Catalog Search Results
Author
Language
English
Formats
Description
The Allied invasion of Europe during summer 1944 was widely expected and it fell to the Axis intelligence services to provide High Command with advance warning of the precise date and place of the landings. Using cryptanalysis of Allied signals, undercover agents and ships, and photographic evidence, Axis intelligence was pitted directly against their Allied counterparts, who actively tried to create a decoy and aim their enemies at the wrong location....
Author
Pub. Date
2014
Language
English
Formats
Description
With exclusive interviews, a Signal Corps veteran tells the full story of how cryptography helped defeat the Axis powers, at Bletchley Park and beyond.
For years, the story of the World War II codebreakers was kept a crucial state secret. Even Winston Churchill, himself a great advocate of Britain’s cryptologic program, purposefully minimized their achievements in his history books. Now, though, after decades have passed,...
For years, the story of the World War II codebreakers was kept a crucial state secret. Even Winston Churchill, himself a great advocate of Britain’s cryptologic program, purposefully minimized their achievements in his history books. Now, though, after decades have passed,...
Author
Language
English
Formats
Description
In the 1940s, the brightest minds of the United States and Nazi Germany raced to West Africa with a single mission: to secure the essential ingredient of the atomic bomb -- and to make sure nobody saw them doing it
Albert Einstein told President Franklin D. Roosevelt in 1939 that the world's only supply of uniquely high-quality uranium ore -- the key ingredient for bomb -- could be found in the Katanga province of the Belgian Congo at the Shinkolobwe...
Author
Language
English
Description
Seldom out of the news for long, code-breaking has had a bad time in the media so far, readers and viewers often finding it as perplexing as it is intriguing. As one of the greatest achievements of the century, code- breaking is a fascinating story, but all too often misunderstood and felt to be obscure. The author covers the story from the early code-breaking efforts through the rickety structure of the pre-war Government Code and Cypher School to...
Author
Language
English
Description
The exceptional exploits, courage and leadership of British SOE Agent Trotobas have long been recognised in France but not in his own country despite being recommended for the Victoria Cross.
Captured on his first mission, Trotobas led a mass break-out from Mauzac Internment Camp and eventually returned to England. He immediately volunteered to return and established and ran a resistance group around Lille and the Pas de Calais for a year. As the...
Author
Language
English
Description
This book is the outcome of a difficult investigation, and a very remarkable story it is too. It was at Beaulieu that a large number of agents from Britain and the Nazi-occupied countries of Europe were trained in the delicate arts of secret inks, coding, clandestine communications and black propoganda, along with such nefarious skills as silent killing, housebreaking, safe-blowing, forgery, unattributable sabotage and survival techniques. And they...
Author
Series
Language
Español
Description
A comienzos de 1930 Nancy Wake disfrutaba la vida bohemia de París. Antes de que finalizara la Segunda Guerra Mundial era la persona más buscada por la Gestapo.
Después de ser testigo de la crueldad de la violencia nazi en Viena, Nancy se prometió a sí misma que haría todo lo que estuviera en sus manos para liberar Europa de su presencia. Su primera misión, hacer de correo entre los miembros de la Résistance, la llevó a organizar una eficacísima...
Author
Language
English
Description
As the fall of France took place, almost the entire coastline of Western Europe was in German hands. Clandestine sea transport operations provided lines of vital intelligence for wartime Britain. These "secret flotillas" landed and picked up agents in and from France, and ferried Allied evaders and escapees. This activity was crucial to the SIS (Secret Intelligence Service) and the SOE (Special Operations Executive). This authoritative publication...
Author
Language
English
Description
The true story of the force of "licensed to kill" secret agents who became the basis for the James Bond spy series. Brigadier Colin Gubbins was M. The Special Operations Executive was his Secret Service. Professor Dudley Newitt was Q. Capt. Gus March-Phillips commanded "Maid of Honor Force," the team of "James Bonds" who, in a daring operation, sailed a ship to West Africa and stole three enemy ships from a neutral Spanish port on the volcanic island...
Author
Language
English
Description
The Battle of Anzio was among the most bloody of the World War II conflicts. T. R. Fehrenbach's accurate account stunningly depicts the reality of the Allied forces' fight for survival on an Italian beach as they stormed what Winston Churchill called the soft underbelly of the Axis powers. In one of the turning points of the war, the allies clung to a narrow strip of sand while German planes swooped in from above and artillery shells and mortar fire...
Author
Language
English
Description
After the fall of France in the mid-1940s, German Chancellor Adolf Hitler faced a British Empire that refused to negotiate for peace. Full-scale war loomed and Hitler ordered the Abwehr, Germany's defense and intelligence organization, to carry out Operation Lena, a program to place information-gathering spies within Britain. Quickly, a network of secret agents spread within the United Kingdom and across the British Empire. A master of disguises,...
Author
Language
English
Description
Alongside the open conflict of World War II there were other, hidden wars - the wars of communication, in which success depended on a flow of concealed and closely guarded information.
Smuggled written messages, secretly transmitted wireless signals, or months of eavesdropping on radio traffic meant operatives could discover in advance what the enemy intended to do. This information was passed on to those who commanded the armies, the fleets and...
Author
Language
English
Description
By the spring of 1940, the phoney war suddenly became very real. In April Hitler's forces, invaded Norway and a month later began their assault on France and the Low Countries. The Anglo/French allies were routed. The British escaped to fight another day after evacuating the bulk of their armies at Dunkirk. When on 10 May Winston Churchill became Prime Minister he soon discovered that the nation's defenses were in a parlous state and a Nazi invasion...
Author
Language
English
Description
With Britain braced for a German invasion, MI5 recruited an ex RNAS officer, come confidence trickster, named Walter Dicketts as a double agent. Codenamed Celery, Dicketts was sent to Lisbon with the seemingly impossible mission of persuading the Germans he was a traitor and then extract crucial secrets. Once there, the Nazis spirited him off to Germany. With his life on the line, Dicketts had to outwit his interrogators in Hamburg and Berlin before...
Author
Language
English
Description
X D Operations is the first account of the thrilling operations by the Kent Fortress Royal Engineers, a small Territorial Army Unit given the largest demolition program ever undertaken by the Royal Engineers. These took place in May 1940 with the object of destroying all the oil reserves stored in refineries in the ports along the Continental coastline from Holland to the Bay of Biscay, thus denying the Nazis vital stocks.The operations were mounted...
Author
Language
English
Description
Of German stock dating back to 1530 in Saxony, Eric George Ackermann GM was born on the Isle of Wight in 1919 and became a leading figure in the world of signals and electronic intelligence. As a Junior Scientific Officer at the Telecommunication Research Establishment, Boscombe Down, with an honorary commission in the Royal Air Force, he made numerous flights over occupied territory searching for, monitoring and destroying Germany's Wuerzburg, Knickebein...
Author
Language
English
Description
The Second World War spawned a plethora of crack special forces units (Long Range Desert Group, SAS, SBS, Phantom and Commandos) but 30 Assault Unit remains, even today, far more secretive and exclusive than the others. Formed by Ian Fleming, who was working for Naval Intelligence, 30 AUs mission was to penetrate and operate behind enemy lines, capture by whatever means necessary vital intelligence and feed it back to London where it could be assimilated...
Author
Language
English
Description
A goldmine of information about what the German High Command privately thought of the war, Adolf Hitler, the Nazis and each other Andrew Roberts One of the most important books on World War II to be published in the last thirty years Tim Newark Between 1939 and 1942, a division of the British Directorate of Military Intelligence created a number of PoW interrogation camps in and around London. Sophisticated tapping equipment was installed and secret...
Author
Language
English
Description
Professor Michael Foot is indisputably the greatest authority on the activities of SOE in Europe during WW2. In Six Faces of Courage he selects six of the bravest of the brave agents and describes their backgrounds, activities and characters. Truly inspiring reading complemented by an updated introduction that sets the scene superbly. This excellent and successful book gives the reader a real insight to what it meant to be a SOE agent in Nazi-occupied...
Author
Language
English
Description
In 1942, John Eppler was one of two German spies inserted behind British lines in Egypt after an epic crossing of the Western Desert organised by the Hungarian explorer Count László Almásy, Operation 'Condor'. But this was far from his first adventure. Of German origin but raised since childhood in a wealthy Egyptian family and a convert to Islam, he had travelled widely in the Middle East for German Military Intelligence.
The book details...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request