- All Fiction
- Military Fiction
- Historical Fiction
- Mystery & Thriller
- Romance
- See all fiction collections
1 of 1 copy available
1 of 1 copy available
Featuring eight plates of specially commissioned artwork alongside carefully chosen archive photographs, this study charts the history and appearance of the Soviet Union's naval infantry, from the October Revolution to the end of the Soviet era.
Although Russian naval infantry achieved fame during the October Revolution they were quickly disbanded, only being re-established in 1939. Following the Axis invasion of 1941 some 500,000 Soviet Navy personnel served on land, fighting in the defence of Leningrad, Odessa and Sevastopol and the recapture of the Crimea in 1943–44; Soviet naval troops also participated in the invasion of Manchuria in 1945.
During the Cold War era the Soviet Union developed an amphibious assault capability that had a vital strategic role – to capture an aggressor's geographical exits to the oceans and thereby forestall threats to Soviet submarine bases. Naval infantry forces could deploy a wealth of firepower assets, while the use of amphibious ships, hovercraft and helicopters aided their rapid deployment, even amid ice-bound terrain in the Arctic. All of these developments are described and illustrated in absorbing detail in this study.
-
Creators
-
Series
-
Publisher
-
Release date
February 16, 2023 -
Formats
-
Kindle Book
-
OverDrive Read
- ISBN: 9781472851635
-
EPUB ebook
- ISBN: 9781472851635
- File size: 14814 KB
-
-
Languages
- English
Formats
- Kindle Book
- OverDrive Read
- EPUB ebook
subjects
Languages
- English
Loading
Why is availability limited?
×Availability can change throughout the month based on the library's budget. You can still place a hold on the title, and your hold will be automatically filled as soon as the title is available again.
The Kindle Book format for this title is not supported on:
×Read-along ebook
×The OverDrive Read format of this ebook has professional narration that plays while you read in your browser. Learn more here.