The Lucifer Network

Author: Geoffrey Archer

Publisher: Random House


Category: Fiction

Page: 496

View: 558

TERROR KNOWS NO FRONTIERS A deadly secret whispered by a dying gunrunner on a lonely road in Zambia sets MI6 agent Sam Packer on a frantic race against time. A terrorist gang has acquired a horror weapon but before packer can discover more the man dies. Packer is on his own, faced with skeptical colleagues and the gunrunner’s daughter Julie, who may hold the key to the secret but who also suspects it was Packer who engineered her father’s death. As Packer fights desperately to win Julie’s confidence, the unlikely pair follow the trail of murder and deceit from Scotland to Vienna and on to a lonely island in the Adriatic: there they will find not only the weapon but the identity of the sinister organization known as the Lucifer Network.

The Lucifer Directive

Author: Jon Land

Publisher: Open Road Media


Category: Fiction

Page: 462

View: 312

Years after hijackers killed his father, an ordinary college student gets a chance to fight terrorists who have hatched a plan to destroy the United States A ringing phone awakes Dan Lennigin, college student, in the middle of the night, and the caller baffles him with a stream of panicked gibberish. It is a code, meant for someone else’s ears, and it draws Dan inexorably into a tangled international conspiracy. Minutes after the call, an operative for antiterrorist agency Lucifer is killed, and his superiors come for Dan. He is the only one who heard the warning, and now that he knows what is happening, he can’t say no. Ever since his vacationing father was murdered by hijackers, Dan has dreamed about taking revenge on the world’s terrorists. But this threat is no fantasy. It has already claimed the lives of several professional terrorist hunters, and Dan is no professional. This ebook features an illustrated biography of Jon Land including rare photos from the author’s personal collection.

The Lucifer Principle

A Scientific Expedition Into the Forces of History

Author: Howard K. Bloom

Publisher: Atlantic Monthly Press


Category: Philosophy

Page: 466

View: 753

Explores the relationships among genetics, human behavior, and culture and argues that evil is a by-product of nature's strategies for creation

Cognitive Wireless Networks

Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications

Author: Frank H. P. Fitzek

Publisher: Springer Science & Business Media


Category: Technology & Engineering

Page: 714

View: 594

This book advocates the idea of breaking up the cellular communication architecture by introducing cooperative strategies among wireless devices through cognitive wireless networking. It details the cooperative and cognitive aspects for future wireless communication networks. Coverage includes social and biological inspired behavior applied to wireless networks, peer-to-peer networking, cooperative networks, and spectrum sensing and management.

Cryptography and Network Security

Principles and Practice

Author: William Stallings

Publisher: Prentice Hall


Category: Computers

Page: 719

View: 421

Stallings provides a survey of the principles and practice of cryptography and network security. This edition has been updated to reflect the latest developments in the field. It has also been extensively reorganized to provide the optimal sequence for classroom instruction and self-study.

The Lucifer

a story of industrial conflict in New Zealand's 1930s

Author: Dave Welch



Category: History

Page: 189

View: 986

The Lucifer Wine

Author: Irma Walker

Publisher: Ballantine Books


Category: Fiction


View: 539

Network and internetwork security

principles and practice

Author: William Stallings

Publisher: Macmillan College


Category: Computers

Page: 462

View: 536

Comprehensive in approach, this introduction to network and internetwork security provides a tutorial survey of network security technology, discusses the standards that are being developed for security in an internetworking environment, and explores the practical issues involved in developing security applications.