DEFCON-2

DEFCON-2

Author: Norman Polmar

Publisher: Turner Publishing Company

Published: 2006-01-01

Total Pages: 254

ISBN-13: 1620459612

DOWNLOAD EBOOK

The closest we've ever come to the end of the world "DEFCON-2 is the best single volume on the Cuban Missile Crisis published and is an important contribution to the history of the Cold War. Beyond the military and political facts of the crisis, Polmar and Gresham sketch the personalities that created and coped with the crisis. They also show us how close we came to the edge without becoming sensationalistic."—Larry Bond, bestselling author of Dangerous Ground Spy-satellite and aerial-reconnaissance photos reveal that one of the United States's bitterest enemies may be acquiring weapons of mass destruction and the means to use them against the American homeland. Administration officials refuse to accept intelligence professionals' interpretation of these images and order an end to spy missions over the offending nation. More than a month later, after vicious infighting, the president orders the spy missions to resume. The new photos reveal an array of ballistic missiles, capable of carrying nuclear warheads and striking deep within U.S. territory. It appears that the missiles will be fully operational within one week. This is not a plot setup for a suspense novel; it is the true story of the most terrifying moment in the 45-year Cold War between the United States and the Soviet Union: the Cuban Missile Crisis. DEFCON-2 tells this tale as it has never been told before—from both sides, with the help of hundreds of recently declassified U.S. and Soviet documents, as well as interviews with numerous former spies, military figures, and government officials who speak out here for the first time.


Defcon 4 Korea: Land of the Morning Calm

Defcon 4 Korea: Land of the Morning Calm

Author: Mark Heathco

Publisher: Lulu.com

Published: 2015-06-15

Total Pages: 70

ISBN-13: 148343205X

DOWNLOAD EBOOK

Although a cease-fire agreement was signed on July 27, 1953, Korea has never been a place of peace. Missions to the Korean demilitarized zone continue, even in the year 1985. The DMZ was created as a strip of land between North and South Korea to act as a buffer, but even the best intentions can sometimes fail. Word quickly spreads: North Koreans are moving toward the DMZ in an all-out combative push. From the south, the Republic of Korea Army-along with American forces-plan to meet them. All involved must tread carefully or threaten the outbreak of a second Korean War. The men and women of Second Division know this, and they have seventy-two hours to ensure peace.


DEFCON One

DEFCON One

Author: Joe Weber

Publisher: Ignition Books®

Published: 2012-07-01

Total Pages: 432

ISBN-13: 1937868095

DOWNLOAD EBOOK

From the acclaimed thriller writer, Joe Weber, comes a chilling novel of the Cold War. The United States and Soviet Union are at the brink of war. Fearful of U.S. plans for an anti-missile defense system that could defeat a USSR first strike, the Soviet General Secretary, the conservative successor to Gorbachev, conceives a plan to act first. Russian Bear bombers violate U.S. airspace, leading to a response by American F-15s. A U.S. Navy battle group is attacked in the North Atlantic. And in orbit, a Soviet hunter killer satellite attacks an American space shuttle. As the world careens towards a nuclear conflict, only a lone CIA operative stands between peace and utter destruction. But can he act in time? Vividly portraying the real world of military hardware and combining it with page-turning action, DEFCON One is the definition of a classic thriller.


Scam Me If You Can

Scam Me If You Can

Author: Frank Abagnale

Publisher: Penguin

Published: 2019-08-27

Total Pages: 353

ISBN-13: 0525538976

DOWNLOAD EBOOK

Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to stop scammers in their tracks. Maybe you're wondering how to make the scam phone calls stop. Perhaps someone has stolen your credit card number. Or you've been a victim of identity theft. Even if you haven't yet been the target of a crime, con artists are always out there, waiting for the right moment to steal your information, your money, and your life. As one of the world's most respected authorities on the subjects of fraud, forgery, and cyber security, Frank Abagnale knows how scammers work. In Scam Me If You Can, he reveals the latest tricks that today's scammers, hackers, and con artists use to steal your money and personal information--often online and over the phone. Using plain language and vivid examples, Abagnale reveals hundreds of tips, including: The best way to protect your phone from being hacked The only time you should ever use a debit card The one type of photo you should never post on social media The only conditions under which you should use WiFi networks at the airport The safest way to use an ATM With his simple but counterintuitive rules, Abagnale also makes use of his insider intel to paint a picture of cybercrimes that haven't become widespread yet.


Wars to Peace

Wars to Peace

Author: Cinthia Hiett

Publisher: Balboa Press

Published: 2022-09-15

Total Pages: 336

ISBN-13:

DOWNLOAD EBOOK

Wars to Peace will teach you to talk to anyone, anywhere, without losing your cool. This “human manual” explores relationships in-depth and teaches you how to de-escalate conflict, improve communication skills and create peace in your life. Cinthia relates to the way we perceive and react to threats using a DEFCON analogy that categorizes both healthy and unhealthy types of conflict. You’ll learn how to: • Be aware of your emotions and choose your reaction in any situation • Set healthy boundaries • Improve communication, reduce friction and create positive outcomes in your relationships This book is a brilliant tool for helping you feel calmer and more in control of your emotions, whether you’re talking with someone close to you or someone you just met.


Apocalypse Movies

Apocalypse Movies

Author: Kim Newman

Publisher: St Martins Press

Published: 2000

Total Pages: 272

ISBN-13: 9780312253691

DOWNLOAD EBOOK

From the giant ants of "Them!" to the Martians of "War of the Worlds", the asteroids of "Armageddon" and Dr. Strangelove's beloved bomb (Hi there!), the end of the world has been a mainstay of the movies.Kim Newman provides the ultimate look at 20th-century paranoid cinema. Examining our obsessions with Doomsday, Newman ranges from the patriotism of World War II through the frightened '50s and the anti-nuke films of the '60s and '70s, right up to the Bomb's role in recent blockbusters. Such diverse films as "Deep Impact", "The War Game", "Teenage Caveman",and "Independence Day" are covered with wit and insight.


Rootkits and Bootkits

Rootkits and Bootkits

Author: Alex Matrosov

Publisher: No Starch Press

Published: 2019-05-07

Total Pages: 449

ISBN-13: 1593278837

DOWNLOAD EBOOK

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, you’ll learn: • How Windows boots—including 32-bit, 64-bit, and UEFI mode—and where to find vulnerabilities • The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard • Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi • How to perform static and dynamic analysis using emulation and tools like Bochs and IDA Pro • How to better understand the delivery stage of threats against BIOS and UEFI firmware in order to create detection capabilities • How to use virtualization tools like VMware Workstation to reverse engineer bootkits and the Intel Chipsec tool to dig into forensic analysis Cybercrime syndicates and malicious actors will continue to write ever more persistent and covert attacks, but the game is not lost. Explore the cutting edge of malware analysis with Rootkits and Bootkits. Covers boot processes for Windows 32-bit and 64-bit operating systems.


Code of Federal Regulations

Code of Federal Regulations

Author:

Publisher:

Published: 1975

Total Pages: 814

ISBN-13:

DOWNLOAD EBOOK

Special edition of the Federal Register, containing a codification of documents of general applicability and future effect ... with ancillaries.