Amazon Price: $24.99 (as of August 22, 2017 14:45 –
Enter the arena of the metal gladiators
Do you have what it takes to build a battle-ready robot? You do now. Here are the plans, step-by-step directions, and expert advice that will put you in competition-while you have a heck of a lot of fun getting there.
Continue reading “Kickin' Bot: An Illustrated Guide to Building Combat Robots (ExtremeTech)”
Amazon Price: $29.95 $17.55 You save: $12.40 (41%). (as of August 23, 2017 01:02 –
A military expert reveals how science fiction is fast becoming reality on the battlefield, changing not just how wars are fought, but also the politics, economics, laws, and ethics that surround war itself
P. W. Singer?s previous two books foretold the rise of private military contractors and the advent of child soldiers? predictions that proved all too accurate. Now, he explores the greatest revolution in military affairs since the atom bomb?the advent of robotic warfare.
Continue reading “Wired for War: The Robotics Revolution and Conflict in the 21st Century”
Amazon Price: N/A (as of August 22, 2017 23:50 –
This book provides an insightful introduction to the most important field of military innovation for the 21st century—robotic and drone weaponry.
• A chronology of important events in robotic technology
Continue reading “Military Robots and Drones: A Reference Handbook: A Reference Handbook (Contemporary World Issues)”
Amazon Price: $210.00 $210.00 (as of August 22, 2017 17:46 –
Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats.
Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts.