購物比價 | 找書網 | 找車網 |
FindBook |
有 1 項符合
Bent Spear: Missing Missiles Over America的圖書 |
![]() |
Bent Spear: Missing Missiles Over America 作者:Stephen Austen 出版社:Stephen Austen 出版日期:2010-02-07 語言:英文 |
圖書館借閱 |
國家圖書館 | 全國圖書書目資訊網 | 國立公共資訊圖書館 | 電子書服務平台 | MetaCat 跨館整合查詢 |
臺北市立圖書館 | 新北市立圖書館 | 基隆市公共圖書館 | 桃園市立圖書館 | 新竹縣公共圖書館 |
苗栗縣立圖書館 | 臺中市立圖書館 | 彰化縣公共圖書館 | 南投縣文化局 | 雲林縣公共圖書館 |
嘉義縣圖書館 | 臺南市立圖書館 | 高雄市立圖書館 | 屏東縣公共圖書館 | 宜蘭縣公共圖書館 |
花蓮縣文化局 | 臺東縣文化處 |
|
Others in The Paladin Papers Series:
“PAVE BOLO: Target Iran” is the fifth story in “The Paladin Papers” military techno-thriller series. It is also a thought-provoking prequel to its companion story “411: Cybergeddon. Iran is reeling. The “Stuxnet” computer vrus infects its nuclear program control systems. Iranian leaders are hungry for revenge. Resisting calls to halt their nuclear programs, a crushing cyber-strike against the United States is planned. It’s time for PALADIN and his Onyx Ops team to derail Iran’s nuclear ambitions. They unleash one unique weapons system tracing its legacy to the Cold War and another taken from the pages of tomorrow's science fiction in a single, decisive masterstroke.
“ONYX OPS: The Paladin Papers” - Masters of black ops ruthlessly navigate today’s globalization. From World War II, to the Cuban Revolution and the Kennedy assassination, through the CIA’s Operation Phoenix and the oil fields of Vietnam. It leads to today’s Afghanistan. Must-read, fast-paced fiction with high-impact insights into the geopolitics of global resources. You will think about this long after you put it down.
TACIT ALUMNI: Tracking Terror” - in a world of Global Jihad, it is September 11, 2011, the tenth anniversary of 9/11. From downtown Washington DC to Area 51 to Somalia and the Gulf of Aden, “PALADIN” and his high-tech Onyx Ops team commemorate this tragic event in their own special way. Follow the masters of global black operations at Onyx Ops as they orchestrate new technologies in the relentless hunt for terrorists.
This is an excursion into the near future of Radio Frequency IDentification (RFID) technology and the possibilities it raises. We justifiably fret over the “asymmetric attacks” from our adversaries. We sometimes forget that we have the technological means at our fingertips to leverage some “asymmetric attacks” of our own.
I hope you'll enjoy reading these as much as I did in writing them.
Thank you!
Stephen W. Austen
|