Feeds

How geeks helped win the war

40% off at Reg Books

  • alert
  • submit to reddit

Geeks Guide2 For the third edition of our Geeks Guide2 feature we go behind the scenes of World War II and tell the story of the infamous code breakers and the stealth-like role they played throughout the war.

Voices of the Code Breakers by Michael Paterson delves into the world of covert war and reveals how much of World War II was in fact won away from the battlefield. While the news reports of the time concentrated on the physical battles being fought, hidden wars of communication were taking place. This week's GG2 book provides us with an enlightening account of the extraordinary people from the British Cryptologists to the Navajo Indians and their chance finds, lucky accidents, resolute determination, and how their moments of sheer brilliance helped win their war. The secretly transmitted wireless signals, smuggled written messages and months of snooping on radio traffic that allowed operatives to provide crucial knowledge of the enemy's plans to military commanders is all documented.

Paterson also treats us to a first-rate look at the use of the computer during World War II, how the code breakers used it to spectacular effect and the subsequent development based on its successes. We get first-hand accounts from the staff of Bletchley Park, American secret agents, French and Dutch resistance fighters, and members of the Services Liaison Unit who passed on the vital coded information to field commanders. It also includes a 16-page plate section with rare archive photographs.

We have a free 53-page sample chapter for those of you interested in this week’s GG2 title and it's available for direct download below. Voices of the Code Breakers is available now at Register Books for just £5.39 - that's 40 per cent off RRP*.

View a sample chapter

Buy this book

*Offer correct at time of going to press. Offer covers selected title only. Terms and Conditions apply. ®

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.