- Table View
- List View
From Roger's Rangers to the Revolution, Civil War, World War I & II, Korea, Vietnam, Iraq, Afghanistan, and the Bin Laden raid, this book covers over 250 years of American Special Forces action. America's Elite takes the reader through some of the most dramatic special forces operations in US history, from sniping British commanders during the Revolutionary War to Riverine incursions in the Mekong Delta in Vietnam, and from demolition missions on D-Day to the SEAL assault on Osama bin Laden's compound in 2011. Training and selection procedures are explained in detail, and the book also describes some of the technologies that have separated regular soldiers from their Special Forces counterparts. Illustrated throughout with striking photography and artworks, America's Elite forms the most comprehensive and visually impressive single-volume guide to US Special Forces available.
In early May 1940, the fortress of Eben Emael was a potent sentinel over the Belgian-Dutch borderlands. The fortress covered 75 hectares on the surface, had 5km of tunnels underground and was studded with bunkers, gun turrets and casemates. Add a garrison of 1,200 men and the natural protection of 60m-high canal walls, and Eben Emael gave the impression of near-impregnability. Yet on 10 May just 78 elite airborne soldiers managed to defeat this fortress in an operation of unprecedented tactical skill. Deployed by glider onto the very top of the fortifications, they utilized elite training, fast movement and specialist explosives to destroy many of the gun positions and trap much of the garrison within the fortress. Simultaneously, three other assault detachments conducted high-risk glider operations to capture critical bridges over the Albert Canal. By the end of 11 May, following the arrival of German infantry reinforcements, Eben Emael was in German hands. This Eben Emael RAID title tells the complete, fascinating story of this unique action.
This book explores the origins, development, combat use and lasting influence of Nazi Germany's automatic rifles, focusing on the Gew 41(W), Gew 43/Kar 43, FG 42 and MP 43/StG 44. The Blitzkrieg campaigns of 1939-40 convinced many observers that most infantry combat took place at closer ranges than the 750-1,000m. From 1941 Germany's arms designers took note and produced a new series of infantry firearms. This study not only provides a detailed technical description of each weapon, but also explores how the firearms performed on the battlefields of World War II. The combat takes us from the FG 42 in the hands of Fallschirmjäger at Monte Cassino through to StG 44s being used by Waffen-SS soldiers on both the Eastern and Western Fronts. Postwar service is also studied, such as the Gew 43's adoption by the Czech Army and the StG 44's use by the Viet Cong in the Vietnam War. Setting each firearm in its tactical and historical context, and employing striking photographs and full-colour artwork, firearms expert Chris McNab sets out the absorbing story of this distinctive and influential series of weapons.
It's a truism to say that history is written by the winners. But what is it about the winners that make them so powerful? In this enlightening new book, Chris McNab searches for answers to this question and much more, telling the story of the history of the world through the lens of the weapons used over time.Arranged by age, McNab details 100 weapons of history in a highly-illustrated format. Among these 100 weapons: * Roman gladius that helped establish the Roman Empire * Japanese Katana, or Samurai sword * English longbow, used to defeat the French at the battle of Agincourt * Maxim gun * Flying Fortress of World War II - the epitome of US military superiority * bomb on Hiroshima that made a weapon the ultimate deterrent * AK-47 rifle.A History of the World in 100 Weapons presents each weapon in full detail, exploring the how and why of the weapon's development, the times from which it emerged, how it was used in battle and by whom, and to what extent and impact. details of how and why each weapon was invented, the times they emerged from, how they were used in battle.Drawing on stories of famous battles, wars and leaders associated with each weapon, McNab presents a vivid history of the weapons themselves and their context in the development of world history.
The definitive work on Hitler's war machine charting its evolution from the formidable force which won stunning victories during the Blitzkrieg in 1940, to the hard campaigns it fought in the deserts of North Africa and the frozen wastelands of the Soviet Union to the eventual retreat to the Fatherland itself. Drawing upon Osprey Publishing's unique archive, this volume expertly weaves together the story of the development and deployment of Hitler's armies displayed alongside a stunning collection of original artwork and photographs to show the kit and equipment of the various land forces.
At the beginning of World War II, the Luftwaffe was the world's most advanced air force. With superior tactics, aircraft and training, it cut through the air forces of Poland and Western Europe in 1939 and 1940, and those of the Soviet Union in 1941.Despite this auspicious beginning, by 1945 the Luftwaffe was a dying force. The Allies were destroying German aircraft at unequal rates, and Luftwaffe aviators were dying in their thousands in an unbalanced battle to save Germany from destruction. The Luftwaffe's lack of a convincing long-range bomber force also meant that it could not return strategic devastation upon its enemies. In the words of one historian, the Luftwaffe had a 'strategy for defeat'.Hitler's Eagles - The Luftwaffe 1933-45 charts the turbulent history of the Luftwaffe from its earliest days to its downfall. It explores the secretive development of German air power during the 1920s and early 1930s, and the training of a new generation of aviators, including combat experience in the Spanish Civil War. Once Hitler was in power, the Luftwaffe came out of the shadows and expanded under a massive rearmament programme, then embarked upon the war that would define its existence. Hitler's Eagles explains the Luftwaffe's operations in every theatre of the war - Europe, North Africa, the Mediterranean and the Eastern Front. As well as providing a detailed history of the Luftwaffe's history and combat experience, the book also expands on its human and material aspects. Aces and commanders are profiled, uniforms and equipment are explained, and aircraft ranging from the Fiesler Storch to the Fw 200 Condor are described both technologically and tactically. The book conveys all the drama of the Luftwaffe's existence, from bombing raids over London to jet-fighter dogfights over Berlin, with Osprey's famous aviation artwork and more than 150 photos bringing the story incomparably to life.
The Third Reich's Waffen-SS defended Nazi Germany's Eastern & Western Fronts, and the Allgemeine-SS ran Holocaust concentration camps such as Auschwitz, Dachau, and Buchenwald.The SS has become the most infamous military formation in history. From its diminutive origins in the 1920s as Hitler's personal bodyguard, by the late war years it grew to a sprawling organization of hundreds of thousands of men, with a field army (the Waffen-SS-Armed-SS) numbering nearly 40 divisions and huge corporate, racial, and political power in the Allgemeine-SS (General-SS). The activities of the SS ranged from the heroic to the horrific; from fighting extraordinary defensive battles on the Eastern and Western Fronts, to running the concentration and extermination camp systems, and providing personnel for the Einsatzgruppen murder squads in Eastern Europe. Hitler's Elite: The SS 1939-45 tells the complete story of the SS at individual, unit, and organizational levels. Following an explanation of the SS' complex political and social origins, and its growth within the Nazi empire, it goes on to look at both its war record and its wider role in Heinrich Himmler's implementation of Hitler's vision for the Third Reich. As well as providing a combat history of the Waffen-SS from 1939 to 1945, it also explores themes such as ideology, recruitment, foreign SS personnel, training, and equipment. The textual history is brought to life with more than 200 contemporary photographs and colour artworks from Osprey's series titles. As a companion volume to Hitler's Armies and Hitler's Eagles, this book gives a detailed and highly visual insight into one of Hitler's most powerful instruments of policy.
From the Siegfried Line to the Atlantic Wall to central Italy, this detailed guide to every level of defensive project in the Third Reich won't disappoint. It takes you inside Channel Islands' pillboxes, Normandy coastal gun positions, and emplaced tank turrets on the Gothic Line in Italy. The secretive world of Hitler's command bunkers is revealed in detail, and the principles and engineering of basic frontline defences are explained, showing how the average German soldier prepared to stand his ground. There is also a dedicated chapter on special-purpose fortifications, including U-boat pens, V-weapon sites, and flak towers.This complete journey into German wartime fortifications reveals much about the strategic and tactical thinking of Hitler and his Wehrmacht, and combat accounts explore how effective the defences were in practice. The book is illustrated throughout with more than 200 drawings, maps, and photographs; the drawings include 3D views and detailed cutaway diagrams, showing exactly how key types of defensive positions looked and functioned. As a guide for both the general historian and for the modern battlefield tourist, Hitler's Fortresses is an authoritative record of the Third Reich's defensive mindset.Hitler's use of manoeuvre warfare should not distract us from his more defensive projects. From the moment Hitler took power in 1933, massive investment went into building fortified defences in Germany's vulnerable regions, particularly along the Franco-German border. The "West Wall", for example, eventually stretched for more than 390 miles and contained some 14,000 pillboxes, being one of the great engineering projects of the 1930s. War expanded Germany's defensive requirements, not least along the Atlantic coastline, where from 1942 to 1944 engineers built a chain of batteries, bunkers, and minefields from Norway to the Franco-Spanish border, which together constituted the "Atlantic Wall". Similarly, chains of defensive works were sunk into the mountainous terrain of Italy between 1943 and 1945, in an attempt to stop the grinding Allied advance.
With the MG 34, the German Wehrmacht introduced an entirely new concept in automatic firepower - the general-purpose machine gun (GPMG). In itself the MG 34 was an excellent weapon: an air-cooled, recoil-operated machine gun that could run through belts of 7.92mm ammunition at a rate of 850rpm, delivering killing firepower at ranges of more than 1,000m. Yet simply by changing its mount and feed mechanism, the operator could radically transform its function. On its standard bipod it was a light machine gun, ideal for infantry assaults; on a tripod it could serve as a sustained-fire medium machine gun; aircraft or vehicular mounts turned it into an air defence weapon; and it also served as the coaxial machine gun on numerous tanks.During World War II, the MG 34 was superseded (although it remained in combat use) by a new GPMG - the MG 42. The MG 42 was more efficient to manufacture and more robust, and had a blistering 1,200rpm rate of fire. Nicknamed 'Hitler's buzzsaw' by Allied troops, it was arguably the finest all-round GPMG ever produced, and alongside the MG 34 it inflicted heavy casualties on Allied soldiers on all European and North African fronts. Such were its qualities of firepower and usability that it became the foundation of an entire series of postwar machine guns, including the MG 1 and MG 3 - the latter is still in production and service to this day.Featuring specially commissioned full-colour artwork and drawing upon numerous technical manuals and first-hand accounts, this study explores the technological development, varied roles and lasting influence of the revolutionary MG 34 and MG 42 machine guns and their postwar successors.
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup. If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start? Using the steps laid out by professional security analysts and consultants to identify and assess risks, Network Security Assessment offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future. Network Security Assessment helps you assess: Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA) Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services SMTP, POP3, and IMAP email services IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs Unix RPC services on Linux, Solaris, IRIX, and other platforms Various types of application-level vulnerabilities that hacker tools and scripts exploit Assessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.
The Uzi submachine gun is one of the most recognizable weapons in history. Its familiarity stems in part from the sheer diversity of its users. Uzis have been seen gripped and fired by US secret service agents and SWAT teams, Israeli soldiers, European special forces, as well as criminals and terrorists the world over. The reasons they use the Uzi are simple - it provides devastating close-range firepower in a reliable, highly compact weapon.The Uzi Submachine Gun tells the story of this unique weapon. It not only explores the gun's technical development and specifications, and its history, but also describes the Uzi's combat use in a wide range of contexts, from Israeli soldiers battling on the Golan Heights in 1967, through to modern pirates operating off the coast of Somalia. The Uzi also thrives in various commercial markets, being a high-selling semi-auto design in the United States, for example. With a name given popular currency by the likes of Arnold Schwarzenegger and The Simpsons, the term 'Uzi' is instantly recognizable. The full extent of its capabilities, however, are not thoroughly understood, and this book presents the facts and challenges the myths of this remarkable weapon.From the Trade Paperback edition.
Select your download format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. For more details, visit the Formats page under the Getting Started tab.See and hear words read aloud
- DAISY Text - See words on the screen and hear words being read aloud with the text-to-speech voice installed on your reading tool. Navigate by page, chapter, section, and more. Can also be used in audio-only mode. Compatible with many reading tools, including Bookshare’s free reading tools.
- DAISY Text with Images - Similar to DAISY Text with the addition of images within the Text. Your reading tool must support images.
- Read Now with Bookshare Web Reader - Read and see images directly from your Internet browser without downloading! Text-to-speech voicing and word highlighting are available on Google Chrome (extension installation required). Other browsers can be used with limited features. Learn more
- DAISY Audio - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate by page, chapter, section, and more. Must be used with a DAISY Audio compatible reading tool.
- MP3 - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate using tracks. Can be used with any MP3 player.
- BRF (Braille Ready Format) - Read with any BRF compatible refreshable braille display; navigate using the search or find feature.
- DAISY Text - Read with any DAISY 3.0 compatible refreshable braille display, navigate by page, chapter, section, and more.
- Embossed Braille - Use Bookshare’s DAISY Text or BRF formats to generate embossed braille.