By Duncan B Campbell
Когда тактика осады стала неотъемлемым условием успеха в войне, генералы перед инженерами и учеными поставили задачу разработать тактику, прорыва обороны и блокады города с помощью фокусов и обмана. Это увлекательное исследование отслеживает изменения в тактике осады от Древней Персии (6 веке до н. э.) до осад, осуществляемых Римом 2-й век до нашей эры), описывая широкий спектр оборудования и техники, которые использовались в этот период.
Read Online or Download Ancient Siege Warfare. Persians, Greeks, Carthaginians and Romans 546-146 BC PDF
Similar conventional books
Книга Germany's mystery guns in international conflict II Germany's mystery guns in international warfare II Книги Вооружение Автор: Roger Ford Год издания: 2000 Формат: pdf Издат. :MBI Publishing corporation Страниц: a hundred and forty four Размер: 6. 6 ISBN: 0760308470 Язык: Английский0 (голосов: zero) Оценка:During the process warfare, man's ingenuity unavoidably ends up in the improvement of latest instruments of destruction.
Even if often called net apparatus, TE-21, TA50, LBE or LCE, the yank soldier's person wrestle apparatus was once seldom praised – other than by means of its builders. however, it has consistently been, and may stay an important a part of the struggling with man's burden. because of lots of modern images, diagrams, and 8 complete web page color plates by way of Osprey veteran Ron Volstad, Gordon Rottman's textual content reveals a wealth of data at the altering nature people wrestle equipments from 1910-1988.
A scant 3 years after publishing his account of WWIIs land warfare within the Pacific (Touched with Fire), historian Bergerud has accomplished an exhaustive spouse quantity addressing the theaters ferocious air warfare. Bergerud states in actual fact on the outset that he has tried to hide either side of the Pacific air warfare rather; yet, he notes, equity dictates acknowledging that anything went very flawed in Japan in the course of the Nineteen Thirties and that the air conflict in Asia used to be as a result of Tokyos overaggressive nature.
The lightning eastern offensives within the a long way East in 1941/42 inflicted a sequence of pricey defeats at the ill-prepared and badly supported British Commonwealth forces in Malaya and Burma. The 'forgotten' 14th military at the India-Burma border slowly outfitted up its energy and its tactical services; and Wingate's 'Chindits' proved that devices provided from the air may perhaps function deep at the back of enemy traces.
- CHARIOTS OF THE DESERT: Story of the Israeli Armoured Corps
- Medieval Warfare: Theory and Practice of War in Europe, 300-1500
- Super-heavy Tanks of World War II (New Vanguard)
- Tigers in Combat, Vol. 1
- M4 Sherman at War (2): 1941-1945
- The book of the crossbow, Edition: Dover ed
Additional resources for Ancient Siege Warfare. Persians, Greeks, Carthaginians and Romans 546-146 BC
It will change our sense of privacy, of safety, and of danger. It will change our relationships with corporations, governments, and individuals whom we have never met. It will change the way we govern our collective security and how we manage our personal safety. And it may lead us to ask questions about how we organize ourselves politically at the local, national, and international levels. Today, each person needs to fear an exponentially higher number of people and entities than only a decade ago.
2 If this sounds far-fetched, it should not. The technology in reality is not that complicated. In fact, our hypothetical attacker may well have overinvested in automation. He could probably obtain the same effect by releasing spores from the back of a truck in a crowded downtown area or by hand at the stadium. Nor is the idea of using small drones for domestic terrorism limited to the realm of speculation. S. ”3 Had the anthrax attacks played out in one of these counterfactual fashions, no one reading this book today would doubt the proposition that it is possible for an individual to have his own personal weapons-of-mass-destruction program.
When Arab dissidents used social-networking platforms to organize, inform, and empower protesters at the expense of autocratic governments during the Arab Spring, we celebrated. When, beginning in 2008, the hacker collective known as Anonymous launched cyberattacks against corporations and entities offensive to its members, we responded with mixed feelings—with approbation for the honorable place of civil disobedience, on the one hand, and concerns about unaccountable mob rule, on the other. When Julian Assange, founder of WikiLeaks, created a computer system to distribute leaked material and individuals then used that system to expose US government secrets, we saw a lively debate between those who regard this as an attractive form of distributed journalism and those who regard it more dimly.