Tomcat Fury: A Combat History of the F-14


Mike Guardia - 2019
    From its harrowing combat missions over Libya to its appearance on the silver screen in movies like Top Gun and Executive Decision, the F-14 has become an icon of American air power.Now, for the first time in a single volume, Tomcat Fury explores the illustrious combat history of the F-14, from the Gulf of Sidra to the Iran-Iraq War to the skies over Afghanistan in the Global War on Terror.

If Then: How the Simulmatics Corporation Invented the Future


Jill Lepore - 2020
    Jill Lepore, best-selling author of These Truths, came across the company’s papers in MIT’s archives and set out to tell this forgotten history, the long-lost backstory to the methods, and the arrogance, of Silicon Valley.Founded in 1959 by some of the nation’s leading social scientists—“the best and the brightest, fatally brilliant, Icaruses with wings of feathers and wax, flying to the sun”—Simulmatics proposed to predict and manipulate the future by way of the computer simulation of human behavior. In summers, with their wives and children in tow, the company’s scientists met on the beach in Long Island under a geodesic, honeycombed dome, where they built a “People Machine” that aimed to model everything from buying a dishwasher to counterinsurgency to casting a vote. Deploying their “People Machine” from New York, Washington, Cambridge, and even Saigon, Simulmatics’ clients included the John F. Kennedy presidential campaign, the New York Times, the Department of Defense, and dozens of major manufacturers: Simulmatics had a hand in everything from political races to the Vietnam War to the Johnson administration’s ill-fated attempt to predict race riots. The company’s collapse was almost as rapid as its ascent, a collapse that involved failed marriages, a suspicious death, and bankruptcy. Exposed for false claims, and even accused of war crimes, it closed its doors in 1970 and all but vanished. Until Lepore came across the records of its remains.The scientists of Simulmatics believed they had invented “the A-bomb of the social sciences.” They did not predict that it would take decades to detonate, like a long-buried grenade. But, in the early years of the twenty-first century, that bomb did detonate, creating a world in which corporations collect data and model behavior and target messages about the most ordinary of decisions, leaving people all over the world, long before the global pandemic, crushed by feelings of helplessness. This history has a past; If Then is its cautionary tale.

Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union


Stephen Budiansky - 2016
    The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.

War Paint


Bill Goshen - 2001
    Their base was Lai Khe, within hailing distance of the Vietcong central headquarters, a mile inside Cambodia, with its vast stockpiles of weapons and thousands of transient VC and NVA soldiers.Recondo-qualified Bill Goshen was there, and has written the first account of these battle-hardened soldiers. As the eyes and ears of the Big Red One, the 1st Infantry, these hunter/killer teams of only six men instered deep inside enemy territory had to survive by their wits, or suffer the deadly consequences. Goshen himself barely escaped with his life in a virtual suicide mission that destroyed half his team.His gripping narrative recaptures the raw courage and sacrifice of American soldiers fighting a savage war of survival: men of all colors, from all walks of life, warriors bonded by triumph and tragedy, by life and death. They served proudly in Vietnam, and their stories need to be told.From the Paperback edition.

Jet Age Man: SAC B-47 and B-52 Operations in the Early Cold War


Earl J. McGill - 2011
    To some, nuclear deterrence appeared as utter madness, and was in fact commonly referred to as M.A.D. The concept of Mutually Assured Destruction provoked protests and marches, and the architect of M.A.D, General Curtis LeMay, became a symbol of madness himself.

Comptia A+ 220-801 and 220-802 Exam Cram


David L. Prowse - 2012
     Limited Time Offer: Buy CompTIA(R) A+ 220-801 and 220-802 Exam Cram and receive a 10% off discount code for the CompTIA A+ 220-801 and 220-802 exams. To receive your 10% off discount code:Register your product at pearsonITcertification.com/registerFollow the instructionsGo to your Account page and click on "Access Bonus Content" CompTIA(R) A+ 220-801 and 220-802 Exam Cram, Sixth Edition is the perfect study guide to help you pass CompTIA's A+ 220-801 and 220-802 exams. It provides coverage and practice questions for every exam topic, including substantial new coverage of Windows 7, new PC hardware, tablets, smartphones, and professional-level networking and security. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last minute review. Covers the critical information you'll need to know to score higher on your CompTIA A+ 220-801 and 220-802 exams!Deploy and administer desktops and notebooks running Windows 7, Vista, or XPUnderstand, install, and troubleshoot motherboards, processors, and memoryTest and troubleshoot power-related problemsUse all forms of storage, including new Blu-ray and Solid State (SSD) devicesWork effectively with mobile devices, including tablets and smartphonesInstall, configure, and troubleshoot both visible and internal laptop componentsConfigure Windows components and applications, use Windows administrative tools, and optimize Windows systemsRepair damaged Windows environments and boot errorsWork with audio and video subsystems, I/O devices, and the newest peripheralsInstall and manage both local and network printersConfigure IPv4 and understand TCP/IP protocols and IPv6 changesInstall and configure SOHO wired/wireless networks and troubleshoot connectivityImplement secure authentication, prevent malware attacks, and protect data Companion CDThe companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Pearson IT Certifcation Practice Test Minimum System RequirementsWindows XP (SP3), WIndows Vista (SP2), or Windows 7Microsoft .NET Framework 4.0 ClientPentium-class 1 GHz processor (or equivalent)512 MB RAM650 MB disk space plus 50 MB for each downloaded practice exam David L. Prowse is an author, computer network specialist, and technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide. As a consultant, he installs and secures the latest in computer and networking technology. He runs the website www.davidlprowse.com, where he gladly answers questions from students and readers.

Stasi Vice


Max Hertzberg - 2018
    But when a senior officer has a messy affair, it falls to Reim to do the clearing up. It should be a straightforward job. Lean on a few people to get them to shut up. Intimidate neighbours, bribe officials and appeal to the socialist conscience of Party members. But when Reim starts his interrogations, he realises his boss is hiding more than just a lover. Lieutenant Reim begins to investigate his superior—and what he uncovers puts his own life at risk. Cracking DDR crime from the author of the East Berlin Series

Mastering VMware vSphere 4


Scott Lowe - 2009
    Coverage Includes: Shows administrators how to use VMware to realize significant savings in hardware costs while still providing adequate "servers" for their users Demonstrates how to partition a physical server into several virtual machines, reducing the overall server footprint within the operations center Explains how VMware subsumes a network to centralize and simplify its management, thus alleviating the effects of "virtual server sprawl" Now that virtualization is a key cost-saving strategy, Mastering VMware vSphere 4 is the strategic guide you need to maximize the opportunities.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

Mekong Mud Dogs: Story of: Sgt. Ed Eaton


Ed Eaton - 2014
    and Sniper with the River Raiders of the Mekong. His stories include the one which garnered him a recommendation for the Medal of Honor.

On Her Majesty's Nuclear Service


Eric Thompson - 2018
    History shows that they succeeded; the Cold War ended peacefully, but for security reasons, only now can this story be told.Eric Thompson is a career nuclear submarine officer who served from the first days of the Polaris missile boats until after the end of the Cold War. He joined the Navy in the last days of Empire, made his first sorties in World War II type submarines and ended up as the top engineer in charge of the Navy's nuclear power plants. Along the way, he helped develop all manner of kit, from guided torpedoes to the Trident ballistic missile system. In this vivid personal account of his submarine operations, he reveals what it was like to literally have your finger on the nuclear button.In his journey, the author leads the reader through top-secret submarine patrols, hush-hush scientific trials, underwater weapon developments, public relations battles with nuclear protesters, arm-wrestling with politicians, and the changing roles of women and homosexuals in the Navy. It is essentially a human story, rich in both drama and comedy, like the Russian spy trawler that played dance music at passing submarines. There was never a dull moment.Behind the lighter moments was a deadly serious game. This, the inside story of Britain's nuclear deterrent, reveals the secretive life of submarines and the men who served on them; they kept their watch, and by maintaining the threat of 'Mutually Assured Destruction, ' helped keep Britain and the world safe.

Black Cat 2-1: The True Story of a Vietnam Helicopter Pilot and His Crew


Bob Ford - 2015
    Black Cat 2-1 is the story of one pilot who made it home and the valiant men he served with who risked their lives for the troops on the ground. Bob Ford invites readers into the Huey helicopters he flew on more than 1,000 missions when he and his men dared to protect and rescue. For those whose voices were silenced in that faraway place or who have never told their stories, he creates a tribute that reads like a thriller, captures the humor of men at war, and resounds with respect for those who served with honor.

Hook, Line, and Sinker


Len Deighton - 1992
    But not even that discovery will help if the Department itself wants his blood....SPY LINEBritish agent Bernard Samson finds himself inexplicably hunted as a traitor, forced to abandon his life, his job, his position, and plunge into hiding in the most dangerous and darkest corner of Berlin. What is happening? What has he done? Nothing makes sense until Samson discovers that the Secret Service has known all along where he is. In fact, they have never taken him off the payroll. And now they are prepared to return his freedom and good name � but there are strings attached, strings that begin to tighten around his neck even before his plane lands in Vienna . . . SPY SINKERBritish agent Bernard Samson's family and career are about to be betrayed and crushed by his wife - lovely, brilliant Fiona Samson.

The Beria Papers


Alan Williams - 1973
    He was Stalin’s closest henchman. At one time he had a million armed men under his direct personal command. He was a sadist and a mass murderer. And he was also a vicious rapist with a compulsive appetite for young girls. This is possible: Beria may have kept a private diary in which he lovingly recorded his sexual activities, his murders, various scandals involving men now highly placed in the Soviet hierarchy — and the true facts of Stalin’s death. This is certain: The publication of Beria’s diary would cause the greatest political scandal the world has ever known — and set off a deadly manhunt for those responsible for its release … The private diaries of Beria — Stalin’s notorious chief of secret police — are a lurid, shattering indictment of Russian political methods and contain a new account of what really happened at Stalin’s death. They confirm Beria as one of the greatest human monsters of our time, both in his personal life and in his political manipulations of top Soviet politicians, some of whom are in power today. The Beria Papers are sold to an American publisher for three million dollars. On publication they are an immediate, sensational bestseller. They cause panic in Moscow and outrage everywhere — even in the upper echelons of the U.S. government, where there is fear that such revelations will create a dangerous precedent in smear campaigns against world leaders. So the world’s two most powerful secret services — the Soviet KGB and the American CIA — are ordered to track down the book’s origin. Their investigations range from New York to Washington, to London, Moscow, Munich, Budapest, Vienna and finally to a small island in the Indian Ocean where the activities of the two secret agencies come horrifically together. But can The Beria Papers possibly be a hoax? Praise for The Beria Papers: ‘Intriguing and gripping … compulsively exciting’ - Sunday Express ‘Both exciting and really convincing … fascinating. Part adventure, part thriller, part a documentary of might-have-been history, The Beria Papers is the best thing of its kind for a long time.’ - Sunday Times ‘The most interesting and original thriller since The Odessa File … a sharp and intelligent thriller that cries out for filming.’ - Daily Mail ‘Intriguing and gripping … not merely compulsively exciting entertainment, it is also so well researched and the background appears so absolutely authentic that the whole fantastic story could just be true.’ - Sunday Express Alan Emlyn Williams(born 1935) is an ex-foreign correspondent, novelist and writer of thrillers. He was educated at Stowe, Grenoble and Heidelberg Universities, and at King's College, Cambridge where he graduated in 1957 with a B.A. in modern languages. His father was the actor and writer Emlyn Williams.

Digital Apollo: Human and Machine in Spaceflight


David A. Mindell - 2008
    Neil Armstrong responded by switching off the automatic mode and taking direct control. He stopped monitoring the computer and began flying the spacecraft, relying on skill to land it and earning praise for a triumph of human over machine. In Digital Apollo, engineer-historian David Mindell takes this famous moment as a starting point for an exploration of the relationship between humans and computers in the Apollo program. In each of the six Apollo landings, the astronaut in command seized control from the computer and landed with his hand on the stick. Mindell recounts the story of astronauts' desire to control their spacecraft in parallel with the history of the Apollo Guidance Computer. From the early days of aviation through the birth of spaceflight, test pilots and astronauts sought to be more than "spam in a can" despite the automatic controls, digital computers, and software developed by engineers.Digital Apollo examines the design and execution of each of the six Apollo moon landings, drawing on transcripts and data telemetry from the flights, astronaut interviews, and NASA's extensive archives. Mindell's exploration of how human pilots and automated systems worked together to achieve the ultimate in flight -- a lunar landing -- traces and reframes the debate over the future of humans and automation in space. The results have implications for any venture in which human roles seem threatened by automated systems, whether it is the work at our desktops or the future of exploration.