- Table View
- List View
From Roger's Rangers to the Revolution, Civil War, World War I & II, Korea, Vietnam, Iraq, Afghanistan, and the Bin Laden raid, this book covers over 250 years of American Special Forces action. America's Elite takes the reader through some of the most dramatic special forces operations in US history, from sniping British commanders during the Revolutionary War to Riverine incursions in the Mekong Delta in Vietnam, and from demolition missions on D-Day to the SEAL assault on Osama bin Laden's compound in 2011. Training and selection procedures are explained in detail, and the book also describes some of the technologies that have separated regular soldiers from their Special Forces counterparts. Illustrated throughout with striking photography and artworks, America's Elite forms the most comprehensive and visually impressive single-volume guide to US Special Forces available.
In early May 1940, the fortress of Eben Emael was a potent sentinel over the Belgian-Dutch borderlands. The fortress covered 75 hectares on the surface, had 5km of tunnels underground and was studded with bunkers, gun turrets and casemates. Add a garrison of 1,200 men and the natural protection of 60m-high canal walls, and Eben Emael gave the impression of near-impregnability. Yet on 10 May just 78 elite airborne soldiers managed to defeat this fortress in an operation of unprecedented tactical skill. Deployed by glider onto the very top of the fortifications, they utilized elite training, fast movement and specialist explosives to destroy many of the gun positions and trap much of the garrison within the fortress. Simultaneously, three other assault detachments conducted high-risk glider operations to capture critical bridges over the Albert Canal. By the end of 11 May, following the arrival of German infantry reinforcements, Eben Emael was in German hands. This Eben Emael RAID title tells the complete, fascinating story of this unique action.
Fire is one of humanity's most rudimentary tools, but also one of its oldest killers. This focus of this book is a weapon that has literally placed the power of fire in human hands - the man-portable flamethrower. From its very first use in World War I to its deployment in Vietnam, the weapon has proven to be devastatingly effective, not least because of its huge psychological impact on enemy troops - few other weapons in history have caused such terror. Yet despite this, the man-portable flamethrower has always been vulnerable, suffering from a very particular set of limitations, all of which are explored here, as are some lesser-known capabilities such as the ability to 'bounce' a stream of flammable liquid off the interior surfaces of fortified structures. Featuring expert analysis, first-hand accounts, and a startling array of illustrations and photographs, this book is the definitive guide to an extraordinary chapter in the history of military technology.
This book explores the origins, development, combat use and lasting influence of Nazi Germany's automatic rifles, focusing on the Gew 41(W), Gew 43/Kar 43, FG 42 and MP 43/StG 44. The Blitzkrieg campaigns of 1939-40 convinced many observers that most infantry combat took place at closer ranges than the 750-1,000m. From 1941 Germany's arms designers took note and produced a new series of infantry firearms. This study not only provides a detailed technical description of each weapon, but also explores how the firearms performed on the battlefields of World War II. The combat takes us from the FG 42 in the hands of Fallschirmjäger at Monte Cassino through to StG 44s being used by Waffen-SS soldiers on both the Eastern and Western Fronts. Postwar service is also studied, such as the Gew 43's adoption by the Czech Army and the StG 44's use by the Viet Cong in the Vietnam War. Setting each firearm in its tactical and historical context, and employing striking photographs and full-colour artwork, firearms expert Chris McNab sets out the absorbing story of this distinctive and influential series of weapons.
It's a truism to say that history is written by the winners. But what is it about the winners that make them so powerful? In this enlightening new book, Chris McNab searches for answers to this question and much more, telling the story of the history of the world through the lens of the weapons used over time.Arranged by age, McNab details 100 weapons of history in a highly-illustrated format. Among these 100 weapons: * Roman gladius that helped establish the Roman Empire * Japanese Katana, or Samurai sword * English longbow, used to defeat the French at the battle of Agincourt * Maxim gun * Flying Fortress of World War II - the epitome of US military superiority * bomb on Hiroshima that made a weapon the ultimate deterrent * AK-47 rifle.A History of the World in 100 Weapons presents each weapon in full detail, exploring the how and why of the weapon's development, the times from which it emerged, how it was used in battle and by whom, and to what extent and impact. details of how and why each weapon was invented, the times they emerged from, how they were used in battle.Drawing on stories of famous battles, wars and leaders associated with each weapon, McNab presents a vivid history of the weapons themselves and their context in the development of world history.
The definitive work on Hitler's war machine charting its evolution from the formidable force which won stunning victories during the Blitzkrieg in 1940, to the hard campaigns it fought in the deserts of North Africa and the frozen wastelands of the Soviet Union to the eventual retreat to the Fatherland itself. Drawing upon Osprey Publishing's unique archive, this volume expertly weaves together the story of the development and deployment of Hitler's armies displayed alongside a stunning collection of original artwork and photographs to show the kit and equipment of the various land forces.
At the beginning of World War II, the Luftwaffe was the world's most advanced air force. With superior tactics, aircraft and training, it cut through the air forces of Poland and Western Europe in 1939 and 1940, and those of the Soviet Union in 1941.Despite this auspicious beginning, by 1945 the Luftwaffe was a dying force. The Allies were destroying German aircraft at unequal rates, and Luftwaffe aviators were dying in their thousands in an unbalanced battle to save Germany from destruction. The Luftwaffe's lack of a convincing long-range bomber force also meant that it could not return strategic devastation upon its enemies. In the words of one historian, the Luftwaffe had a 'strategy for defeat'.Hitler's Eagles - The Luftwaffe 1933-45 charts the turbulent history of the Luftwaffe from its earliest days to its downfall. It explores the secretive development of German air power during the 1920s and early 1930s, and the training of a new generation of aviators, including combat experience in the Spanish Civil War. Once Hitler was in power, the Luftwaffe came out of the shadows and expanded under a massive rearmament programme, then embarked upon the war that would define its existence. Hitler's Eagles explains the Luftwaffe's operations in every theatre of the war - Europe, North Africa, the Mediterranean and the Eastern Front. As well as providing a detailed history of the Luftwaffe's history and combat experience, the book also expands on its human and material aspects. Aces and commanders are profiled, uniforms and equipment are explained, and aircraft ranging from the Fiesler Storch to the Fw 200 Condor are described both technologically and tactically. The book conveys all the drama of the Luftwaffe's existence, from bombing raids over London to jet-fighter dogfights over Berlin, with Osprey's famous aviation artwork and more than 150 photos bringing the story incomparably to life.
The Third Reich's Waffen-SS defended Nazi Germany's Eastern & Western Fronts, and the Allgemeine-SS ran Holocaust concentration camps such as Auschwitz, Dachau, and Buchenwald.The SS has become the most infamous military formation in history. From its diminutive origins in the 1920s as Hitler's personal bodyguard, by the late war years it grew to a sprawling organization of hundreds of thousands of men, with a field army (the Waffen-SS-Armed-SS) numbering nearly 40 divisions and huge corporate, racial, and political power in the Allgemeine-SS (General-SS). The activities of the SS ranged from the heroic to the horrific; from fighting extraordinary defensive battles on the Eastern and Western Fronts, to running the concentration and extermination camp systems, and providing personnel for the Einsatzgruppen murder squads in Eastern Europe. Hitler's Elite: The SS 1939-45 tells the complete story of the SS at individual, unit, and organizational levels. Following an explanation of the SS' complex political and social origins, and its growth within the Nazi empire, it goes on to look at both its war record and its wider role in Heinrich Himmler's implementation of Hitler's vision for the Third Reich. As well as providing a combat history of the Waffen-SS from 1939 to 1945, it also explores themes such as ideology, recruitment, foreign SS personnel, training, and equipment. The textual history is brought to life with more than 200 contemporary photographs and colour artworks from Osprey's series titles. As a companion volume to Hitler's Armies and Hitler's Eagles, this book gives a detailed and highly visual insight into one of Hitler's most powerful instruments of policy.
From the Siegfried Line to the Atlantic Wall to central Italy, this detailed guide to every level of defensive project in the Third Reich won't disappoint. It takes you inside Channel Islands' pillboxes, Normandy coastal gun positions, and emplaced tank turrets on the Gothic Line in Italy. The secretive world of Hitler's command bunkers is revealed in detail, and the principles and engineering of basic frontline defences are explained, showing how the average German soldier prepared to stand his ground. There is also a dedicated chapter on special-purpose fortifications, including U-boat pens, V-weapon sites, and flak towers.This complete journey into German wartime fortifications reveals much about the strategic and tactical thinking of Hitler and his Wehrmacht, and combat accounts explore how effective the defences were in practice. The book is illustrated throughout with more than 200 drawings, maps, and photographs; the drawings include 3D views and detailed cutaway diagrams, showing exactly how key types of defensive positions looked and functioned. As a guide for both the general historian and for the modern battlefield tourist, Hitler's Fortresses is an authoritative record of the Third Reich's defensive mindset.Hitler's use of manoeuvre warfare should not distract us from his more defensive projects. From the moment Hitler took power in 1933, massive investment went into building fortified defences in Germany's vulnerable regions, particularly along the Franco-German border. The "West Wall", for example, eventually stretched for more than 390 miles and contained some 14,000 pillboxes, being one of the great engineering projects of the 1930s. War expanded Germany's defensive requirements, not least along the Atlantic coastline, where from 1942 to 1944 engineers built a chain of batteries, bunkers, and minefields from Norway to the Franco-Spanish border, which together constituted the "Atlantic Wall". Similarly, chains of defensive works were sunk into the mountainous terrain of Italy between 1943 and 1945, in an attempt to stop the grinding Allied advance.
With the MG 34, the German Wehrmacht introduced an entirely new concept in automatic firepower - the general-purpose machine gun (GPMG). In itself the MG 34 was an excellent weapon: an air-cooled, recoil-operated machine gun that could run through belts of 7.92mm ammunition at a rate of 850rpm, delivering killing firepower at ranges of more than 1,000m. Yet simply by changing its mount and feed mechanism, the operator could radically transform its function. On its standard bipod it was a light machine gun, ideal for infantry assaults; on a tripod it could serve as a sustained-fire medium machine gun; aircraft or vehicular mounts turned it into an air defence weapon; and it also served as the coaxial machine gun on numerous tanks.During World War II, the MG 34 was superseded (although it remained in combat use) by a new GPMG - the MG 42. The MG 42 was more efficient to manufacture and more robust, and had a blistering 1,200rpm rate of fire. Nicknamed 'Hitler's buzzsaw' by Allied troops, it was arguably the finest all-round GPMG ever produced, and alongside the MG 34 it inflicted heavy casualties on Allied soldiers on all European and North African fronts. Such were its qualities of firepower and usability that it became the foundation of an entire series of postwar machine guns, including the MG 1 and MG 3 - the latter is still in production and service to this day.Featuring specially commissioned full-colour artwork and drawing upon numerous technical manuals and first-hand accounts, this study explores the technological development, varied roles and lasting influence of the revolutionary MG 34 and MG 42 machine guns and their postwar successors.
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup. If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start? Using the steps laid out by professional security analysts and consultants to identify and assess risks, Network Security Assessment offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future. Network Security Assessment helps you assess: Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA) Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services SMTP, POP3, and IMAP email services IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs Unix RPC services on Linux, Solaris, IRIX, and other platforms Various types of application-level vulnerabilities that hacker tools and scripts exploit Assessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future.Network Security Assessment helps you assess:Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA)Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL ServerMicrosoft Windows networking components, including RPC, NetBIOS, and CIFS servicesSMTP, POP3, and IMAP email servicesIP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNsUnix RPC services on Linux, Solaris, IRIX, and other platformsVarious types of application-level vulnerabilities that hacker tools and scripts exploitAssessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.
Fully illustrated with a mixture of dramatic archive photos and manufacturers' images, this volume covers the little known history of the riot control vehicle. It explores the world of these vehicles from 1945 through to the present day, showing how their development and deployment has blurred the lines between civilian actions and military operations. It charts how the vehicles have evolved in terms of technology and layout, and also details how the associated weapon systems have been refined over time, from water cannon and tear gas launchers to sub-sonic sound waves and microwave energy. The operational history of the vehicles is explained in the dramatic context of major incidents across the world, from the streets of Northern Ireland and Eastern Europe to the favelas of Brazil and battlegrounds of Iraq.
The Russian PPD-40, PPSh-41, and PPS family of SMGs were a key part of Soviet infantry assault doctrine in World War II and beyond. Featuring expert analysis and an array of specially commissioned full-color artwork, this engaging study explains the history, use and development of Soviet wartime SMGs in detail. It gives particular focus to the tactical applications of these weapons in combat, and how they compared to firearms wielded by their German opponents. With numerous first-hand combat accounts, and detailed technical explanations, this book is ideal for both the general reader and the firearms enthusiast.The submachine gun (SMG) came to be the embodiment of the Soviet fighting spirit during World War II. From 1943 the Red Army's preference for close-quarters combat resulted in entire infantry units being equipped with nothing but SMGs. By deploying multiple SMG-armed companies and battalions, the Red Army was able to develop ferocious firepower in urban warfare and position assaults, the soldiers keeping within the SMG's effective range of about 150m to nullify the German skills in armoured and manoeuvre warfare, artillery support and aerial bombardment.Three particular designs dominated the war. First came the PPD-40, a weapon initially designed in the 1930s but rationalized for more efficient production in 1940. This 7.62mm firearm, with a cyclic rate of 800rpm, was in production until 1941, when it was replaced by the defining Soviet SMG of the war - the PPSh-41. Here was a weapon perfectly suited to wartime conditions. It was rugged, cheap to produce, simple to operate and delivered devastating close-quarters firepower. The story of the Soviet wartime SMG is completed by the PPS, designed for even cheaper and faster production, first put into small-scale production inside the besieged city of Leningrad in 1942. This remarkable weapon never replaced the PPSh-41, however, possibly as much because of political as production considerations. Both the PPSh-41 and PPS went on to post-war service with various communist states, seeing combat in the Korean War, the Indochina and Vietnam Wars and various colonial insurgencies in Africa and Asia.
The Uzi submachine gun is one of the most recognizable weapons in history. Its familiarity stems in part from the sheer diversity of its users. Uzis have been seen gripped and fired by US secret service agents and SWAT teams, Israeli soldiers, European special forces, as well as criminals and terrorists the world over. The reasons they use the Uzi are simple - it provides devastating close-range firepower in a reliable, highly compact weapon.The Uzi Submachine Gun tells the story of this unique weapon. It not only explores the gun's technical development and specifications, and its history, but also describes the Uzi's combat use in a wide range of contexts, from Israeli soldiers battling on the Golan Heights in 1967, through to modern pirates operating off the coast of Somalia. The Uzi also thrives in various commercial markets, being a high-selling semi-auto design in the United States, for example. With a name given popular currency by the likes of Arnold Schwarzenegger and The Simpsons, the term 'Uzi' is instantly recognizable. The full extent of its capabilities, however, are not thoroughly understood, and this book presents the facts and challenges the myths of this remarkable weapon.From the Trade Paperback edition.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ���DAISY Text with Images���.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.