It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 02235nam a2200409 4500
001 2005044
003 IlBcCP
005 20180215151910.0
008 171121s2017 mauab b 001 0 eng
020 $a0763660426
020 $a9780763660420
040 $cIlBcCP$dUtOrBLW
082 14 $a355.4/109$223
092 $aj355.4109$bJANE
100 1 $aJaneczko, Paul B.
245 10 $aDouble cross :$bdeception techniques in war /$cPaul B. Janeczko.
250 $aFirst edition.
260 $aSomerville, Massachusetts :$bCandlewick Press,$c2017.
300 $a240 p. :$bill., maps ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references (pages 235-237) and index.
520 $aThe biblical account of Gideon. The ancient story of the Trojan horse. Deceptive techniques have been used in war through the ages. But while the principles have changed very little, the technology behind fooling the enemy has evolved dramatically. Paul B. Janeczko s fascinating chronology focuses on the American Civil War, World Wars I and II, and the Korean War, the Vietnam War, and the Gulf Wars to reveal evolving attitudes toward the use and effectiveness of deceptive operations.
521 2 $a4567$bChildrens Plus, Inc.
650 0 $aDeception (Military science)$vJuvenile literature.
907 $a.b34532134$b02-16-18$c10-12-17
998 $a(2)xmj$a(2)o7j$a(2)r3j$b12-12-17$cm$da $e-$feng$gmau$h0$i6
907 $a.b34532134$b02-06-18$c10-12-17
975 $aSFR
980 $a1217 ChP
998 $a(2)xmj$a(2)o7j$a(2)r3j$b12-12-17$cm$da$e-$feng$gmau$h0$i6
992 $aChP
999 $yMARS
945 $aj355.4109$bJANE$d - - $e02-08-2018 15:09$f0$g0$h02-13-18$i31223124542425$j503$0507$k - - $lxmjci$o-$p$16.99$q-$r-$s- $t0$u1$v0$w0$x1$y.i92862172$z12-12-17
945 $aj355.4109$bJANE$d - - $e08-15-2018 13:20$f0$g0$h08-16-18$i31223124542417$j261$0263$k - - $lo7jaa$ol$p$16.99$q-$r-$s- $t0$u4$v0$w1$x3$y.i92862160$z12-12-17
945 $aj355.4109$bJANE$d - - $e06-11-2018 17:52$f0$g0$h07-06-18$i31223124542433$j321$0323$k - - $lr3jaa$ol$p$16.99$q-$r-$s- $t0$u2$v0$w0$x2$y.i92862184$z12-12-17