Feeds

How geeks helped win the war

40% off at Reg Books

  • alert
  • submit to reddit

Geeks Guide2 For the third edition of our Geeks Guide2 feature we go behind the scenes of World War II and tell the story of the infamous code breakers and the stealth-like role they played throughout the war.

Voices of the Code Breakers by Michael Paterson delves into the world of covert war and reveals how much of World War II was in fact won away from the battlefield. While the news reports of the time concentrated on the physical battles being fought, hidden wars of communication were taking place. This week's GG2 book provides us with an enlightening account of the extraordinary people from the British Cryptologists to the Navajo Indians and their chance finds, lucky accidents, resolute determination, and how their moments of sheer brilliance helped win their war. The secretly transmitted wireless signals, smuggled written messages and months of snooping on radio traffic that allowed operatives to provide crucial knowledge of the enemy's plans to military commanders is all documented.

Paterson also treats us to a first-rate look at the use of the computer during World War II, how the code breakers used it to spectacular effect and the subsequent development based on its successes. We get first-hand accounts from the staff of Bletchley Park, American secret agents, French and Dutch resistance fighters, and members of the Services Liaison Unit who passed on the vital coded information to field commanders. It also includes a 16-page plate section with rare archive photographs.

We have a free 53-page sample chapter for those of you interested in this week’s GG2 title and it's available for direct download below. Voices of the Code Breakers is available now at Register Books for just £5.39 - that's 40 per cent off RRP*.

View a sample chapter

Buy this book

*Offer correct at time of going to press. Offer covers selected title only. Terms and Conditions apply. ®

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.