You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
*** The new novel from the author of the highly acclaimed The Butchers of Berlin, soon to be a TV series *** Berlin, July 1944, a world of illicit jazz clubs, sexually generous young women, suspect art dealers, last-ditch zealots and a city defined by crumbling infrastructure, advanced terror, dirty secrets and deep politics — and then there is August Schlegel, caught askance in a web of totalitarian mayhem. Everybody knows what happened on 20 July: Führer Adolf Hitler miraculously survived an assassination attempt when a bomb failed to kill him. Schlegel, a reluctant employee of the Gestapo, finds himself in the foolhardy position of questioning the official version, knowing it is the la...
‘Conjuring a wartime Berlin where atrocities get lost against a ground of escalating Holocaust and crumbling rationales, Chris Petit’s nerve-wracking S.S. procedural nurses a dread that penetrates right to the marrow' Alan Moore Berlin 1943. August Schlegel lives in a world full of questions with no easy answers. Why is he being called out on a homicide case when he works in financial crimes? Why did the old Jewish soldier with an Iron Cross shoot the block warden in the eye then put a bullet through his own head? Why does Schlegel persist with the case when no one cares because the Jews are all being shipped out anyway? And why should Eiko Morgen, wearing the dreaded black uniform of the SS, turn up and say he has been assigned to work with him? Corpses, dressed with fake money, bodies flayed beyond recognition: are these routine murders committed out of rage or is someone trying to tell them something ... 'Powerful evocation of a city living in terror' Sunday Times Crime Club 'Ambitious, darkly atmospheric' The Times
The Mormon Prophet, Brigham Young, had a vision. He would rule the kingdom of Deseret stretching from the Rocky Mountains to the Pacific. In Deseret, the church founded by Joseph Smith would find freedom from its persecutors. In Deseret, the church could practice the doctrines of Polygamy and Blood Atonement that made Young feel so powerful. Two people Brigham Young wanted to share Deseret with him were Christopher Wolf and his strikingly beautiful wife, Ann. Christopher, he wanted as a Danite protector and Ann as one of his plural wives. Ann, however, was as stubborn as she was beautiful and Christopher seemed to have a protector of his own. Did the charm depicting an English Cathedral, hanging around Christopher's neck have some kind of power? Or was it the Indian army scout, whom some Mormons said was an angel who always seemed to show up to upset Brigham Young's plans? Was the temple of Deseret the door to the Celestial Kingdom, or is Jesus Christ the door? The story of Deseret will carry you through the tumultuous events that helped form the United States as a land from "sea to shining sea," and the Church of Jesus Christ of Latter-Day Saints into a unique American religion.
Soon after Victorian messenger Barnaby Grimes is attacked by a huge beast while crossing London's rooftops, he becomes entangled in a mystery involving patent medicine, impoverished patients, and very expensive furs.
For more than four hundred years, the males of the Ostermann family have unleashed their secret power on the world, destroying lives and amassing great fortunes. But five centuries prior, the first woman to inherit the identical gene as the males foretold that another female would be born with the same power. It was she who would stand against the madness of the Ostermann reign. No one knew when she would come...until now. In present-day British Columbia, Wolf Ostermann rules his exotic estate with an iron fist. Ostermann has no son to continue his family legacy, so if he and his family are to maintain their economic grip on the world, Wolf must indoctrinate his reluctant daughter, Tara. Unf...
* This will be the only complete virtualization reference on the market; brings all virtualization technologies together * Microsoft has shifted its training strategy to include virtual machine technology in all new ALS/MOC courses, which leads to high demand for knowledge about this technology * Covers both Microsoft and Linux environments
Television shows like CSI, Forensic Files, and The New Detectives make it look so easy. A crime-scene photographer snaps photographs, a fingerprint technician examines a gun, uniformed officers seal off a house while detectives gather hair and blood samples, placing them carefully into separate evidence containers. In a crime laboratory, a suspect's hands are meticulously examined for gunshot residue. An autopsy is performed in order to determine range and angle of the gunshot and time-of-death evidence. Dozens of tests and analyses are performed and cross-referenced. A conviction is made. Another crime is solved. The credits roll. The American public has become captivated by success stories...
The "Be the Boss" edition, which also in its 2nd edition guides you to leadership success, is published by a government-funded publisher involved in EU programs and a partner of the Federal Ministry of Education. It offers you the concentrated expertise of renowned experts (overview in the book preview), as well as tailored premium content and access to travel deals with discounts of up to 75%. At the same time, you are doing good and supporting sustainable projects. Because in a professional world driven by communication, the power of communication is crucial for building strong professional relationships. 'The Power of Communication - Strengthening Professional Relationships through Effect...
This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2005, held in Les Diablerets, Switzerland in January 2005. The 28 revised full papers presented were carefully reviewed and selected from 126 submissions. The papers are organized in topical sections on cryptanalysis, key establishment, optimization, building blocks, RSA cryptography, multivariate asymmetric cryptography, signature schemes, and identity-based cryptography.
The business to business trade publication for information and physical Security professionals.