George Napier (1784-1855) was a brother of the famous soldiers Sir Charles and Sir William Napier, and himself had a distinguished career in the British Army as general and Governor of the Cape of Good Hope, South Africa. He wrote these memoirs to guide and amuse his own children, not intending them to be widely circulated. In 1884, however, his son published them, earning a letter of congratulation from Queen Victoria. George Napier tells of his early army life, which took him around Europe from Sicily to Sweden to Bordeaux, and writes of his admiration for the Duke of Wellington, hailing him as 'one of the greatest captains that ever lived'. Napier's reflections on the responsibilities of an army officer (including the duty to obey and not to criticise), and his advice on how a regiment should be commanded, raise this work above a conventional autobiography.
The general, who was your uncle Charles' old friend, Marshal N ey, rode a white
horse ; and as I was not aware at the time that it was he, I made my men do all
they could to shoot him, as it is always a good thing to shoot your enemy's general, ...
tenth conference, Bangalore, India, December 17-19, 1990 : proceedings
This volume gives the proceedings of the Tenth Conference on Foundations of Software Technology and Theoretical Computer Science. These conferences are organized and run by the computer science research community in India, and their purpose is to provide a forum for professional interaction between members of this research community and their counterparts in different parts of the world. The volume includes four invited papers on: - reasoning about linear constraints using parametric queries, - the parallel evaluation of classes of circuits, - a theory of commonsense visual reasoning, - natural language processing, complexity theory and logic. The 26 submitted papers are organized into sections on logic, automata and formal languages, theory of programming, parallel algorithms, geometric algorithms, concurrency, distributed computing, and semantics.
Public-key Cryptography provides a comprehensive coverage of the mathematical tools required for understanding the techniques of public-key cryptography and cryptanalysis. Key topics covered in the book include common cryptographic primitives and symmetric techniques, quantum cryptography, complexity theory, and practical cryptanalytic techniques such as side-channel attacks and backdoor attacks. Organized into eight chapters and supplemented with four appendices, this book is designed to be a self-sufficient resource for all students, teachers and researchers interested in the field of cryptography.
Key topics covered in the book include common cryptographic primitives and symmetric techniques, quantum cryptography, complexity theory, and practical cryptanalytic techniques such as side-channel attacks and backdoor attacks.Organized ...