The Crimson Code

The Crimson Code

Author: Rachel Lee

Publisher: MIRA

Published: 2010-11-15

Total Pages: 362

ISBN-13: 142688365X

DOWNLOAD EBOOK

DECEMBER 25: A BOMB RIPS THROUGH A PACKED CATHEDRAL IN JAKARTA. As the hours pass, terrorist explosions continue around the globe, triggering worldwide panic and creating a nightmare beyond words…. Inside the covert agency known only as Office 119, agents Renate Bächle and Lawton Caine are called upon to identify the groups responsible for the bloodshed. But the so-called "Black Christmas" attacks are nothing more than a smoke screen for a far more sinister conspiracy. At its heart are ruthless secret societies with blood ties that date back thousands of years, whose goals are nothing less than global domination. Renate and Lawton are only beginning to fathom how far the darkness extends. With the U. S. president set to deploy nuclear weapons against the wrong targets and religious violence erupting across Europe, they must untangle the interwoven plots before time runs out and Armageddon becomes a terrifying reality.


The Crimson Ecliptic

The Crimson Ecliptic

Author: Ben Coran

Publisher: Tate Publishing

Published: 2012-04

Total Pages: 372

ISBN-13: 1618620479

DOWNLOAD EBOOK

Ares has the kind of life most people long for. However, he hasn't yet fulfilled his one desire in life: to become an untraceable serial killer. When he begins committing murders, he suddenly unleashes the monster within, murdering his unsuspecting victims in a unique pattern according to their zodiac signs. Through preparation, he becomes a killer who is well versed in all of the world's most deadly murderers and their tactics, a killer who researched the methods of law enforcement and honed his ability to avoid detection, a killer who knows how to eliminate all evidence from the scene. He even sends messages and ciphers for police and a national news reporter, Marshall Conway, to report on the air as a playful ploy, thinking the law will never be able to trap him. Will the FBI ever catch up to Ares and his evil ways? And just how do they capture someone who, after delivering the bodies to them, leaves no evidence? Author Ben Coran's breakthrough story,The Crimson Eclipticis a perfect mixture ofThe DaVinci Code, Criminal MindsandDexter.The first novel of the Black Series, it is a nonstop thrill-ride that will leave you breathless at every turn of the page.


Cipher/Code of Dishonor; Aaron Burr, an American Enigma

Cipher/Code of Dishonor; Aaron Burr, an American Enigma

Author: Alan J. Clark, M.D.

Publisher: AuthorHouse

Published: 2005-06-30

Total Pages: 542

ISBN-13: 1420846396

DOWNLOAD EBOOK

Trinity: The Burrs versus Alexander Hamilton and the United States of America will be the first book to draw on unreported documents and genealogical information to reveal an unprecedented look into the relationships of Aaron Burr, Alexander Hamilton, Trinity Church Corporation and the Loyalists of Manhattan Island. Author Alan J. Clark shows in new perspective the battles and intrigues leading beyond the American Revolutionary War. With the melding of genealogy and timeline analysis Clark examines some of the intriguing ciphered letters of Aaron Burr to his daughter Theodosia, and looks again at Burr’s curious and complex war time exploits to determine where his Loyalist tendencies actually began. Clark further examines the land leases then traded prior, during, and after the war as speculation, or possibly as rewards from the English Crown for services performed in its favor in the colonies primarily through the Corporation of Trinity Church. The economics of early Manhattan and the Atlantic colonies were bolstered by the complex and secular behavior of the Corporation of Trinity Church acting as land bank for the Loyalists to the Throne of England. Clark appears to fill in the gaps in many recently published tomes by delving deeper into the actions of Burr and Hamilton, examining their extensive familial connections and behaviors to arrive at a complex web of intricacy bringing to life American History at its most personal level. This book does not reiterate the well worn paths of American History. Instead, it brings a crisp new approach that makes sense of seemingly insignificant, disjointed and inconsistent stories of the early history of our country.


The Crimson Query

The Crimson Query

Author: Arlton Eadie

Publisher: Lulu.com

Published: 2010-11

Total Pages: 220

ISBN-13: 1605435228

DOWNLOAD EBOOK

This 1929 potboiler, subtitled Or How the Squid Got Besuckered, introduces a villain known as the Crimson Query because he leaves, Zorro-like, a sign of his machinations. In this case, a bright red question mark. All in all, this hard-to-find detective story stands alongside the more horrific novels Eadie is known for.


Introduction to Cryptography with Mathematical Foundations and Computer Implementations

Introduction to Cryptography with Mathematical Foundations and Computer Implementations

Author: Alexander Stanoyevitch

Publisher: CRC Press

Published: 2010-08-09

Total Pages: 646

ISBN-13: 1439817634

DOWNLOAD EBOOK

From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms. As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.