Lucky's Marines: The Complete Series


Joshua James - 2020
    

Africa Lost: Rhodesia's COIN Killing Machine (SOFREP)


Dan Tharp - 2013
    Everyone knows about Navy SEALs and Green Berets but nobody knows about the deep recce, sabotage, and direct action missions conducted by the Rhodesian SAS. The Rhodesian Light Infantry was a killing machine, participating in combat jumps every night during the heat of the Bush War. The Selous Scouts were perhaps the most innovative and daring unconventional warfare unit in history which would pair white soldiers with turncoat black “former” terrorists who would then infiltrate enemy camps.US military veteran and historian Dan Tharp covers each of these three units in depth.(18,000 words)

THE CRASH OF MH370


James Nixon - 2017
     The Crash Of MH370 may well be one those ground breaking accidents that change our way of thinking. This book is an analysis of the mystery that is the missing Malaysian Airlines 777, and one of the first to be published after the search concluded. Unlike previous books about the ghost plane written by well-meaning amateur pilots and journalists, the author is an industry insider; an A380 captain with similar experience to the missing pilot. It examines the facts, who’s who, the flight and search. The latter half dispels the various theories, provides the author’s best guess as to what happened and delivers a list of thirteen urgent recommendations for the industry. Rarely do we hear from people within this industry. From pilots and air traffic controllers to crash investigators, their employment contracts stipulate: no media. That James Nixon has chosen to publish this book within three months of his retirement means we are given a rare chance to peek behind the cockpit door.

The Digital Invasion: How Technology Is Shaping You And Your Relationships


Archibald D. Hart - 2013
    Digital natives are those born after the advent of the internet. They are comfortable with swift technological change and take the presence of technology in their lives almost completely for granted. They have "digital DNA" flowing through their bodies. On the other hand, digital immigrants are those born before the advent of the internet. Their comfort level with our technology-soaked world is more variable. But they are affected by the digital invasion just as much as their native children.With the latest research supporting them, Dr. Archibald Hart and Dr. Sylvia Hart Frejd uncover both the subtle and the dramatic ways digital technology is changing us from within, focusing their exposE on the impact on the spiritual life of individuals. Through insights from neuroscience and psychology, they offer readers therapeutic and biblical strategies for handling the digital invasion in order to become good stewards of their digital lives. Parents, educators, students, counselors, and pastors will especially appreciate this cultural wake-up call.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

Microsoft SQL Server 2012: T-SQL Fundamentals


Itzik Ben-Gan - 2012
    Led by a SQL Server expert, you’ll learn the concepts behind T-SQL querying and programming, and then apply your knowledge with exercises in each chapter. Once you understand the logic behind T-SQL, you’ll quickly learn how to write effective code—whether you’re a programmer or database administrator.Discover how to:Work with programming practices unique to T-SQLCreate database tables and define data integrityQuery multiple tables using joins and subqueriesSimplify code and improve maintainability with table expressionsImplement insert, update, delete, and merge data modification strategiesTackle advanced techniques such as window functions, pivoting and grouping setsControl data consistency using isolation levels, and mitigate deadlocks and blockingTake T-SQL to the next level with programmable objects

A Soldier Finds His Way


Irene Onorato - 2016
    Emotionally scarred from a painful childhood, he’s built a wall around his heart that he lets very few penetrate.Audra Lorenzo, a first-year school teacher, is on a road trip with her niece during the holidays. A storm that was supposed to pass, instead crosses her path. Lost, with her GPS cutting in and out, her car skids off a road, down an embankment, and into an icy river. Everything goes black.Regaining consciousness in a remote cabin, Audra finds she and her niece were saved by Edward, a soldier who’d put his life in danger to rescue them. Harsh and unfriendly at first, the lieutenant’s demeanor frightens her. As days go by, small kindnesses shine through chinks in his armor and her heart is drawn to his. But does he feel the same? Can this scarred and guarded man find it in him to share the same love for her?

Fringe Theory: An Espionage Thriller of the Cold War and World War 2


Chuck Driskell - 2018
    2018** The Bombing of Pearl Harbor and the Assassination of United States President John F. Kennedy were among the most stunning moments of the 20th Century. Imagine that there was evidence proving the United States, at its highest levels, knew the intent of both events--ahead of time.On the heels of his most successful novel, Final Mission: Zion, in which he tackled the horrors of the Holocaust, Chuck Driskell now takes on Pearl Harbor and the JFK Assassination as only he can, with a decidedly unexpected twist.Enter Max Warfield, a man who supports himself by raiding heroin dealers for their cash. Max's crimes make him the target of a shadowy network. The network takes him by force and gives him a choice: steal the aforementioned evidence for them, or die. While the network has accounted for every single facet of the mission, they've made one critical error: they've grossly underestimated Max Warfield.Once again on the run, and this time in possession of history-altering evidence, Max finds himself in a position to turn the tables on the network. But, by doing so he could decimate the United States and cause significant loss of life.Combining historical fiction, espionage, crime, and intrigue--with a memorable cast of characters--Fringe Theory delivers thrills and chills all the way to its explosive climax in the snowy French Alps.

Boone's Crew: A Mafia Romance Box Set


Sofia Westlake - 2019
    Not just any man, but a naked man with severe injuries all over her body. She should have driven on, should have left him there. But how could she leave a man to die that way? She took him home, aware that it could be the biggest mistake she’d ever made. She was already on the run, already trying to live as much off the grid as possible. What was she going to do with an injured man? What if he died in her bed? What would she do then? Teaching Lincoln Janet Spence—Summer—is the daughter of the local district attorney who plays at being a thief, doing all she can to humiliate her mother. That is until she gets caught by a local football hero who kidnaps her and plans a dark sort of revenge. Just her luck that Lincoln happens to choose that day to break into the football star’s house and recover items that will just pay off his gambling debts to the Gabbana family. Lincoln shows no interest in the tied up girl at first, but when he learns who she really is, how could he resist collecting this bit of leverage against a district attorney who ran on the campaign promise that she would rid Tampa of Lincoln and his faction of criminals? Cason's Girl Cason Durst was once carefree and popular, the kind of college kid who thinks he knows everything. And then he was arrested and met Lincoln Steele. Lincoln saved him, fixed his problems, and offered him a job. Now Cason keeps to himself, learning all he can from the men who formed Boone’s crew. He’s learned that making friends, falling in love, all those things he once took for granted, are dangerous to him now. He’s learned to keep to himself. In fact, he’s become kind of awkward. Shy, even. Therefore, he’s the last one anyone could have expected Lincoln to send out on a mission to romance a pretty girl. Let It Raine Kara Tripp walks into Jett’s office one afternoon, begging him to forgive the debt of her lover, Harry. She’s willing to do anything, a fact that’s underscored when she begins to undress right there in his office. Jett has had a lot of offers over the years, and he’s never had the patience for it. But when he hears that Kara just happens to be a therapist who works with autistic children, he can’t pass up the opportunity to see if her skills can help improve Raine’s behavior. Jett and Kara make a deal in which she goes to work for him and Raine for six months, and he will forgive Harry’s debt. And it works, for four months, it works perfectly. But then a mole pops up in Boone’s Crew, and Jett finds himself questioning everything, and everyone, around him. Boone's End Titus betrayed his crew. In his world, betrayal was a crime punishable by death. He has two choices: embrace the very enemy that threatens to rip his world apart, or turn himself in to the very men who would like nothing more than to put a bullet in his brain. It’s not a simple choice. Titus has to decide where his loyalties really lay, and figure out who he can trust before it’s too late and an innocent pays for his mistakes. Jude Volz lost her brother to violence, and her father went to jail when she needed him the most. Determined to make someone pay, she trusted the wrong man, and now she’s caught up in something she can’t control. Locked in a car with a traitor, she has no choice but to trust Titus, to open up to him, and hope that together they can find a way out of an impossible situation. But now they’re running not just from his crew, but from hers as well.

Windows Powershell in Action


Bruce Payette - 2007
    In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators of PowerShell, Windows PowerShell in Action shows you how to build scripts and utilities to automate system tasks or create powerful system management tools to handle the day-to-day tasks that drive a Windows administrator's life. Because it's based on the .NET platform, PowerShell is also a powerful tool for developers and power users.Windows PowerShell in Action was written by Bruce Payette, one of the founding members of the Windows PowerShell team, co-designer of the PowerShell language and the principal author of the PowerShell language implementation. The book enables you to get the most out of the PowerShell environment. Using many examples, both small and large, this book illustrates the features of the language and environment and shows how to compose those features into solutions, quickly and effectively.This book is designed for anyone who wants to learn PowerShell and use it well. Rather than simply being a book of recipes to read and apply, this book gives you the deep knowledge about how PowerShell works and how to apply it.

Getting Started with SQL: A Hands-On Approach for Beginners


Thomas Nield - 2016
    If you're a business or IT professional, this short hands-on guide teaches you how to pull and transform data with SQL in significant ways. You will quickly master the fundamentals of SQL and learn how to create your own databases.Author Thomas Nield provides exercises throughout the book to help you practice your newfound SQL skills at home, without having to use a database server environment. Not only will you learn how to use key SQL statements to find and manipulate your data, but you'll also discover how to efficiently design and manage databases to meet your needs.You'll also learn how to:Explore relational databases, including lightweight and centralized modelsUse SQLite and SQLiteStudio to create lightweight databases in minutesQuery and transform data in meaningful ways by using SELECT, WHERE, GROUP BY, and ORDER BYJoin tables to get a more complete view of your business dataBuild your own tables and centralized databases by using normalized design principlesManage data by learning how to INSERT, DELETE, and UPDATE records

Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World--Told from the Inside by the Man Who Ran It


Ken Alibek - 1999
    Smallpox. Incurable and horrifying Ebola-related fevers. For two decades, while a fearful world prepared for nuclear winter, an elite team of Russian bioweaponeers began to till a new killing field: a bleak tract sown with powerful seeds of mass destruction—by doctors who had committed themselves to creating a biological Armageddon. Biohazard is the never-before-told story of Russia’s darkest, deadliest, and most closely guarded Cold War secret.   No one knows more about Russia’s astounding experiments with biowarfare than Ken Alibek. Now the mastermind behind Russia’s germ warfare effort reveals two decades of shocking breakthroughs . . . how Moscow’s leading scientists actually reengineered hazardous microbes to make them even more virulent . . . the secrets behind the discovery of an invisible, untraceable new class of biological agents just right for use in political assassinations . . . the startling story behind Russia’s attempt to turn a sample of the AIDS virus into the ultimate bioweapon. And in a chilling work of real-world intrigue, Biohazard offers us all a rare glimpse into a shadowy scientific underworld where doctors manufacture mass destruction, where witnesses to errors are silenced forever, and where ground zero is closer than we ever dared believe.

The Internet of Garbage


Sarah Jeong - 2015
    The Internet of Garbage considers why and how to recalibrate this ongoing project of garbage-removal from content platforms and social media networks. It’s not as simple as policing offensive material and hitting the delete button online: Jeong tackles precarious issues like free speech, behavior vs. content, doxing and SPAM.She writes, “Content platforms and social media networks do not have the power to restrain stalkers, end intimate partner violence, eliminate child abuse, or stop street harassment. But they can cultivate better interactions and better discourse, through thoughtful architecture, active moderation and community management.”So how do we filter content from garbage? Read on.Sarah Jeong writes about technology, policy and law with bylines at Forbes, The Verge, The Guardian, Slate and WIRED.

Two Scoops of Django 1.11: Best Practices for the Django Web Framework


Daniel Roy Greenfeld - 2017
    We have put thousands of hours into the fourth edition of the book, writing and revising its material to include significant improvements and new material based on feedback from previous editions.