Secret Projects of the Luftwaffe - Vol 1 - Jet Fighters 1939 -1945


Book Description

Germany’s air ministry was quick to grasp the potential of the jet engine as early as 1938 and by 1939 several German aircraft manufacturers were already working on fighter designs that would utilize this new form of propulsion. Rocket engines too were seen as the way of the future and companies were commissioned to design fighters around them. As the Second World War began, the urgent need to bring these advanced new types into production saw a host of innovative aircraft designs being produced which would eventually result in Messerschmitt’s Me 262 jet fighter and the Me 163 rocket-propelled interceptor. And as the war progressed, efforts were increasingly made to find better ways of utilizing jet, rocket and latterly ramjet engines in fighter aircraft. Aviation companies from across Germany set their finest minds to the task and produced some of the most radical aircraft designs the world had ever seen. They proposed rotating wing ramjet fighters, arrowhead-shaped rammers, rocket-firing bat-winged gun platforms, sleek speed machines, tailless flying wings, tiny mini fighters and a host of others ranging from deadly looking advanced fighters to downright dangerous vertical launch interceptors. Secret Projects of the Luftwaffe Volume 1: Jet Fighters 1939-1945 by Dan Sharp, based on original research using German wartime documents, offers the most complete and authoritative account yet of these fascinating designs through previously unseen photographs, illustrations and period documentation from archives around the world.




Project Natter


Book Description

In 1944, in response to the bombing of German cities and factories by the Allies, an inventor named Erich Bachem developed 'Projekt Natter' ('Viper'), an extraordinary, highly-secret, vertical take-off, semi-expendable, single-seat rocket-fighter armed with a nose-mounted 'honeycomb' of 73-mm or 55-mm spin-stabilized air-to-air rockets as well as 30-mm cannon. The Natter was intended to offer high-speed defense of key targets. Once blasted into the air from its vertical launch tower, the pilot of the Natter was to climb towards an enemy formation using an internal rocket, target an enemy bomber and fire his battery of rockets. He would then use the remaining kinetic energy to climb higher than the bombers in order to mount a ramming attack. Just before impact, the pilot was to trigger a mechanism that would activate an ejection seat and separate the rocket unit, which would return to earth by means of an automatically deployed parachute for reuse. Relatively little has been published on the Natter and this book will provide a detailed and definitive account of this unusual but fascinating aircraft. This will be required reading for all those interested in the history of the Luftwaffe during World War II, particularly for those fascinated by the radical and revolutionary projects which German aircraft designers contrived toward the end of the Nazi regime.




Reports


Book Description




Captured Eagles


Book Description

The growth in size, lethality, and technology of the German Luftwaffe was of concern to some defense planners in the United States before American entry into the war. Learning about the Luftwaffe became a significant effort once the conflict broke out in Europe. From defectors with German aircraft to battlefield trophies and combat crew reports, the race to understand German aero technology took on sometimes heroic proportions. After the war, German technology infused American aerospace developments in many ways: German ribbon parachutes were evaluated for high-speed bailouts; sweptwing leading edge slat technology benefited the F-86 Sabre; overall comprehension of sweptwing benefits to fast jet aircraft was validated; pulse jet V1s and supersonic V2 rockets boosted American drone weapon, ballistic missile, and space exploration efforts. In this volume Frederick A. Johnsen traces that path of discovery.







Fighting Hitler's Jets


Book Description

Fighting Hitler's Jets brings together in a single, character-driven narrative two groups of men at war: on one side, American fighter pilots and others who battled the secret “wonder weapons” with which Adolf Hitler hoped to turn the tide; on the other, the German scientists, engineers, and pilots who created and used these machines of war on the cutting edge of technology. Written by Robert F. Dorr, renowned author of Zenith Press titles Hell Hawks!, Mission to Berlin, and Mission to Tokyo, the story begins with a display of high-tech secret weapons arranged for Hitler at a time when Germany still had prospects of winning the war. It concludes with Berlin in rubble and the Allies seeking German technology in order to jumpstart their own jet-powered aviation programs. Along the way, Dorr expertly describes the battles in the sky over the Third Reich that made it possible for the Allies to mount the D-Day invasion and advance toward Berlin. Finally, the book addresses both facts and speculation about German weaponry and leaders, including conspiracy theorists’ view that Hitler escaped in a secret aircraft at the war’s end. Where history and controversy collide with riveting narrative, Fighting Hitler’s Jets furthers a repertoire that comprises some of the United States’ most exceptional military writing.







International Marketing in the Network Economy


Book Description

The capability of MNCs to create, transfer and combine knowledge from different locations is an important determinant of corporate success. This book uses examples of knowledge-based firms - Hewlett-Packard Consulting & Integration, Siemens, Mazda, and Maekawa - to show that knowledge-based marketing is key to a sustainable competitive advantage.




API Security in Action


Book Description

"A comprehensive guide to designing and implementing secure services. A must-read book for all API practitioners who manage security." - Gilberto Taccari, Penta API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. A web API is an efficient way to communicate with an application or service. However, this convenience opens your systems to new security risks. API Security in Action gives you the skills to build strong, safe APIs you can confidently expose to the world. Inside, you’ll learn to construct secure and scalable REST APIs, deliver machine-to-machine interaction in a microservices architecture, and provide protection in resource-constrained IoT (Internet of Things) environments. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology APIs control data sharing in every service, server, data store, and web client. Modern data-centric designs—including microservices and cloud-native applications—demand a comprehensive, multi-layered approach to security for both private and public-facing APIs. About the book API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. When you’re done, you’ll be able to create APIs that stand up to complex threat models and hostile environments. What's inside Authentication Authorization Audit logging Rate limiting Encryption About the reader For developers with experience building RESTful APIs. Examples are in Java. About the author Neil Madden has in-depth knowledge of applied cryptography, application security, and current API security technologies. He holds a Ph.D. in Computer Science. Table of Contents PART 1 - FOUNDATIONS 1 What is API security? 2 Secure API development 3 Securing the Natter API PART 2 - TOKEN-BASED AUTHENTICATION 4 Session cookie authentication 5 Modern token-based authentication 6 Self-contained tokens and JWTs PART 3 - AUTHORIZATION 7 OAuth2 and OpenID Connect 8 Identity-based access control 9 Capability-based security and macaroons PART 4 - MICROSERVICE APIs IN KUBERNETES 10 Microservice APIs in Kubernetes 11 Securing service-to-service APIs PART 5 - APIs FOR THE INTERNET OF THINGS 12 Securing IoT communications 13 Securing IoT APIs




German Secret Weapons of the Second World War


Book Description

“A comprehensive, highly detailed study [that] displays a stunning wealth of technical knowledge . . . a brisk and understandable narrative.” —HistoryNet The phrase “German secret weapons” immediately conjures up images of the V-1 and V-2 missiles that bombarded London in 1944. But what of the V-3 and V-4? What of Schmetterling, the Rochling shell, the Kurt bomb, the Hs293? These, and many other devices, were all part of the German secret armory, but are relatively unknown except to a handful of specialists. What of the German nuclear bomb? And the question of chemical warfare? The sheer magnitude of the secret weapon projects of the Third Reich is revealed in this comprehensive study written by one of the world’s great experts on weaponry. The book explores the various fields in which the Germans concentrated their weapon development and discusses the multiplicity of ideas, the difficulties, and, in several cases, how these ideas were subsequently exploited by the victors. Although much of the German wartime development was not completed before the war’s end, it nevertheless provided a foundation for a great deal of the munitions development that has since taken place. Comparisons with Allied projects are also drawn. This book explodes some of the myths surrounding Hitler’s secret weapons to reveal a truth all the stranger for being fact. Includes photographs and line drawings