It was meant to be a simple task of repossessing an executive jet from Nigeria... Mike became embroiled in a mess created by an English aristocrat involved in illegal currency dealing. At the same time, Mossad agents were plotting the kidnapping of a Nigerian diplomat in Kensington. To escape certain death from two groups of very angry Nigerians, Mike took off from Lagos International Airport, without permission, only to have the Nigerian Air Force waiting to shoot him down. They didn't succeed but Mike was arrested in The Ivory Coast where he finally landed. In a horrible twist, Mike's friends, two engineers who helped him escape, were jailed in Nigeria for two years. This incredible true story will make you hold your breath, laugh and cry.
Michael Howard Books
Michael Howard was a distinguished British military historian whose work provided profound insights into the nature of warfare and its societal consequences. He was known for his meticulous research and his ability to connect historical conflicts with broader social and political landscapes. Howard's scholarship explored both past engagements and future strategic considerations.






Designing & Developing Secure Azure Solutions
- 528 pages
- 19 hours of reading
Plan, build, and maintain highly secure Azure applications and workloads as they transition to the Microsoft Azure cloud, facing new threats. It is essential to integrate robust security into designs, apply proven best practices throughout the development lifecycle, and utilize multiple Azure services to enhance security. A team of Azure security experts provides a practical tutorial for tackling immediate security challenges and serves as a definitive reference for the future. Learn to maximize the platform by combining various Azure security technologies at both application and network layers, guiding you from design and development through testing, deployment, governance, and compliance. This resource is intended for Azure application designers, architects, developers, development managers, testers, and anyone aiming to ensure their cloud designs and code are secure. Discover effective strategies to improve app and workload security, minimize attack surfaces, and implement zero trust in cloud code. Learn to apply security patterns for common issues, model threats for effective mitigations, and implement modern identity solutions like OpenID Connect and OAuth2. Utilize Azure monitoring, logging, and Kusto queries, safeguard workloads with Azure Security Benchmark best practices, and review secure coding principles. Additionally, strengthen CI/CD automated workflows, container, and network security while understanding compli
The Treasures of Monet
- 63 pages
- 3 hours of reading
Produced in association with the Musee Marmottan Monet, this beautifully illustrated book looks at the life and work of the leading light in the Impressionist movement.
The Impressionists by Themselves
A Selection of Their Paintings, Drawings, and Sketches with Extracts from Their Writings
- 328 pages
- 12 hours of reading
Through a selection of paintings, drawings and sketches by more than 20 painters, and extracts from their writings, this book provides an insight into the lives of the men and women who forged the Impressionist movement. Personalities featured include Renoir, Monet, Degas and Pissarro.
Secure Software Development Series: Developing More-Secure Microsoft® ASP.NET 2.0 Applications - 2005 Edition
- 480 pages
- 17 hours of reading
Build your expertise for developing more-secure applications with ASP.NET 2.0. A leading security expert delivers best practices, pragmatic instruction, and extensive code samples in Microsoft Visual C# to help you develop Web applications that are more robust, more reliable, and more resistant to attack. Discover how PLUS—Get code samples on the Web
The Franco-Prussian War
- 526 pages
- 19 hours of reading
A tour de force of both European and military history, The Franco-Prussian War is a superb account of this hugely important conflict, ideal for the student, historian and general reader alike. This Routledge Classics edition includes a new Foreword by Bertrand Taithe.
Clausewitz on strategy
- 208 pages
- 8 hours of reading
Think about strategy and sharpen judgment in an unpredictable environment Carl von Clausewitz is widely acknowledged as one of the most important of the major strategic theorists; he's been read by Eisenhower, Kissinger, Patton, Chairman Mao, and numerous other leaders.
Benjamin Franklin Bridge
- 130 pages
- 5 hours of reading
Focusing on the historical significance, this book showcases the Benjamin Franklin Bridge, highlighting its original construction as the longest suspension bridge in the world in 1926. It features rare images documenting the planning, construction, and the people behind the bridge's creation. Additionally, the vintage photographs capture the bridge's evolution over the decades, emphasizing its enduring role as a symbol of the Philadelphia-Camden metropolitan area.
Impressionism
- 192 pages
- 7 hours of reading
Describes how to put software security into practice, covering such topics as risk analysis, coding policies, Agile Methods, cryptographic standards, and threat tree patterns.


