Here are 56 books that The Perfect Weapon fans have personally recommended if you like
The Perfect Weapon.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
Dr. Sean McFate is an expert on international relations and a former military contractor. He is a Senior Fellow at the Atlantic Council, a Washington DC think tank, and a professor at Georgetown University's School of Foreign Service, Syracuse University's Maxwell School, and the National Defense University. He began his career as a paratrooper and officer in the U.S. Army's 82nd Airborne Division.
A difficult book to find, but worth it. Barlow was the founder of Executive Outcomes or “EO,” the (in)famous mercenary corporation based out of South Africa in the 1990s. Now decommissioned, no other private military company has since rivaled EO’s power. When I worked in Africa, I would look to the EO alumnae network for talent. That and former French Foreign Legionnaires. In this memoir, Barlow reflects on his time as a private military commander, his missions, what he’s learned. It’s not prose but it is honest, and the best window into today’s market for force.
This book is currently not available on Bookshop.org or Amazon.
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
I have been in love with London and the UK since I started reading British thrillers over 40 years ago. When I finally had the chance to live in London as a US diplomat, I was able to see so many of those places that had filled my imagination for years. I have my JD from Southern Illinois University. I have worked for the US Army and the US State Department. I now support my wife Karen, who is a US Diplomat.
I have loved this book for 40 years and have read it almost annually.
Forsyth’s detailed descriptions of all aspects of the book make you think you are on the streets of London, in the meetings and the restaurants. While much of the action takes place abroad, its beating heart is London. When I lived there, I visited many of the places described.
#1 New York Times bestselling author Frederick Forsyth delivers an international thriller that takes readers into the darkest hearts of men and nations…
In a remote corner of the impoverished African republic of Zangaro lies Crystal Mountain. At certain times of the day, the mountain itself seems to glow with a strange light. Only the ruthless and untouchable tycoon Sir James Manson knows why: the mountain contains billions of dollars worth of the world’s most valuable mineral—platinum. And he wants it all.
To do so, he must first remove the unfriendly government currently in power and replace it with a…
I have traveled throughout Africa and had the great opportunity to live in West Africa for two years, while I was working for the CIA. That experience was wild and challenging, but also transforming. West Africa became the setting for my first novel, Victor in the Rubble, because I loved the absurdity and adventure I experienced there, where nothing is logical but everything makes sense. I have read a number of novels that take place in different parts of Africa, as well as a wide array of nonfiction books about various African countries, their history, and their leaders. There are so many great stories there that pique my interest and inspire me.
This is a true story that reads like a geopolitical spy thriller, with reckless mercenaries, colorful dictators, and money, money, money.
This is one of the first books I ever read about outsiders looking to take advantage of Africa’s natural resources and the havoc that wreaks.
It revealed to me some of the darkest realities of Africa, the ruthlessness of some leaders, the ubiquitous corruption, and the desire of profiteers to take advantage of it all.
Equatorial Guinea is a tiny country roughly the size of the state of Maryland. Humid, jungle covered, and rife with unpleasant diseases, natives call it Devil Island. Its president in 2004, Obiang Nguema, had been accused of cannibalism, belief in witchcraft, mass murder, billiondollar corruption, and general rule by terror. With so little to recommend it, why in March 2004 was Equatorial Guinea the target of a group of salty British, South African and Zimbabwean mercenaries, travelling on an American-registered ex-National Guard plane specially adapted for military purposes, that was originally flown to Africa by American pilots? The real motive…
A Duke with rigid opinions, a Lady whose beliefs conflict with his, a long disputed parcel of land, a conniving neighbour, a desperate collaboration, a failure of trust, a love found despite it all.
Alexander Cavendish, Duke of Ravensworth, returned from war to find that his father and brother had…
Dr. Sean McFate is an expert on international relations and a former military contractor. He is a Senior Fellow at the Atlantic Council, a Washington DC think tank, and a professor at Georgetown University's School of Foreign Service, Syracuse University's Maxwell School, and the National Defense University. He began his career as a paratrooper and officer in the U.S. Army's 82nd Airborne Division.
What would a world awash in mercenaries look like? Like medieval northern Italy, which was the Afghanistan of its day. Back then, mercenaries were how you fought wars, and anyone who could swipe a check could wage war no matter how absurd or petty. Aristocrats, city-states, and popes routinely hired mercenaries. When I wrote The New Rules of War, I spent three months digging through the archives in Florence, Bologna, and other city-states to understand how the dynamics of private warfare worked. For those who want a feel of the times, try this rare book by famed historian Mallett. It was his last book, finished by Shaw after he died.
The Italian Wars 1494-1559 outlines the major impact that these wars had, not just on the history of Italy, but on the history of Europe as a whole. It provides the first detailed account of the entire course of the wars, covering all the campaigns and placing the military conflicts in their political, diplomatic, social and economic contexts.
Throughout the book, new developments in military tactics, the composition of armies, the balance between infantry and cavalry, and the use of firearms are described and analysed. How Italians of all sectors of society reacted to the wars and the inevitable political…
I became enthused about using mathematical models to understand the natural world as an undergraduate, got trained to do so, and spent my career working on a wide variety of applications. Most recently, I translated ideas from disease modeling to understand cyber variability and security.
To maximize success when applying mathematics to the natural or (for cyber) operational world, one needs to master the appropriate mathematical tools and have a deep knowledge of the subject matter. My recommendations are three really great books that will help you gain proficiency in the needed mathematical tools and how to apply them, and two equally great books on cyber systems.
This is a wonderfully informative introduction to cyber system variability, and is something to both read from cover to cover and have on your shelf (physical or electronic) to dip into from time to time, as I do.
Libicki’s ideas appear throughout my book, including the advice he gives on page 1 that "…when facing a problem such as the threat from cyberspace it pays to be serious but not desperate."
If you seriously want to understand how to use disease models to understand cybersecurity and variability, the books by Libicki and Singer and Friedman provide a fantastic background in the subject matter.
This updated and expanded edition of Cyberspace in Peace and War by Martin C. Libicki presents a comprehensive understanding of cybersecurity, cyberwar, and cyber-terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses strategic aspects of cyberwar, and defines cybersecurity in the context of military operations while highlighting unique aspects of the digital battleground and strategic uses of cyberwar.
This new edition provides updated analysis on cyberespionage, including the enigmatic behavior of Russian actors, making this volume a timely and necessary addition to the cyber-practitioner's library.
I became enthused about using mathematical models to understand the natural world as an undergraduate, got trained to do so, and spent my career working on a wide variety of applications. Most recently, I translated ideas from disease modeling to understand cyber variability and security.
To maximize success when applying mathematics to the natural or (for cyber) operational world, one needs to master the appropriate mathematical tools and have a deep knowledge of the subject matter. My recommendations are three really great books that will help you gain proficiency in the needed mathematical tools and how to apply them, and two equally great books on cyber systems.
This is one of two books (the other is Cyberspace in Peace and War) that I think anybody seriously interested in cyber security (which should be everybody) should have on their shelf.
It is filled with insights on a wide range of topics. I refer to it many times in my book, including why biology is a better metaphor for cyber defense than war, how people new to analytical thinking about cyber systems should approach the topic, the general meaning of cyber security, what it means for a cyber system to be resilient, and the need for operational cyber drills (analogous to experiments in biology).
The writing in this book is accessible, and it is both fun to read and really informative.
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear…
The Duke's Christmas Redemption
by
Arietta Richmond,
A Duke who has rejected love, a Lady who dreams of a love match, an arranged marriage, a house full of secrets, a most unneighborly neighbor, a plot to destroy reputations, an unexpected love that redeems it all.
Lady Charlotte Wyndham, given in an arranged marriage to a man she…
I covered the FBI and CIA for years, first as a print reporter in Washington and then as the head of the NBC News investigative unit. So I have covered my fair share of spy scandals, and with my colleague Pete Williams helped NBC break the story of Robert Hanssen’s arrest. I was immediately drawn to the Ana Montes Cuba spy story when it broke and then learned that Montes had bought her condo from my close friend and college roommate, John. That meant I had spent hours inside Ana’s DC apartment, and that odd connection rooted me in her story in a deeper way.
Jack Devine is the former acting director of the CIA’s Directorate of Operations, and ran covert ops that drove the Russians out of Afghanistan. In this book, he shows how the Russians have undermined our democracy for decades and how they’ve now weaponized cyberspace, too. It’s an alarming wake-up call from a true American spymaster.
I have gotten to know Jack over the years, and have gotten a first-hand glimpseat how clever he must have been running secret operations in some of the world’s scariest neighborhoods. Not a guy to ever underestimate; his books are as fascinating as Jack himself.
In Spymaster's Prism: The Fight Against Russian Aggression legendary former spymaster Jack Devine aims to ignite public discourse on our country's intelligence and counterintelligence posture against Russia, among other adversaries. Spymasters are not spies - their mission is to run and handle spies and spy networks. They exist in virtually all sophisticated intelligence services around the world, including the more high-profile services like the CIA, SVR, SIS, MSS, VAJA and Mossad. Without exception, these spymasters are highly trained and broadly experienced top-level government officials who are at the heart of the intelligence business. They make the life and death decisions.…
The sci-fi/fantasy/crime genre is probably one I’ve known the least about, and I only really started to dive down the rabbit hole when I began writing my series. I’m glad I did. The world-building and lore that is woven into this genre truly sets it apart from the usual stuff. On top of needing an intricate technological imagination that has some grounding in the real world, these kinds of books also need to have characters that are believable and a narrative that is not so futuristic that it strains credulity. It’s a tough mix to get right, but when I find a story that nails these aspects it really immerses me into the world and narrative like nothing else.
Where to start with this one? It is probably considered one of the original titles that brought in the cyberpunk genre and takes you on a wild ride.
What I liked best about this series is the way it delves into the concepts of a soul (a ghost) and whether people who have become cyborg or with a cyborg brain are indeed still human. At what point does the line between human and android overlap?
These greater philosophical questions are brilliantly intertwined with political intrigue, espionage, terrorism, and murder. Plus the main character is a badass sexy cyborg and pro hacker that likes to shoot guns, kick people and drive really fast. What’s not to love?
Deep into the twenty-first century, the line between man and machine has been blurred as humans rely on the enhancement of mechanical implants and robots are upgraded with human tissue. In this rapidly converging landscape, cyborg superagent Major Motoko Kusanagi is charged to track down the craftiest and most dangerous terrorists and cybercriminals, including 'ghost hackers' who are capable of exploiting the human/machine interface and reprogramming humans to become puppets to carry out the hackers' criminal ends.
I worked as an industrial electrician for over two decades. At one point during a meeting to discuss an upcoming project, a question was posed about the delivery time of a specific piece of equipment. When the answer was given that it would be about a year away, it got me thinking: what if a specialized piece of equipment—critical to the grid and with an equally long lead time—was destroyed, how would the grid survive? More importantly; how would we survive? That single statement was the spark that ignited the fire in me to learn all about the grid, and to write Dark State.
Lights Out is another great non-fiction book about electrical grid vulnerabilities. Koppel also spotlights High Power Transformers as the Achilles Heel of our electrical system
But Koppel also does a deep dive on the survivability—or rather lack thereof, of our society if the grid were to be taken down. He even broke down various social classes of people: rural versus urban, and talked about how each group would survive based upon their skillsets and resources available to them. FYI: Ranchers fare best
He even discussed the amazing organization the Mormon Church has put together with regards to the preparedness of each of their members, as well as how they would leverage their collective strengths together as a group.
NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and…
This book follows the journey of a writer in search of wisdom as he narrates encounters with 12 distinguished American men over 80, including Paul Volcker, the former head of the Federal Reserve, and Denton Cooley, the world’s most famous heart surgeon.
In these and other intimate conversations, the book…
I am a cybersecurity risk management thought leader and subject matter expert with hands-on experience in managing and measuring large-scale cybersecurity programs, system security architecture, cybersecurity tools and techniques, cybersecurity forensics, audit of information systems and networks, and technology control processes. I have spent my career educating others in cybersecurity, mostly because it has always been necessary to educate staff; and colleagues soon recognized that I was easily able to handle the transition from staff training to external classroom environments. But my main motivation for external cybersecurity education is to get feedback from the cybersecurity professional community on my approaches to today’s cybersecurity issues.
Amoroso’s experience started with academic research at Bell Labs and Stevens Institute of Technology but moved quickly to practically fill voids at AT&T and NSA. His book reduces technical concepts in cybersecurity to basic principles and explains generically how they are effectively implemented. For the true techy who wants to fully understand all the formal logic behind the theories in Cyber Attacks, reach back to Ed Amoroso’s Fundamentals of Computer Security Technology (1994).
Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.
This book covers cyber security policy development for…