Cassidy's Run: The Secret Spy War Over Nerve Gas


David Wise - 2000
    At the highest levels of the government, its code name was Operation Shocker. Lured by a double agent working for the USA, ten Russian spies, including a University of Minnesota professor, his wife & a classic sleeper spy in NYC, were sent by Moscow to penetrate America's secrets. Two FBI agents were killed & secret formulae were passed to the USSR in a dangerous ploy that may have spurred Moscow to create the world's most powerful nerve gas. Cassidy's Run tells this true story for the 1st time, following a trail that leads from DC to Moscow, with detours to Florida, Minnesota & Mexico. Based on documents secret until now & scores of interviews in the USA & USSR, the book reveals that: more than 4500 pages of classified documents, including US nerve gas formulas, were passed to the USSR in exchange for hundreds of thousands of dollars; an Armageddon code: a telephone call to a number in NYC, was to alert the sleeper spy to an impending nuclear attack--a warning he would transmit to the Soviets by radio signal from atop a rock in Central Park; two FBI agents were killed when their plane crashed during surveillance of one of the spies as he headed for the Canadian border; secret drops for microdots were set up by Moscow from NY to Florida to DC. More than a cloak-&-dagger tale, Cassidy's Run is the story of one ordinary man, Sergeant Joe Cassidy, not trained as a spy, who suddenly found himself the FBI's secret weapon in a dangerous clandestine war.

The C# Player's Guide


R.B. Whitaker - 2012
    

The Cuban Missile Crisis: A History From Beginning to End


Hourly History - 2018
     The Cold War between the United States of America and the Soviet Union lasted for more than 40 years. In general, this was a war of spies and subterfuge, of covert action and espionage. There was always a danger, however, that an error of judgment on either side could suddenly cause the Cold War to turn red-hot with an exchange of nuclear weapons. On many occasions, tensions between the countries increased, but the prospect of all-out nuclear war between America and Russia was never closer than during a two-week period in October of 1962. In response to the placement of American nuclear missiles in Turkey, Soviet leader Nikita Khrushchev secretly ordered the transport of Russian nuclear missiles to the island of Cuba in the Caribbean. These were capable of reaching and destroying almost all American cities in a matter of minutes. When this was discovered, the U.S. administration under President John F. Kennedy decided that the threat had to be removed, even if this meant risking war with Russia. The Americans set up a blockade of the island and considered air strikes and even a full-scale invasion of Cuba. Forty thousand heavily armed Russian and Cuban troops supported by tanks, aircraft, and even tactical nuclear weapons stood by to do anything required to repel an American attack. Inside you will read about... ✓ From World War to Cold War ✓ Mutually Assured Destruction ✓ Revolution in Cuba ✓ The Missile Gap ✓ American Build-up and Provocation ✓ Russian Missiles Arrive in Cuba ✓ Kennedy Speaks to America And much more! It was clear that the United States refused to accept the presence of Russian nuclear missiles less than one hundred miles from the coast of Florida. It was equally clear that Russia was determined not to remove the missiles and desert its Cuban ally. An armed confrontation between the two superpowers appeared inevitable, and there seemed a very strong possibility that the world was on the brink of full-scale nuclear war.

Marketplace 3.0: Rewriting the Rules of Borderless Business


Hiroshi Mikitani - 2013
    And that evolution has huge implications for everything we see, buy and do online. Rejecting the zero-sum, vending-machine model of ecommerce practiced by other leading internet retailers, who view the Internet purely as a facilitator of speed and profit, Hiroshi Mikitani argues for an alternate model that benefits merchants, consumers, and communities alike by empowering players at every step in the process. He envisions retail "ecosystems," where small and mid-sized brick-and-mortar businesses around the world partner with online marketplaces to maximize their customer bases and service capabilities, and he shows why emphasizing collaboration over competition, customization over top-down control, and long-term growth over short-term revenue is by far the best use of the Internet's power, and will define the 3.0 era.Rakuten has already pioneered this new model, and Marketplace 3.0 offers colorful examples of its success in Japan and around the world. Mikitani reveals how the company enforces a global mindset (including the requirement that all its employees speak English, even in Tokyo); how it incorporates new acquisitions rather than seeking to completely remake or sell them for a quick profit; and how it competes with other retailers on speed and quality, without sacrificing the public good. Marketplace 3.0 is an exciting new vision for global commerce, from a company that's challenging all the accepted wisdom.

Murach's HTML5 and CSS3: Training and Reference


Zak Ruvalcaba - 2011
    This title also teaches you how to use the HTML5 and CSS3 features alongside the earlier standards.

Beginning iPhone 3 Development: Exploring the iPhone SDK


Dave Mark - 2009
    Updated and revised for iPhone SDK 3, many of the discussions in the original book have been clarified to make some of the more complex topics easier to understand. In addition, all of the projects have been rebuilt from scratch using the SDK 3 templates.Assuming only a minimal working knowledge of Objective-C, and written in a friendly, easy-to-follow style, this book offers a complete soup-to-nuts course in iPhone and iPod touch programming. The book starts with the basics, walking you through the process of downloading and installing Apple's free iPhone SDK, and then stepping you though the creation of your first simple iPhone application. From there, you'll learn to integrate all the interface elements iPhone users have come to know and love, such as buttons, switches, pickers, toolbars, and sliders. You'll master a variety of design patterns, from the simplest single view to complex hierarchical drill-downs. The confusing art of table building will be demystified, and you'll see how to save your data using the iPhone file system. You'll also learn how to save and retrieve your data using SQLite, iPhone's built-in database management system. In addition, you'll also learn about Core Data, an important persistence mechanism that has just been added with SDK 3.And there's much more! You'll learn to draw using Quartz 2D and OpenGL ES, add multitouch gestural support (pinches and swipes) to your applications, and work with the camera, photo library, accelerometer, and built-in GPS. You'll discover the fine points of application preferences and learn how to localize your apps for multiple languages. You can discover more about this book, download source code, and find support forums at the book's companion site, at www.iphonedevbook.com.The iPhone 3 update to the best-selling and most recommended book for iPhone developers Packed full of tricks, techniques, and enthusiasm for the new SDK from a developer perspective The most complete, useful, and up-to-date guide to all things having to do with Apple's iPhone SDK

Eleventh Hour CISSP®: Study Guide


Eric Conrad - 2016
    This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam. Completely updated for the most current version of the exam’s Common Body of Knowledge Provides the only guide you need for last-minute studying Answers the toughest questions and highlights core topics Streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time

Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)


James Smith - 2016
    Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

The Art and Science of Java


Eric S. Roberts - 2007
    By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.

Computer Science: A Structured Approach Using C++


Behrouz A. Forouzan - 1999
    Every complete program uses a consistent style, and as programs are analyzed, styles and standards are further explained. Whenever possible, the authors develop the principle of a subject before they introduce the language implementation so the student understands the concept before dealing with the nuances of C++. In addition, a vast array of figures and tables visually reinforce key concepts. By integrating software engineering principles and encouraging the student to resist the temptation to immediately code, the text builds a solid foundation in problem solving.

Growing Rails Applications in Practice


Henning Koch - 2014
    

Programmable Logic Controllers


Frank D. Petruzella - 1989
    It's not intended to replace manufacturer's or user's manuals, but rather complements and expands on the information contained in these materials. All topics are covered in small segments. Students systematically carry out a wide range of generic programming exercises and assignments. All of the information about PLCs has been updated.

Schaum's Outline of Theory and Problems of Data Structures


Seymour Lipschutz - 1986
    This guide, which can be used with any text or can stand alone, contains at the beginning of each chapter a list of key definitions, a summary of major concepts, step by step solutions to dozens of problems, and additional practice problems.

Nelson DeMille Collection: Plum Island/Charm School/Word of Honor


Nelson DeMille - 2006
    PLUM ISLAND: NYPD homicide detective John Corey is stuck in the Long Island farmer's town of Southold. When a big-time murder hits the small town, it's up to Corey to bring his big-city experience into the game. His investigation leads him into the lore, legends and ancient secrets of Long Island and become part of the thriller spun by DeMille at his thrill-inducing best. CHARM SCHOOL: when an unsuspecting American tourist stumbles upon the secrets held within the walls of Mrs. Ivanova's Charm School, where young KGB agents-in-training are being taught how to infiltrate the United States without being detected, he unwittingly uncovers a chilling story of cold war espionage. WORD OF HONOR: Ben Tyson and his fellow militants committed a murderous atrocity in Vietnam. Years later, Tyson has done everything in his power to forget it. Now the events are catching up to him, forcing his entire life to hang in the balance.