TERROR KNOWS NO FRONTIERS A deadly secret whispered by a dying gunrunner on a lonely road in Zambia sets MI6 agent Sam Packer on a frantic race against time. A terrorist gang has acquired a horror weapon but before packer can discover more the man dies. Packer is on his own, faced with skeptical colleagues and the gunrunner’s daughter Julie, who may hold the key to the secret but who also suspects it was Packer who engineered her father’s death. As Packer fights desperately to win Julie’s confidence, the unlikely pair follow the trail of murder and deceit from Scotland to Vienna and on to a lonely island in the Adriatic: there they will find not only the weapon but the identity of the sinister organization known as the Lucifer Network.
Years after hijackers killed his father, an ordinary college student gets a chance to fight terrorists who have hatched a plan to destroy the United States A ringing phone awakes Dan Lennigin, college student, in the middle of the night, and the caller baffles him with a stream of panicked gibberish. It is a code, meant for someone else’s ears, and it draws Dan inexorably into a tangled international conspiracy. Minutes after the call, an operative for antiterrorist agency Lucifer is killed, and his superiors come for Dan. He is the only one who heard the warning, and now that he knows what is happening, he can’t say no. Ever since his vacationing father was murdered by hijackers, Dan has dreamed about taking revenge on the world’s terrorists. But this threat is no fantasy. It has already claimed the lives of several professional terrorist hunters, and Dan is no professional. This ebook features an illustrated biography of Jon Land including rare photos from the author’s personal collection.
Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications
Author: Frank H. P. Fitzek
Publisher: Springer Science & Business Media
Category: Technology & Engineering
This book advocates the idea of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices through cognitive wireless networking. It details the cooperative and cognitive aspects for future wireless communication networks. Coverage includes social and biological inspired behavior applied to wireless networks, peer-to-peer networking, cooperative networks, and spectrum sensing and management.
Stallings provides a survey of the principles and practice of cryptography and network security. This edition has been updated to reflect the latest developments in the field. It has also been extensively reorganized to provide the optimal sequence for classroom instruction and self-study.
Comprehensive in approach, this introduction to network and internetwork security provides a tutorial survey of network security technology, discusses the standards that are being developed for security in an internetworking environment, and explores the practical issues involved in developing security applications.