Related Books
OPFOR SMARTbook 2 - North Korean Military
OPFOR SMARTbook 1 - Chinese Military
OPFOR SMARTbook 3 - Red Team Army, 2nd Ed.
OPFOR SMARTbook 4 - Iranian Military
OPFOR SMARTbook 5 - Irregular & Hybrid Threat
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1)
INFO1: The Information Operations & Capabilities SMARTbook
OPFOR SMARTbook 2 - North Korean Military


ISBN-10 :978-1-935886-55-6
Release Note :Projected Aug 2022
Norman M. Wade
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:316
This book is currently in development.
North Korean Forces, Operations & Tactics
OPFOR2 topics and chapters include the strategic environment (intro to North Korea, capabilities & intent, framework for military operations), force structure (KPA: Ground Forces, Navy, Air & Air Defense Force, Strategic Force, Special Operations, Reserve and Paramilitary forces, Internal Security & Intel Services), functional tactics, reconnaissance & security, offensive and defensive actions (operational level divisions & regiments, tactical level, complex operational environments), counterstability actions, electronic intelligence warfare, equipment and capabilities.
North Korea is one of the most militarized countries in the world and remains a critical security challenge for the United States, our Northeast Asian allies, and the international community. The Kim regime has seen itself as free to take destabilizing actions to advance its political goals, including attacks on South Korea, development of nuclear weapons and ballistic missiles, proliferation of weapons, and cyberattacks against civilian infrastructure worldwide.
The Korean Peninsula is a location of strategic interest for the U.S. in the Indo-Pacific Command due to its proximity to China, South Korea’s historical relationship with the U.S. over the past 7 decades, and the booming South Korean economy that makes it an important U.S. trading partner. The Democratic People’s Republic of Korea, commonly known as North Korea or the DPRK, remains one of the United States’ most critical security challenges for many reasons. These include the country’s provocative and destabilizing behavior, such as unprovoked attacks on the Republic of Korea (South Korea; ROK); its pursuit of nuclear weapons and long-range ballistic missiles; and its willingness to proliferate weapons in contravention of international treaties. For over 50 years, North Korea has sporadically conducted operations directed against its foes, especially South Korea.
North Korea’s military poses two direct, overlapping challenges to the United States and its allies: a conventional force consisting mostly of artillery and infantry that can attack South Korea with little advance warning, and a ballistic missile arsenal, intended to be armed with nuclear weapons, that is capable of reaching bases and cities in South Korea and Japan, and the U.S. homeland.
North Korea’s conventional military consists of the ground, air, naval, and special operations forces. KPA Ground Forces operate thousands of long-range artillery and rocket systems along the entire length of the DMZ. These weapons include close-range mortars, guns, and multiple rocket launcher systems (MRLs) trained on South Korean military forces deployed north of Seoul, and longer-range self-propelled guns, rockets, and ballistic missiles that can reach Seoul and some points south of the capital. Collectively, this capability holds South Korean citizens and a large number of U.S. and South Korean military installations at risk. The North could use this capability to inflict severe damage and heavy casualties on the South with little warning.
Related Books
OPFOR SMARTbook 1 - Chinese Military


ISBN-10 :1-935886-55-X
Release Note :Projected Aug 2022
Norman M. Wade
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:312
This book is currently in development.
Chinese Forces, Operations & Tactics
OPFOR1 topics and chapters include the strategic environment (understanding China, defense & military strategy, strategic & operational environments, territorial disputes), force structure (PLA: Army, Navy, Marine, Air Force, Rocket Force, Strategic Support Force), system warfare, information operations, reconnaissance and security, offensive and defensive actions, antiterorrism and stability actions, equipment and capabilities (maneuver, fire support, air defense, aviation, engineer and chemical defense, network and communications, and special operations forces).
For over two thousand years, China has been surrounded by enemies, adversaries, and other competitors. Invasion, occupation, raids, and other incursions into Chinese territory were commonplace. The People’s Liberation Army (PLA) views protecting Chinese sovereignty and security as a sacred duty. China traditionally viewed military resistance as an affair for the entire population: mass resistance, guerrilla warfare, and winning a war of attrition.
The People’s Liberation Army Army (PLAA) has approximately 975,000 active-duty personnel in combat units. The PLAN is the largest navy in the world with a battle force of approximately 355 platforms, including major surface combatants, submarines, aircraft carriers, ocean-going amphibious ships, mine warfare ships, and fleet auxiliaries. The Air Force (PLAAF) and PLAN Aviation together constitute the largest aviation forces in the region and the third largest in the world, with over 2,800 total aircraft (not including trainer variants or UAVs) of which approximately 2,250 are combat aircraft (including fighters, strategic bombers, tactical bombers, multi-mission tactical, and attack aircraft). The PLA Rocket Force (PLARF) is the largest missile force in the world, operating well over 1,000 short-range, medium-range, and intercontinental ballistic missiles (ICBMs) and over 300 long-range cruise missiles.
With a force that totals approximately two million personnel in the regular forces, the PLA has sought to modernize its capabilities and improve its proficiencies across all warfare domains so that as a joint force it can conduct the range of land, air, and maritime operations as well as space, counterspace, electronic warfare (EW), and cyber operations. Recognizing that joint operations, information flows, and rapid decision-making are vital in modern warfare, the PRC continues to place a high priority on modernizing the PLA’s capability to command complex joint operations in near and distant battlefields.
The PRC has stated its defense policy aims to safeguard its national sovereignty, security, and development interests. China’s leaders view these interests as foundational to their national strategy. In 2020, the PRC’s defense policy and military strategy primarily oriented the PLA towards “safeguarding” its perceived “sovereignty and security” interests in the region counter the United States. At the same time, China’s leaders increasingly cast the armed forces as a practical instrument to defend Beijing’s expanding global interests and to advance its foreign policy goals within the framework of “Major Power Diplomacy with Chinese Characteristics.”
The People’s Republic of China’s (PRC’s) military strategy is based on what it describes as “active defense,” a concept that adopts the principles of strategic defense in combination with offensive action at the operational and tactical levels. Active defense is neither a purely defensive strategy nor limited to territorial defense. Active defense encompasses offensive and preemptive aspects.
Related Books
OPFOR SMARTbook 3 - Red Team Army, 2nd Ed.
ISBN-10 :1-935886-78-9
Release Date :Oct 15th, 2019
Cover Type:Gloss U.V. Coating
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:264

Paperback Edition
Price: $38.95 $32.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Red Team Army: Forces, Operations & Tactics (OPFOR3-2)
It has been nearly thirty years since a holistic explanation of the Soviet-based Opposing Force (OPFOR) was examined in the U.S. Army Field Manual 100-2 series. Recognizing this, OPFOR SMARTbook 3: Red Team Army re-examines and outlines the doctrinal operational construct and historical foundations of Soviet-era military forces from the FM 100-2 series, which is now out-of-print and largely unavailable. Second, OPFOR SMARTbook 3 reorganizes that foundational material and aligns it in keeping with contemporary military doctrinal taxonomy to include the FM/TC 7-100 Opposing Forces series, FM 3-0 Operations, ADP 3-90 Offense and Defense, and FMs 3-90-1 & -2 Tactics. Third, OPFOR SMARTbook 3 translates and bridges the strategic- and operational-level doctrine into tactical application at the small-unit level. Through this triangulation, a more modern rendition of Red Team Armies emerges.
OPFOR3-2 is the second edition of OPFOR SMARTbook 3 - Red Team Army, completely revised for 2019. In addition to the base FM 100-2-1/2/3 Soviet Threat series, new/updated material includes the FM/TC 7-100 Opposing Forces series, FM 3-0 Operations (Oct ‘17), ADP 3-90 Offense and Defense (Aug ‘18), FMs 3-90-1 & -2 (May ‘13), a review of modern (present-day) Russian forces, and more than a dozen historical vignettes. At 264 pgs, this second edition also features an additional 32 pages over the original first edition.
OPFOR3 topics and chapters include an Opposing Force Overview/Introduction, Red Team Army Overview (Military Doctrine, Operational Concept, Personnel & Training, Force Structure, Motorized Rifle Regiment, Modern Russian Land Forces), Offensive Operations (Front & Army Operations, Division and Lower Tactics, Small Unit Tactics), Defensive Operations (Prepared Defense, Hasty Defense, Withdrawal & Relief, Small Unit Tactics), Specialized Warfare (Airborne, Heliborne, Amphibious, Unconventional Warfare), Tactical Enabling Tasks (Reconnaissance, River Crossings, Troop Movement, Relief in Place, Passage of Lines, Checkpoints), Small Unit Drills (Movement & Formations, Dismounted and Mounted Patrols), Urban & Regional Environments (Urban, Mountain, Desert, Cold Wx, and Nighttime Operations), and Rear Area Operations & Logistics.
Editor's Note: Future editions will be updated to focus centrally on modern Russian forces, operations, tactics and lessons learned in the Ukraine.
Related Books
Discount sets with this book
OPFOR SMARTbook 4 - Iranian Military


Norman M. Wade
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:0
This book is currently in development.
Iranian Forces, Operations & Tactics
Throughout its 40-year history, the Islamic Republic of Iran has remained implacably opposed to the United States, our presence in the Middle East, and our support to Israel. While attempting to strengthen its deterrence against foreign attack and influence, Tehran has committed itself to becoming the dominant power in the turbulent and strategic Middle East.
To achieve its goals, Iran continues to rely on its unconventional warfare elements and asymmetric capabilities—intended to exploit the perceived weaknesses of a superior adversary—to provide deterrence and project power. This combination of lethal conventional capabilities and proxy forces poses a persistent threat. The Islamic Revolutionary Guard Corps Qods Force leads Iranian power projection through a complex network of state and nonstate partners and militant proxies. Iran’s conventional military emphasizes niche capabilities and guerilla-style tactics against its technologically advanced adversaries. Its substantial arsenal of ballistic missiles is designed to overwhelm U.S. forces and our partners in the region. Its swarms of small boats, large inventory of naval mines, and arsenal of antiship missiles can severely disrupt maritime traffic in the Strait of Hormuz—a strategic chokepoint critical to global trade. Each of these forces are becoming increasingly survivable, precise, and responsive.
OPFOR4 SMARTbook is in the early stages of development and will be published at a later date.
Related Books
OPFOR SMARTbook 5 - Irregular & Hybrid Threat


ISBN-10 :1-935886-54-1
Release Note :Projected Aug 2022
Cover Type:Gloss U.V. Coating
Binding Type:Perfect Bind
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:282
This book is currently in development.
Irregular & Hybrid Threat Forces, Operations & Tactics
OPFOR5 topics and chapters include irregular and hybrid threat (components, organizations, strategy, operations, tactics), insurgents and guerillas forces (characteristics, organizations, TTPs), terrorists (motivations, behaviors, organizations, operations and tactics), criminals (characteristics, organizations, activities), noncombatants (armed & unarmed), foreign security forces (FSF) threats, and functional tactics.
A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, and/or criminal elements all unified to achieve mutually benefitting effects. The term “hybrid” has recently been used to capture the seemingly increased complexity of war, the multiplicity of actors involved, and the blurring between traditional categories of conflict. While the existence of innovative adversaries is not new, today’s hybrid approaches demand that U.S. forces prepare for a range of conflicts.
Irregular forces are armed individuals or groups who are not members of the regular armed forces, police, or other internal security forces.The irregular OPFOR can be part of the hybrid threat (HT). The irregular OPFOR component of the HT can be insurgents, guerrillas, or criminals or any combination thereof. The irregular OPFOR can also include other armed individuals or groups who are not members of a governing authority’s domestic law enforcement organizations or other internal security forces.
Irregular forces are unregulated and as a result act with no restrictions on violence or targets for violence. Time-honored concepts of “conventional” and “unconventional” war and “traditional” methods versus “adaptive” methods are weapons to a hybrid threat. One of the most significant capabilities of the irregular OPFOR is the ability to manipulate and/or ignore the restrictions and sanctions that apply to regulated military forces, law enforcement agencies, and internal security forces belonging to a sovereign state. The ability to combine and transition between regular and irregular forces and operations to capitalize on perceived vulnerabilities makes hybrid threats particularly effective.
Insurgents are armed and/or unarmed individuals or groups who promote an agenda of subversion and violence that seeks to overthrow or force change of a governing authority.
A guerrilla force is a group of irregular, predominantly indigenous personnel organized along military lines to conduct military and paramilitary operations in enemy-held, hostile, or denied territory.
Terrorism is a tactic. Terrorism can be defined as the use of violence or threat of violence to instill fear and coerce governments or societies. Often motivated by philosophical or other ideological beliefs, objectives are typically political in nature.
Criminal elements exist at every level of society and in every operational environment (OE). Their presence, whatever their level of capabilities, adds to the complexity of any OE.
A host of noncombatants add complexity to any operational environment. Noncombatants are persons not actively participating in combat or actively supporting of any of the forces involved in combat. They can be either armed or unarmed. The irregular OPFOR attempts to manipulate these noncombatants in ways that support its goals and objectives.
Foreign security forces (FSF) are those forces, including, but not limited to military, paramilitary, police, and intelligence forces; border police, coast guard, and customs officials; and prison guards and correctional personnel, that provide security for a host nation and its relevant population or support a regional security organization’s mission. An FSF threat attack is a violent act perpetrated against a U.S. Service member, civilian, or contractor by a FSF member or members who have access to U.S. Service members, civilians, or contractors. The FSF threat is not a new phenomenon; however, during recent limited contingency operations, U.S. forces experienced a sharp increase in the number of attacks perpetrated by FSFs.
Insurgents and guerrillas, as part of the irregular OPFOR, may employ adaptive functional tactics. When planning a tactical action, an irregular OPFOR commander or leader determines what functions must be performed to accomplish the mission. Then he allocates functional responsibilities to his subordinates and synchronizes the effort.
Related Books
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
ISBN-10 :1935886436
Release Date :May 19th, 2016
Norman M. Wade
Binding Type:Lay Flat with Spine
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:384

Paperback Edition
Price: $38.95 $32.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Guide to Terrorism, Hybrid and Emerging Threats
CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook topics and chapters include: the terrorist threat (characteristics, goals & objectives, organization, state-sponsored, international, and domestic), hybrid and future threats (forces, organization, operations & tactics), forms of terrorism (tactics, techniques, & procedures), counterterrorism (strategy, fundamentals, command, planning, and operations) critical infrastructure (identifying weaknesses, risk management, and cyber threats), protection (warfighting function, supporting tasks, and planning), countering WMD (WMD weapons, planning, and execution), and consequence management (all hazards response, domestic, international and DoD-led CM).
* This is the second printing of CTS1 (Jul 2017), incorporating an updated DNI World Threat Assessment and additional materials from START/GTD. An asterisk marks changed pages.
Terrorism has evolved as a preferred tactic for ideological extremists around the world, directly or indirectly affecting millions of people. Terrorists use many forms of unlawful violence or threats of violence to instill fear and coerce governments or societies to further a variety of political, social, criminal, economic, and religious ideologies. Terrorists threaten the national power, sovereignty, and interests of the United States and our allies. Terrorists organize and operate in a number of ways. Some operate within transnational networks, others operate as small independent groups, and others operate alone.
A hybrid threat is the diverse and dynamic combination of regular forces, irregular forces, and/or criminal elements all unified to achieve mutually-benefiting effects. Hybrid threats are innovative, adaptive, globally connected, networked, and embedded in the clutter of local populations. They can operate conventionally and unconventionally, employing adaptive and asymmetric combinations of traditional, irregular, and criminal tactics and using traditional military capabilities in old and new ways.
Counterterrorism activities and operations are taken to neutralize terrorists, their organizations, and networks in order to render them incapable of using violence to instill fear and coerce governments or societies to achieve their goals. The purpose of CT is to disrupt, isolate, and dismantle terrorist organizations and networks to render them incapable of striking the homeland, US facilities and personnel, or US interests abroad. CT also includes crisis response operations to respond to imminent terrorist threats or incidents when preemption and preclusion are not successful. In addition to increasing law enforcement capabilities for counterterrorism, the United States, like many nations, has developed specialized, but limited, military CT capabilities.
Weapons of mass destruction (WMD) are chemical, biological, radiological, or nuclear (CBRN) weapons or devices capable of a high order of destruction and/or causing mass casualties. The terrorist threat is amplified by the proliferation of WMD and their potential use by terrorists. The existence of these materials and the potential for use by actors of concern precipitates the need to plan, prepare for, and counter their use.
Critical infrastructure is a term used by governments to describe assets that are essential for the functioning of a society and economy - the infrastructure. Protection is the preservation of the effectiveness and survivability of mission-related military and nonmilitary personnel, equipment, facilities, information, and infrastructure deployed or located within or outside the boundaries of a given operational area.
Consequence management refers to measures to protect public health and safety, restore essential government services, and provide emergency relief to governments, businesses, and individuals affected by the consequences of terrorism. Incidents involving CBRN material produce a chaotic and hazardous environment requiring immediate response to minimize pain and suffering, reduce casualties, and restore essential infrastructure. Responders at the local, state, and federal levels may be overwhelmed by the magnitude of the incident, and U.S. DoD forces may be requested to provide additional support through the national response framework (NRF).
Related Books
Discount sets with this book
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1)
ISBN-10 :1935886711
Release Note :Base CYBER1 released Oct '19 (New CYBER1-1 w/SMARTupdate 1 released 22 Sept 21.)
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:344

Paperback Edition
Price: $38.95 $32.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Multi-Domain Guide to Offensive/Defensive CEMA and CO
CYBER1-1: The Cyberspace Operations & Electronic Warfare SMARTbook (w/SMARTupdate 1*) (Multi-Domain Guide to Offensive/Defensive CEMA and CO) topics and chapters include cyber intro (global threat, contemporary operating environment, information as a joint function), joint cyberspace operations (CO), cyberspace operations (OCO/DCO/DODIN), electromagnetic warfare (EW) operations, cyber & EW (CEMA) planning, spectrum management operations (SMO/JEMSO), DoD information network (DODIN) operations, acronyms/abbreviations, and a cross-referenced glossary of cyber terms.
*SMARTupdate 1 to CYBER1 (Aug ‘21) updates the first printing of CYBER1: The Cyberspace Operations & Electronic Warfare SMARTbook (Oct ‘19) by incorporating new material from FM 3-12, Cyberspace Operations and Electromagnetic Warfare (Aug ‘21), ATP 3-12.3, Electronic Warfare Techniques (Jul ‘19), ATP 6-02.70, Techniques for Spectrum Management Operations (Oct ‘19), JP 3-85, Joint Electromagnetic Spectrum Management Operations (May ‘20) and adding a new section on Cyberspace IPB (ATP 2-01.3, Jul ‘19). (Readers of the original/base CYBER1 can obtain SMARTupdate 1 at www.thelightningpress.com/smartupdates/)
United States armed forces operate in an increasingly network-based world. The proliferation of information technologies is changing the way humans interact with each other and their environment, including interactions during military operations. This broad and rapidly changing operational environment requires that today’s armed forces must operate in cyberspace and leverage an electromagnetic spectrum that is increasingly competitive, congested, and contested.
Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Operations in cyberspace contribute to gaining a significant operational advantage for achieving military objectives.
Cyber electromagnetic activities (CEMA) are activities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting the mission command system (ADRP 3-0). CEMA consist of cyberspace operations, electronic warfare, and spectrum management operations.
Cyberspace operations (CO) are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace (JP 3-0). Cyberspace operations consist of three functions: offensive cyberspace operations, defensive cyberspace operations, and Department of Defense information network operations.
Electromagnetic Warfare (EW) (formerly "electronic" warfare) is military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. EW consists of three functions: electromagnetic attack, electromagnetic protection, and electromagnetic support.
Spectrum management operations (SMO) are the interrelated functions of spectrum management, frequency assignment, host-nation coordination, and policy that enable the planning, management, and execution of operations within the electromagnetic operational environment during all phases of military operations. SMO are the management portions of electromagnetic spectrum operations (EMSO). EMSO also include electronic warfare.
Department of Defense information network (DODIN) operations are operations to secure, configure, operate, extend, maintain, and sustain DOD cyberspace.
Cybersecurity ensures the confidentiality, integrity, availability, authentication, and nonrepudiation of friendly information and information systems while denying adversaries access to the same information and information systems. Cybersecurity incorporates actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity on DOD information systems and computer networks.
Related Books
Discount sets with this book
INFO1: The Information Operations & Capabilities SMARTbook
ISBN-10 : 1935886606
Release Date :Jul 1st, 2021
Norman M. Wade
Binding Type:Plastic Comb
Print Inside Pages:Black and White
Trim Size:5.5'' x 8.5''
Total Pages:288

Paperback Edition
Price: $38.95 $32.95

Bundle & Save (Paperback + Digital)
Price: $77.90 $49.95
Guide to Information Operations & the IRCs
Over the past two decades, information operations (IO) has gone through a number of doctrinal evolutions, explained, in part, by the rapidly changing nature of information, its flow, processing, dissemination, impact and, in particular, its military employment. INFO1: The Information Operations & Capabilities SMARTbook examines the most current doctrinal references available and charts a path to emerging doctrine.
INFO1 chapters and topics include information operations (IO defined and described), information in joint operations (joint IO), information-related capabilities (public affairs, civil affairs and civil military operations, military deception, military information support operations, operations security, cyberspace electromagnetic activities, cyberspace operations, electronic warfare, space operations, special technical operations, & additional IRCs), information planning (IRC synchronization, information environment analysis, IPB, MDMP, JPP), information preparation, information execution (IO working group, IO weighted efforts and enabling activities, intel support), fires & targeting, and information assessment.
Information is a resource. As a resource, it must be obtained, developed, refined, distributed, and protected. The information element of combat power is integral to optimizing combat power, particularly given the increasing relevance of operations in and through the information environment to achieve decisive outcomes.
Information Operations (IO) is the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own. The purpose of IO is to create effects in and through the information environment that provide commanders decisive advantage over enemies and adversaries.
The joint force commander (JFC) leverages informational aspects of military activities to gain an advantage; failing to leverage those aspects may cede this advantage to others. Leveraging the informational aspects of military activities ultimately affects strategic outcomes. The joint force attacks and exploits information, information networks, and systems to affect the ability of relevant actors to leverage information in support of their own objectives. This includes the manipulation, modification, or destruction of information or disruption of the flow of information for the purpose of gaining a position of military advantage. This also includes targeting the credibility of information.
An information-related capability (IRC) is a tool, technique, or activity employed within a dimension of the information environment that can be used to create effects and operationally desirable conditions. IO brings together information-related capabilities (IRCs) at a specific time and in a coherent fashion to create effects in and through the information environment that advance the ability to deliver operational advantage to the commander.
Related Books
Discount sets with this book