The Lazarus Operation


Book Description

When Eddie Lieb, a bar pianist and retired professor has a chance argument with small time racketeer Frank Devito and a young dancer named Arnold he is drawn into a dangerous political conspiracy that threatens to topple the federal government. The Lazarus Operation concerns the unraveling of a major political conspiracy as seen through the eyes of two ordinary citizens, Eddie Lieb and Fred Giammatti. Lieb is a recovering alcoholic, formerly a professor of chemistry and now working as a bar pianist. Through a chance encounter with the son of a right-wing presidential candidate and a small time racketeer he becomes embroiled in a big time political plot. Unable to do anything himself he turns to Fred Giammatti a middle-aged political columnist for the New York Times who was a friend of Lieb’s father, Gus Lieb a retired sportswriter. Giammatti, aided by his protégée reporter Ted Laszko and his friend Detective Al Seidenberg, slowly uncovers the plot by a powerful collection of religious zealots who have managed to infiltrate all levels of the federal bureaucracy. Peopled by dangerous assassins and an assortment of quirky people including the President and Vice President the story builds to a crackling conclusion that eventually vindicates the American spirit.




The Lazarus Operation


Book Description




The Lazarus Code


Book Description

The chief technology officer of a radical biotechnology company escapes a deadly double-cross with a secret that will change the future of mankind.




Cyber Operations


Book Description

Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations. Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed. Cyber Operations readers will also find: Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure Insight from an author with top-level experience in cyber security Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.




The Lazarus War: Origins


Book Description

"A gripping read that moves at warp speed." -- Jack Campbell on The Lazarus War: Artefact For someone who has died and come back as many times as Conrad Harris, the nickname Lazarus is well-deserved. His elite military teams are specialists in death -running suicide missions in simulant bodies to combat the alien race known as the Krell.But now the Krell Empire has wreaked such devastation that military command is desperate for a new strategy. And Harris and his team are being sent on a mission that could finally turn the tide of the war.










Library of Congress Subject Headings


Book Description




The Lazarus Files


Book Description

A deeply-reported, riveting account of a cold case murder in Los Angeles, unsolved until DNA evidence implicated a shocking suspect – a female detective within the LAPD’s own ranks. On February 24, 1986, 29-year-old newlywed Sherri Rasmussen was murdered in the home she shared with her husband, John. The crime scene suggested a ferocious struggle, and police initially assumed it was a burglary gone awry. Before her death, Sherri had confided to her parents that an ex-girlfriend of John’s, a Los Angeles police officer, had threatened her. The Rasmussens urged the LAPD to investigate the ex-girlfriend, but the original detectives only pursued burglary suspects, and the case went cold. DNA analysis did not exist when Sherri was murdered. Decades later, a swab from a bite mark on Sherri’s arm revealed her killer was in fact female, not male. A DNA match led to the arrest and conviction of veteran LAPD Detective Stephanie Lazarus, John’s onetime girlfriend. The Lazarus Files delivers the visceral experience of being inside a real-life murder mystery. McGough reconstructs the lives of Sherri, John and Stephanie; the love triangle that led to Sherri’s murder; and the homicide investigation that followed. Was Stephanie protected by her fellow officers? What did the LAPD know, and when did they know it? Are there other LAPD cold cases with a police connection that remain unsolved?




Cyber Operations and International Law


Book Description

This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.