid intelligent networks that have been identified in nature and engineering, especially in the brain, modeled by hybrid dynamical systems and complex networks, and have shown potential application to brain-inspired intelligence. Included in this text are impulsive neural networks, neurodynamics, multiagent networks, hybrid dynamics analysis, collective dynamics, as well as hybrid communication, control and optimization methods. Graduate students who are interested in artificial intelligence and hybrid intelligence, as well as professors and graduate students who are interested in neural networks and multiagent networks will find this textbook a valuable resource. AI engineers and consultants who are working in wireless communications and networking will want to buy this book. Also, professional and academic institutions in universities and Mobile vehicle companies and engineers and managers who concern humans in the loop of IoT will also be interested in this book.
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.
This monograph addresses the spectrum-scarcity problem by providing a comprehensive overview of spectrum resource management in Cognitive Radio Sensor Networks (CRSNs). It shows a variety of CRSN applications covering Machine-to-Machine communications, cyber physical systems and Internet-of-Things. The authors explore the benefits of an integrated energy efficient spectrum management solution for CRSNs including spectrum sensing, decision and allocation. Both theoretical and experimental aspects of CRSNs are covered in detail. Academics, researchers and developers will find this monograph an exceptional resource with valuable knowledge and insights. It also has extensive references from top journals, conference proceedings, books and standards.
This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First, the architecture and applications are provided. Then, the authors review the existing works on charging and discharging strategy design for EVs. Critical challenges and research problems are identified. Promising solutions are proposed to accommodate the issues of high EV mobility, vehicle range anxiety, and power systems overload. The authors investigate innovating charging and discharging potentials for mobile EVS based on real-time information collections (via VANETS and/or cellular networks) and offer the power system adjustable load management methods. Several innovative charging/discharging strategy designs to address the challenging issues in smart grid, i.e., overload avoidance and range anxiety for individual EVs, are presented. This book presents an alternative and promising way to release the pressure of the power grid caused by peak-time EV charging demand. Mobile Electric Vehicles: Online Charging and Discharging provides valuable insights on charging/ discharging strategy design for mobile EVs and the power system management in a smart grid. The authors’ findings indicate that the proposed strategies considerably outperform the traditional EV charging strategies without real-time collections on the metrics of the overall energy utilizat ion, the average EV travel cost and the number of successfully charged EVs. Research and graduate students who are working on smart grid and vehicular communication will find this book a valuable resource. Customs and systems operators will also find this book useful.
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users’ data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool.
Sherman's Memoirs are a detailed account of his life and military career, providing a firsthand perspective on many key events of the Civil War. First published in 1875 and later revised in 1886, the two-volume work is considered one of the most important personal narratives from the Civil War era. The Memoirs cover Sherman's early life, his experiences before the war, and his detailed recounting of the Civil War campaigns. He provides insights into his strategic thinking, the challenges he faced, and his interactions with other key figures of the time, including Ulysses S. Grant and Abraham Lincoln. Sherman's writing style is straightforward and unembellished, reflecting his pragmatic and direct approach to both life and warfare. He defends his controversial tactics during the war, particularly his "March to the Sea," arguing that the harsh methods were necessary to bring about a swift end to the conflict and save lives in the long run.
Includes Civil War Map and Illustrations Pack - 224 battle plans, campaign maps and detailed analyses of actions spanning the entire period of hostilities. Among the greatest memoirs ever produced during the 19th Century; and a classic of American Literature, the autobiography of General William Tecumseh Sherman is a fantastic read that reveals not only his experiences of the Civil War but Sherman as a man. Not Just a book for military buffs Sherman paints a picture of himself and his contemporaries that does not always fit with preconceptions; not an unfeeling monster who ignored the cost of the war that he pursued: “I am tired and sick of war. Its glory is all moonshine. It is only those who have neither fired a shot nor heard the shrieks and groans of the wounded who cry aloud for blood, for vengeance, for desolation. War is hell.” A firm and loyal friend to those who stuck by him, especially his close adherent the future President U.S. Grant of whom he wrote; “Grant stood by me when I was crazy and I stood by him when he was drunk and now we stand by each other.” However, perhaps understandably the majority of the memoirs relate to his great achievements as a soldier during the upheavals of the Civil War. They are as detailed and vivid as any other recollections written of the Civil War and the author displays a rare knack of explaining the operations in light of the wider struggle. Highly recommended. This edition of the great General’s memoirs is the second edition which was revised and amended from the first after inaccuracies had been corrected and as such is the definitive article.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.