Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Castles and Fortified Cities of Medieval Europe: An Illustrated History

Buy

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications were continuously adapted to meet new political circumstances and weapons technology. Here is an illustrated guide to the architecture of medieval fortifications, from the first castles to the fortified cities of the fifteenth and sixteenth centuries. In hundreds of detailed and thoroughly researched pen-and-ink drawings, artist Jean-Denis G.G. Lepage introduces the reader to a heterogeneous group of buildings whose unique characteristics show the development and diversity of European medieval military architecture. Each drawing is accompanied by detailed text describing types of buildings (e.g., moat-and-bailey castles), built-in defenses (arrow splits, pepper-pot towers), and particular castles and cities (the Mont-Saint-Michel, the city of Jerusalem). Elements of medieval warfare and weaponry are also covered in drawings and text

(HTML tags aren't allowed.)

Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools
MySQL 8 for Big Data: Effective data processing with MySQL 8, Hadoop, NoSQL APIs, and other Big Data tools

Uncover the power of MySQL 8 for Big Data

About This Book

  • Combine the powers of MySQL and Hadoop to build a solid Big Data solution for your organization
  • Integrate MySQL with different NoSQL APIs and Big Data tools such as Apache Sqoop
  • A comprehensive guide with practical...
Professional Financial Computing Using Excel and VBA
Professional Financial Computing Using Excel and VBA

"Professional Financial Computing Using Excel and VBA is an admirable exposition that bridges the theoretical underpinnings of financial engineering and its application which usually appears as a "black-box" software application. The book opens the black-box and reveals the architecture of risk-modeling and financial...


Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)
Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)

Use This Information To Avoid Being Spied By The Government Today!

If you’ve ever heard outrageous stories about online illegal drug stores, hit men for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you’ve probably heard of the “dark web”, alternatively called...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy