Operation Four Rings


Book Description

After the ceasefire in Laos in February 1973, London forbids Colonel Jason Rance, the British Defence Attaché in Laos, from continuing his search for four Lao ‘moles’, who work within the Communist Party and wear a dedicated ring as a talisman. Unsanctioned contingency plans are therefore made by others for Rance to continue his work with the moles, the ‘Four Rings’, in an unattributable Operation Four Rings. But Rance remains ignorant of the plan and does not know he is in imminent danger. The communists now suspect the Four Rings as well as Colonel Rance and they launch their own Operation Four Rings: to kill the four moles and the British Defence Attaché. The tightest of races ensues. Based on historical fact and the author’s personal experience, Operation Four Rings is the fifth in a series of books involving Gurkha military units and includes Operation Black Rose, Operation Janus, Operation Blind Spot and Operation Stealth. The author, a retired Gurkha colonel, draws on real characters and events he witnessed across various theatres of war.




Operation Stealth


Book Description

In post-WWII Laos, Vietnamese communists secretly commence to infiltrate the kingdom. They are countered by four dedicated Lao ‘moles’ who try to thwart these aims. Gurkha Colonel Jason Rance is unwittingly dragged into a confrontation between one of the Lao moles and a Thai spy and the mole gives him a ring as a reward for saving his life. During his appointment in Laos as military attaché, Rance becomes a target of the KGB and of the Vietnamese communists, and is sought by the remaining three Lao moles because of the ring in his possession. Rance’s two Lao language instructors are nieces of the Lao king and London hopes that, by stealth, Rance might, through them, persuade the king delay his coronation no further in an effort to prevent the spread of communism southwards. Can the new military attaché manage to do the seemingly impossible? Based on historical fact and the author’s personal experience, Operation Stealth is the fourth in a series of books involving Gurkha military units that may be read in any order and includes Operation Black Rose, Operation Janus, Operation Blind Spot and Operation Four Rings. The author, JP Cross, a much revered retired Gurkha colonel, draws on real characters and events he witnessed across various theatres of war.




The Feldspars


Book Description




Confidential Documents


Book Description




Technical Data Digest


Book Description







Transputer Research and Applications 6


Book Description

Papers in this book report on a wide variety of multicomputer applications, systems and architectures. They all have one aspect on common which is message passing multiprocessors. It includes research presentations of the T9000, TI C-40 and T8/i860-based multicomputers.




The NOL Four-ring Three-phase Ac Arc Heater (Mk IV)


Book Description

The design and performance of a four-ring three-phase ac ARC Heater are described. Successful operation at pressures of 10 to 33 atmospheres, temperatures of 2000 to 5000 degrees K and efficiencies of 25 to 60 percent has been demonstrated. Improvements in heater components will allow pressures of 70 atmospheres to be obtained. (Author).




Virtual Machines


Book Description

Virtual Machine technology applies the concept of virtualization to an entire machine, circumventing real machine compatibility constraints and hardware resource constraints to enable a higher degree of software portability and flexibility. Virtual machines are rapidly becoming an essential element in computer system design. They provide system security, flexibility, cross-platform compatibility, reliability, and resource efficiency. Designed to solve problems in combining and using major computer system components, virtual machine technologies play a key role in many disciplines, including operating systems, programming languages, and computer architecture. For example, at the process level, virtualizing technologies support dynamic program translation and platform-independent network computing. At the system level, they support multiple operating system environments on the same hardware platform and in servers.Historically, individual virtual machine techniques have been developed within the specific disciplines that employ them (in some cases they aren't even referred to as "virtual machines), making it difficult to see their common underlying relationships in a cohesive way. In this text, Smith and Nair take a new approach by examining virtual machines as a unified discipline. Pulling together cross-cutting technologies allows virtual machine implementations to be studied and engineered in a well-structured manner. Topics include instruction set emulation, dynamic program translation and optimization, high level virtual machines (including Java and CLI), and system virtual machines for both single-user systems and servers.*Examines virtual machine technologies across the disciplines that use them—operating systems, programming languages and computer architecture—defining a new and unified discipline.*Reviewed by principle researchers at Microsoft, HP, and by other industry research groups.*Written by two authors who combine several decades of expertise in computer system research and development, both in academia and industry.




Detecting Peripheral-based Attacks on the Host Memory


Book Description

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.