Catalog Search Results
Author
Pub. Date
[2023]
Description
A groundbreaking history of women in British intelligence, revealing their pivotal role across the first half of the twentieth century
From the twentieth century onward, women took on an extraordinary range of roles in intelligence, defying the conventions of their time. Across both world wars, far from being a small part of covert operations, women ran spy networks and escape lines, parachuted behind enemy lines, and interrogated prisoners. And,...
Pub. Date
2008
Description
roduct Description (1000 characters, including spaces): *This is the remarkable biography of Noor Inayat Khan, code named"Madeleine." The first woman wireless transmitter in occupied France during WWII, she was trained by Britain's SOE and assumed the most dangerous resistance post in underground Paris. Betrayed into the hands of the Gestapo, Noor resisted intensive interrogation, severe deprivation and torture with courage and silence, revealing...
Author
Description
"Six gentlemen, one goal: the destruction of Hitler's war machine. In the spring of 1939, a top-secret organization was founded in London: its purpose was to plot the destruction of Hitler's war machine through spectacular acts of sabotage. The guerrilla campaign that followed was every bit as extraordinary as the six men who directed it. One of them, Cecil Clarke, was a maverick engineer who had spent the 1930s inventing futuristic caravans. Now,...
Author
Series
Red dragon rising volume 2
Pub. Date
[2010]
Description
A Chinese assassin follows CIA officer Mara Duncan and the scientist she has sworn to protect all the way from wartorn Hanoi to New York City, while U.S. Army advisor Major Zeus Murphy hatches a daring mission into the heart of a Chinese fleet in order to prevent them from landing on Vietnam's coast.
Author
Pub. Date
[2009]
Description
"Shadows in the Jungle is the up-close-and-personal story of the Alamo Scouts in the Pacific during World War II. Set on retaking the Philippines ever since his ignominious flight from the islands in 1942, General Douglas MacArthur needed a first-rate intelligence-gathering unit. Out of thousands, only 138 men were chosen: the best, toughest, and most fit men the army had to offer. Their task: silently slip onto Japanese-held islands, stalk through...
55) First team
Author
Series
First team series volume 1
Pub. Date
[2004]
Description
A small but well-supported military operation known as "The Team," organized to address unconventional threats, tracks down missing radioactive material that has the potential to be converted into a dirty bomb.
56) Blood of war
Author
Pub. Date
2013.
Description
While U.S. Army Major Zeus Murphy leads a covert Vietnamese counterattack against China , SEAL Lieutenant Ric Kerfer is sent by the president to destroy a Vietnamese doomsday weapon capable of destroying Southeast Asia.
Author
Pub. Date
[2021]
Description
"This is the story of the 15,000 immigrants and refugees who used their native language skills and knowledge of their home countries to help America to victory in World War II. Beverley Driver Eddy tells their story thoroughly and colorfully, drawing heavily on interviews with surviving Ritchie Boys"--
58) Kill chain
Author
Series
Pub. Date
2007
Description
Evan Delaney investigates after her father's car is found wrecked at the bottom of a ravine in California.
Author
Pub. Date
1993
Description
Their mission: To take out the scuds. Eight went out. Five came back. Their story had been closed in secrecy. Until now. They were British Special Forces, trained to be the best. In January 1991 a squad of eight men went behind the Iraqi lines on a top secret mission. It was called Bravo Two Zero. Dropped into "scud alley" carrying 210-pound packs, McNab and his men found themselves surrounded by Saddam's army. Their radios didn't work. The weather...
Author
Series
Pub. Date
[2023]
Description
"The US military mission is to protect the United States and its allies from attacks by adversaries and enemies around the world. Today, wide ranging attacks include cyberattacks on computer systems, increasing nuclear expansion by adversaries, and terrorist attacks on civilian people. To address these threats, the military has developed programs that specifically are devoted to intelligence, which is the collecting and analyzing of information about...
Available Items In Prospector
Didn't find what you need? Items not owned by AspenCat can be requested from other Prospector libraries to be delivered to your local library for pickup.