Feeds

How geeks helped win the war

40% off at Reg Books

  • alert
  • submit to reddit

Geeks Guide2 For the third edition of our Geeks Guide2 feature we go behind the scenes of World War II and tell the story of the infamous code breakers and the stealth-like role they played throughout the war.

Voices of the Code Breakers by Michael Paterson delves into the world of covert war and reveals how much of World War II was in fact won away from the battlefield. While the news reports of the time concentrated on the physical battles being fought, hidden wars of communication were taking place. This week's GG2 book provides us with an enlightening account of the extraordinary people from the British Cryptologists to the Navajo Indians and their chance finds, lucky accidents, resolute determination, and how their moments of sheer brilliance helped win their war. The secretly transmitted wireless signals, smuggled written messages and months of snooping on radio traffic that allowed operatives to provide crucial knowledge of the enemy's plans to military commanders is all documented.

Paterson also treats us to a first-rate look at the use of the computer during World War II, how the code breakers used it to spectacular effect and the subsequent development based on its successes. We get first-hand accounts from the staff of Bletchley Park, American secret agents, French and Dutch resistance fighters, and members of the Services Liaison Unit who passed on the vital coded information to field commanders. It also includes a 16-page plate section with rare archive photographs.

We have a free 53-page sample chapter for those of you interested in this week’s GG2 title and it's available for direct download below. Voices of the Code Breakers is available now at Register Books for just £5.39 - that's 40 per cent off RRP*.

View a sample chapter

Buy this book

*Offer correct at time of going to press. Offer covers selected title only. Terms and Conditions apply. ®

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.