Make your own eBooks

Use our Remix App to mix & match content. In minutes make your own course packs, training bundles, custom travel guides, you name it. Even add your own title & cover.


Slices & Articles Get by the slice or add to your own ebook

Medium 9781574412925

Chapter 8. The Cambodian Invasion

James T. Gillam University of North Texas Press PDF


The Cambodian Invasion

May 7 to May 15, 1970


The 1st Battalion, 22nd Infantry lifted off from LZ Jackson Hole for Cambodia in the middle of the afternoon on May 7, 1970.

Col. George Webb, the acting chief of staff for the II FORCEV, wrote a report on what we did there called, “The Commander’s

Evaluation Report—Cambodian Operations.” I read it in the summer of 2003, and I was surprised by the brevity of information about what happened to us that day. The colonel wrote,

“Immediately upon landing, 1/22 made contact with a reinforced platoon in bunkers. Killed 4 NVA. Captured 2 weapons.”1

Maybe the colonel’s terseness was because he was separated from our landing by both time and space. He wrote the report at the end of June, and as the acting chief of staff for the II

FFORCEV, he was not in Cambodia. He was in the command post in the Central Highlands Special Forces camp at New Plei

Djerang. That probably explains why his report makes it seem like the four hundred men of our battalion dropped on a clearing with thirty or forty NVA, shot four of the outnumbered enemy, and took two of their weapons home as souvenirs. It has often been said that truth, like beauty, is in the eye of the beholder.

See All Chapters
Medium 9780980184822

Like a Death Sentence

Jed McKenna Wisefool Press PDF

I make my way downstairs looking for some lunch. As usual, the fridge is stocked with leftovers that have somehow improved with age. I grab some seb pulao, apple rice, and a masala dosa and make a plate, which I nuke for a minute before spooning on some pear chutney. Kings and princes don’t eat this well. I eat standing up in the kitchen. The house is surprisingly quiet. A few of the gang stick their heads in and say hello or ask for help clarifying some point or another, (Q: “Why am I always so dissatisfied? Why can’t I ever just be content?” A: “You weren’t born to be content. Your discontent is the engine that drives you, be grateful to it.” Q: “What does it mean if I saw a blue pearl during meditation?” A: “It means you saw a blue pearl during meditation.” Q: “Where’s the cream?” A: “Top shelf behind the juice.”), but for the most part the house is unusually silent. I don’t think there’s anything special going on, it’s just one of those low energy days. Everybody’s probably lying around, taking naps, reading, keeping to themselves..........

See All Chapters
Medium 9781576337127

Ecology: AP Biology

Ace Academics Ace Academics ePub
Medium 9780596005450

7. Social Engineering

Cyrus Peikari O'Reilly Media ePub

Social engineering is one of the most threatening forms of hacking attacks: traditional technology defenses that security professionals are accustomed to using fall flat on their face when it comes to social engineering. Rebuilding and upgrading an information technology infrastructure (system hardening, firewall deployment, IDS tuning, etc.) protects against network and other technology attacks. However, users cannot be rebuilt or retrofitted. True, they can sometimes be trained, but it is often easier (and thus cheaper) to "train" an IDS to look for attacks than to train the help desk operator to fend off sneaky persuasion attempts. Sometimes humans can be removed from the security loop, but eliminating IT users is not an option for most companies.

As appealing as it might seem, it is impossible to patch or upgrade users. Humans are the weakest link in the security chainespecially poorly trained and unmotivated users. Even in tightly controlled environments, assuring that technical security measures are in place is easier than assuring that users don't inadvertently break a security policy, especially when subjected to expert social engineering assaults.

See All Chapters
Medium 9780596003012

7. Custom Views

Inc, Apple Computer O'Reilly Media ePub

Cocoas default set of controls covers most common UI needs, but it cant cover everything. For example, you might want to create a drawing application and need a view that can have lines and other shapes drawn into it. Or, you might want to create a custom graph of stock data over time. Whenever you have these kind of needs, you will need to create a subclass of NSView: a custom view.

A custom view is responsible for drawing content into, and handling events that occur within, its bounds the rectangular region given to it by its superview. You can use any of Cocoas drawing tools to draw content into the view. In this chapter, well work through a couple of basic custom-view examples to show you how everything works. Then, in the next chapter, youll build on what you learn in this chapter to create a custom view to respond to user events.

When you make a custom subclass of NSView and want to perform custom drawing and handle events, the following procedure applies:

In Interface Builder, define a subclass of NSView, then generate header and implementation files.

See All Chapters

See All Slices