Feeds

How geeks helped win the war

40% off at Reg Books

  • alert
  • submit to reddit

Geeks Guide2 For the third edition of our Geeks Guide2 feature we go behind the scenes of World War II and tell the story of the infamous code breakers and the stealth-like role they played throughout the war.

Voices of the Code Breakers by Michael Paterson delves into the world of covert war and reveals how much of World War II was in fact won away from the battlefield. While the news reports of the time concentrated on the physical battles being fought, hidden wars of communication were taking place. This week's GG2 book provides us with an enlightening account of the extraordinary people from the British Cryptologists to the Navajo Indians and their chance finds, lucky accidents, resolute determination, and how their moments of sheer brilliance helped win their war. The secretly transmitted wireless signals, smuggled written messages and months of snooping on radio traffic that allowed operatives to provide crucial knowledge of the enemy's plans to military commanders is all documented.

Paterson also treats us to a first-rate look at the use of the computer during World War II, how the code breakers used it to spectacular effect and the subsequent development based on its successes. We get first-hand accounts from the staff of Bletchley Park, American secret agents, French and Dutch resistance fighters, and members of the Services Liaison Unit who passed on the vital coded information to field commanders. It also includes a 16-page plate section with rare archive photographs.

We have a free 53-page sample chapter for those of you interested in this week’s GG2 title and it's available for direct download below. Voices of the Code Breakers is available now at Register Books for just £5.39 - that's 40 per cent off RRP*.

View a sample chapter

Buy this book

*Offer correct at time of going to press. Offer covers selected title only. Terms and Conditions apply. ®

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.