Cobra II: The Inside Story of the Invasion and Occupation of by Michael R. Gordon

By Michael R. Gordon

Written by way of the executive army correspondent of the New York occasions and a famous retired Marine normal, this is often the definitive account of the invasion of Iraq.

A wonderful paintings of investigative journalism, Cobra II describes in riveting element how the yankee rush to Baghdad supplied the chance for the virulent insurgency that undefined. As Gordon and Trainor exhibit, the brutal aftermath used to be no longer inevitable and used to be a shock to the generals on each side. according to entry to unseen records and particular interviews with the boys and girls on the middle of the conflict, Cobra II presents firsthand money owed of the battling at the floor and the high-level making plans backstage. Now with a brand new afterword that addresses what transpired after the fateful occasions of the summer season of 2003, it is a peerless new version and research of the primary occasion of our times.

Show description

Read or Download Cobra II: The Inside Story of the Invasion and Occupation of Iraq PDF

Similar security books

CCNA Security (640-554) Portable Command Guide

<P style="MARGIN: 0px">All the CCNA safety 640-554 instructions in a single compact, moveable source
<P style="MARGIN: 0px"> 
<P style="MARGIN: 0px">Preparing for the most recent CCNA® protection examination? listed here are the entire CCNA safeguard instructions you wish in a single condensed, moveable source. choked with priceless, easy-to-access info, the CCNA protection transportable Command advisor is moveable sufficient so you might use no matter if you’re within the server room or the gear closet.
<P style="MARGIN: 0px"> 
<P style="MARGIN: 0px">Completely up-to-date to mirror the recent CCNA protection 640-554 examination, this quickly reference summarizes correct Cisco IOS® software program instructions, key words, command arguments, and linked activates, and gives information and examples for utilizing those instructions to real-world protection demanding situations. all through, configuration examples supply a good deeper realizing of ways to exploit IOS to guard networks.
<P style="MARGIN: 0px"> 
<P style="MARGIN: 0px">Topics coated contain
<P style="MARGIN: 0px">•  Networking defense basics: recommendations, regulations, concepts, and extra
<P style="MARGIN: 0px">•  Securing community infrastructure: community foundations, CCP, administration aircraft and entry, and information planes (IPv6/IPv4)
<P style="MARGIN: 0px">•  safe connectivity: VPNs, cryptography, IPsec, and extra
<P style="MARGIN: 0px">•  hazard keep an eye on and containment: innovations, ACL possibility mitigation, zone-based firewalls, and Cisco IOS IPS
<P style="MARGIN: 0px">•  Securing networks with ASA: ASDM, easy and complicated settings, and ASA SSL VPNs
<P style="MARGIN: 0px">  
<P style="MARGIN: 0px"> Bob Vachon is a professor at Cambrian university. He has held CCNP certification given that 2002 and has collaborated on many Cisco Networking Academy classes. He used to be the lead writer for the Academy’s CCNA safety v1. 1 curriculum that aligns to the Cisco IOS community defense (IINS) certification examination (640-554).
<P style="MARGIN: 0px"> 
<P style="MARGIN: 0px">·   entry all CCNA defense instructions: use as a brief, offline source for study and recommendations
<P style="MARGIN: 0px">·   Logical how-to subject groupings offer one-stop study
<P style="MARGIN: 0px">·   nice for overview earlier than CCNA defense certification assessments
<P style="MARGIN: 0px">·   Compact dimension makes it effortless to hold with you, anywhere you cross
<P style="MARGIN: 0px">·   “Create your personal Journal” part with clean, covered pages permits you to customize the e-book in your wishes
<P style="MARGIN: 0px">·    “What do you need to Do? ” chart inside of entrance hide allows you to fast reference particular initiatives
<P style="MARGIN: 0px"> 
<P style="MARGIN: 0px">This e-book is a part of the Cisco Press® Certification Self-Study Product relatives, which bargains readers a self-paced learn regimen for Cisco® certification assessments. Titles within the Cisco Press Certification Self-Study Product kinfolk are a part of a instructed studying application from Cisco that comes with simulation and hands-on education from approved Cisco studying companions and self-study items from Cisco Press.
<P style="MARGIN: 0px"> 
<P style="MARGIN: 0px"> 

Cyberpolitics in International Relations: Competing Visions of Technology in 1960s America

Our on-line world is generally stated as a primary truth of lifestyle in today's international. until eventually lately, its political influence was once regarded as an issue of low politics -- heritage stipulations and regimen strategies and judgements. Now, although, specialists have started to acknowledge its impression on excessive politics -- nationwide defense, middle associations, and significant determination tactics.

Emergency planning for nuclear power plants

This ebook presents a heritage of emergency making plans with recognize to nuclear strength plant injuries from the 1950’s to the 2000’s. It provides an outline of crucial innovations operating emergency planner may still recognize, together with short overviews of the healthiness physics and plant engineering that applies to emergency making plans.

Additional info for Cobra II: The Inside Story of the Invasion and Occupation of Iraq

Sample text

S. allies to "hold hands" and jointly seal the Afghan-Pakistani border. But the Pakistani forces were not effective and the mujahidin were illmotivated and corrupt. S. did not seem to have the right search party. html (44 of 532)21-08-2010 15:42:37 Cobra II: The Inside Story of the Invasion and Occupation of Iraq Unhappy with the way Tora Bora was going, Franks voiced to his staff dissatisfaction with Lieutenant General Paul Mikolashek, his successor at Third Army, who was overseeing the land war in Afghanistan from Camp Doha, Kuwait.

Then Franks turned to Macgregor and asked him to outline his case. S. forces to reach Baghdad and take out the regime in ninety-six hours. As a feint, he proposed stationing Army helicopters on an aircraft carrier and launching them into southern Iraq. Mike "Rifle" DeLong, the three-star Marine general who served as Franks's deputy, was skeptical. He thought the small force might be vulnerable to Iraqi WMD. S. engaged in a lengthy buildup. S. forces moved fast they would catch the Iraqis flat-footed.

5 With an eye on a potential Iraqi collapse, Zinni developed the plan further. CENTCOM's OPLAN 100398 called for three corps, some 380,000 troops in all. Under the plan, the XVIII Airborne Corps would secure northern Iraq. The V Corps or another heavy corps would occupy the potentially volatile Sunni Triangle. A Marine Expeditionary Force would have the south. Their job would not only be to dispatch Saddam's Republican Guard but stop Iranian- and Syrian-sponsored groups from sneaking into the country to stir up trouble, maintain law and order, and, in general, prevent chaos.

Download PDF sample

Rated 4.16 of 5 – based on 42 votes