Here are 100 books that Battle of Wits fans have personally recommended if you like
Battle of Wits.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.
Perhaps the best book on the epic World War II Battle of Midway, Craig Symonds brings together all the pieces that became the turning point in the Pacific War. Looking at the leadup to the battle from both the Japanese and American perspectives, Symonds shows how the Japanese, in their typical style, created a battle plan that was overly complicated for its objective. Symonds explains how American Joe Rochefort and his eclectic band (he even had commissioned naval musicians) worked to bend (but not entirely break) the Japanese naval code. This allowed the Allies to surmise Midway as the Japanese target and set in place their own battle plan. Symonds clearly explains how the codebreaking efforts played a huge role in this battle of battles.
There are few moments in American history in which the course of events tipped so suddenly and so dramatically as at the Battle of Midway. At dawn of June 4, 1942, a rampaging Japanese navy ruled the Pacific. By sunset, their vaunted carrier force (the Kido Butai) had been sunk and their grip on the Pacific had been loosened forever.
In this riveting account of a key moment in the history of World War II, one of America's leading naval historians, Craig L. Symonds, paints an unforgettable portrait of ingenuity, courage, and sacrifice. Symonds begins with the arrival of Admiral…
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
I write historical nonfiction, I’m an avid reader, and I’ve long been fascinated by the past. But I’m far less interested in the stories of powerful people, political intrigues, and significant battles. I would rather read (and write) hidden history: the stories that have not yet been discovered or fully explored and stories that are left out of history books—accidentally or deliberately. I find these far more compelling. They often provide a deeper look at how history affects those who lack power, influence, and money but who nevertheless do remarkable and often heroic things. I live in Portugal and have started working on a new historical nonfiction book.
In 2018, I went to an author reading by Liza Mundy. Deep into researching my own nonfiction book, I was fascinated as Mundy talked about interviewing women who became code breakers in World War II.
The government recruited them from top colleges and universities, looking for women who were gifted in math and music. The women were sworn to secrecy and kept their word, telling people they had been secretaries during the war. They maintained that fiction into their old age or their graves.
Mundy tracked down survivors and showed them documentation that the program had been declassified. They had been released from their vow of silence and could share their stories with her. The book is excellent.
An expert on East European politics and economics analyzes and evaluates Western policies toward the new East European democracies as they struggle to build stable political orders and functioning market economies. He argues that the West must give higher priority to assisting the region and reorient its strategies so as to emphasize the political and administrative dimensions of economic reconstruction. He reviews the economic legacy of past Western policies and of Eastern Europe's previous dependency on the Soviet Union, and then examines in detail the changing East-West trade patterns, the prospect for Western investment and technology transfer, the questions of…
The defining event in my parents’ lives, World War II has always been in my blood. When I was growing up, it would surface now and again when old comrades came to visit or when we came across souvenirs from the war. My favorite was a carefully etched German map showing sea lanes in the Caribbean, exotic and somehow menacing at the same time. My curiosity piqued, I knew I wanted to be in the thick of history—which meant reading and writing about the war, getting my PhD in history, and becoming a Marine and an intelligence officer.
David was a pioneer. Before Codebreakers there was next to nothing in print about codebreaking. Focused on World War II, he introduced a generation of readers to a secret realm, inviting us to look behind the big green door for the first time. This generous and loyal friend alerted me to the need for comprehensive overview of American intelligence in World War II.
Codebreaking is the most important form of secret intelligence in the world. It produces much more and more trustworthy information than spies, and this intelligence exerts great influences upon the policies of governments.
A Duke with rigid opinions, a Lady whose beliefs conflict with his, a long disputed parcel of land, a conniving neighbour, a desperate collaboration, a failure of trust, a love found despite it all.
Alexander Cavendish, Duke of Ravensworth, returned from war to find that his father and brother had…
Anthony Summers and I are the authors of several books that focus on the world of intelligence, including The Eleventh Day: The Full Story of 9/11 and Osama bin Laden- which was a Finalist for the Pulitzer Prize. As we revealed in our most recent book, A Matter of Honor, U.S. code-breaking efforts in World War II began with a colossal failure – Pearl Harbor. According to the first official report on the disaster, the attack “had been clearly foreshadowed” in the Japanese diplomatic traffic the U.S had decoded. The story of how the Americans turned that initial failure into success came to fascinate me.
The first biography of Captain Joseph Rochefort, who led “Station Hypo”, the Navy’s code-breaking unit in Hawaii. Tragically, those running the U.S. cryptanalysis effort in Washington had decided to focus on breaking Japan’s diplomatic code. Only after the Japanese attack on Pearl Harbor were Rochefort and his team permitted to throw all their efforts at breaking Japanese naval codes. Their work led to America’s resounding success at Midway, only months after the disaster at Pearl. Carlson does an admirable job of bringing to life one of the forgotten men of the war.
Elliot Carlson's award-winning biography of Capt. Joe Rochefort is the first to be written about the officer who headed Station Hypo, the U.S. Navy's signals monitoring and cryptographic intelligence unit at Pearl Harbor, and who broke the Japanese navy's code before the Battle of Midway. His conclusions, bitterly opposed by some top Navy brass, are credited with making the U.S. victory possible and helping to change the course of the war. The author tells the story of how opponents in Washington forced Rochefort's removal from Station Hypo and denied him the Distinguished Service Medal recommended by Admiral Nimitz.
Anthony Summers and I are the authors of several books that focus on the world of intelligence, including The Eleventh Day: The Full Story of 9/11 and Osama bin Laden- which was a Finalist for the Pulitzer Prize. As we revealed in our most recent book, A Matter of Honor, U.S. code-breaking efforts in World War II began with a colossal failure – Pearl Harbor. According to the first official report on the disaster, the attack “had been clearly foreshadowed” in the Japanese diplomatic traffic the U.S had decoded. The story of how the Americans turned that initial failure into success came to fascinate me.
A groundbreaking work of research that is at the same time a page-turning read that sheds new light on the epic battles of the conflict. Prados interweaves the intelligence successes and failures of the U.S. and Japanese combatants in a way that has not previously been attempted. The resulting work adds hugely to our understanding of the war in the Pacific.
The most authoritative and revealing examination yet of the way intelligence--of all kinds--was instrumental in defeating Japan. Prados gives a new picture of the war in the Pacific, one which will challenge many previous conceptions about that conflict, and one which will be irresistible to those readers who find histories of that period fascinating. 16 pages of photos.
I taught myself to code back in 1994 while working the graveyard shift as a geologist in the environmental industry. My job consisted of sitting in a chair during the dark hours of the night in a shopping center in Stockton, CA, watching another geologist take samples from wells in the parking lot. A friend of mine suggested I learn to code because I liked computers. I don’t mean to make this out to be a “it’s so simple anyone can do it!” You need to have a relentless drive to learn, which is why I wrote my book, The Imposter’s Handbook - as an active step to learning what I didn’t know I didn’t know.
This book makes me jealous as the author has an incredible ability to communicate the densest of topics (Cryptography) in an engaging, wonderful way.
It draws you in and you find yourself transported to battlefields and war rooms of the past. I’ve always taken cryptography for granted - I type httpsinto my browser and navigate to a site and all’s well. I know things are reasonably secure - but why?
It turns out that RSA, the algorithm that underpins things like SSL and SSH, is a landmark of human achievement and did something that millennia of mathematicians and scientists could not: provide secure, end-to-end encryption. A wonderful story.
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable…
The Duke's Christmas Redemption
by
Arietta Richmond,
A Duke who has rejected love, a Lady who dreams of a love match, an arranged marriage, a house full of secrets, a most unneighborly neighbor, a plot to destroy reputations, an unexpected love that redeems it all.
Lady Charlotte Wyndham, given in an arranged marriage to a man she…
I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.
Passwords: everybody has them and everybody abuses them. Passwords can provide good security, but very few users use passwords correctly in order to take advantage of the protections they provide. The key to our poor implementation of passwords is a complete misunderstanding of how attackers break our passwords. Without this understanding users create weak passwords that are easy to break. Joshua Picolet's book is a reference guide for cracking passwords, but by explaining how to break passwords it also provides valuable information about how to make them strong to protect passwords from attacks. This book provides the proof of why we should treat passwords like our underwear: don't let people see it, change it often, and don't share it with strangers.
The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization's posture. The Hash Crack manual contains syntax and examples for the most popular cracking and analysis tools and will save you hours of research looking up tool usage. It also includes basic cracking knowledge and methodologies every security professional should know when dealing with password attack capabilities. Hash Crack contains all the tables, commands, online resources, and more to complete your…
I have had the opportunity to write (I have written over 30 college textbooks on technology, most of them in the area of cybersecurity), study (my PhD dissertation was on cybersecurity), teach (I have taught at colleges and universities my entire career about technology, networking, and cybersecurity), and research (I have published numerous peer-reviewed journal articles) on the topic of cybersecurity. But I have always had a soft spot in my heart for the average computer user who struggles with how to protect their technology devices. This has helped drive my passion to focus on practical cybersecurity for everyone.
David Kahn explains the most widely-known effort (widely-known today but in complete secrecy then) to decipher messages sent by the Germans using their Enigma machines during World War II. This book looks at the groundbreaking work done by Polish mathematicians in the 1930s, how Enigma machines were rescued from sinking German U-boats, and how Bletchley Park in Britain became the focal point of breaking these transmissions. Much of the book focuses on how Enigma machines, rotors, and codebooks were confiscated from German submarines and surface vessels, and how these were then used to allow the Allies, by the war's end, to read German messages almost as quickly as the Germans could send them.
Seizing the Enigma tells the thrilling story of the Royal Navy's battle to crack the Germans' supposedly unbreakable U-boat Enigma code, which would allow the vital Allied convoys in the North Atlantic to be routed away from Doenitz's wolfpacks. This battle was fought both on shore and at sea: by an assortment of scientists, chess champions and linguists, including Alan Turing, the father of the modern computer, who struggled to crack Enigma at Bletchley Park, and in the Atlantic by sailors and intelligence officers, such as Ian Fleming, the future creator of James Bond, who undertook dangerous and often fatal…
I always wanted to be a spy, but as I scare easily and can’t keep a secret, it was never going to happen. My respect and fascination with the intelligence community has never abated however, and I will never pass up an opportunity to engage with spy-related content. From going to spy museums across the globe to attending lectures to watching the latest entertaining (and totally unrealistic) spy flick, I love it all. I channel that love into writing humorous spy novels that feature fun, fearless females and ripped-from-the-headlines scenarios.
Do I judge a book by its cover? Why yes, yes I do! And the moment I saw this gorgeous cover I put it right into my shopping cart, paid full price, and never looked back.
Luckily for me, Women in Intelligence happens to be an excellent book where the content more than matched the expectations I had from the fabulous artwork. Although there are a few familiar faces that appear, most of the women were completely new to me. Not the femme fatales of popular culture; these were patriotic women who often went unseen in the background.
I love that Fry truly delves into uncovering the unsung heroines of WWI and WWII, giving these quiet, determined women a chance to be recognized and to shine.
A groundbreaking history of women in British intelligence, revealing their pivotal role across the first half of the twentieth century
From the twentieth century onward, women took on an extraordinary range of roles in intelligence, defying the conventions of their time. Across both world wars, far from being a small part of covert operations, women ran spy networks and escape lines, parachuted behind enemy lines, and interrogated prisoners. And, back in Bletchley and Whitehall, women's vital administrative work in MI offices kept the British war engine running.
In this major, panoramic history, Helen Fry looks at the rich and varied…
This book follows the journey of a writer in search of wisdom as he narrates encounters with 12 distinguished American men over 80, including Paul Volcker, the former head of the Federal Reserve, and Denton Cooley, the world’s most famous heart surgeon.
In these and other intimate conversations, the book…
As a teacher, I spent forty years at the chalkface before finally achieving my ambition to be a published writer. My first novel was about a child migrant to Australia; my second about a little girl on the kinder transport. I wanted to write about strong women in world war two. All three of the mothers in my stories are separated from their children and have to make some tough decisions. I hope my readers will remember them for their courage and tenacity and that they’ll enjoy reading about them as much as I’ve enjoyed creating them.
I’m fascinated by the way the code breakers at Bletchley helped to shorten the war. In Pam, McGurl has created a strong woman, who makes key choices, sometimes at the expense of her own happiness, to support the war effort. But what I really enjoyed was the time slip nature of the novel, where Pam is contrasted to her granddaughter Julia, a modern woman, who, when let down by the men around her, becomes empowered by her own freedom. It’s interesting to see how women’s roles have changed between the 1940s and today.
The latest unforgettable timeslip novel from the USA Today bestselling author of The Secret of the Chateau.
Will love lead her to a devastating choice?
1942. Three years into the war, Pam turns down her hard-won place at Oxford University to become a codebreaker at Bletchley Park. There, she meets two young men, both keen to impress her, and Pam finds herself falling hard for one of them. But as the country's future becomes more uncertain by the day, a tragic turn of events casts doubt on her choice - and Pam's loyalty is pushed to its limits...