Jack Reacher's anonymity in Key West is shattered by the appearance of a private investigator who' come to town looking for him. But only hours after his arrival, the stranger is murdered. Retracing the PI's cold trail back to New York City, Reacher is compelled to find out who was looking for him and why. He never expected the reasons to be so personal, so dangerous, and so very twisted.
A serial killer’s daughter fights to escape her past in this explosive thriller from the New York Times–bestselling author of Look Away. Heartless killer—or helpless victim? It’s perfectly normal to be a little shaky on your first day back to work. Especially if you’re Morgan Ames, returning to work after killing her serial killer father, waking up from a coma, fighting back through rehab . . . and, with the help of her boyfriend, keeping her vow never to kill again. Except when Morgan walks into the Galloway and Stone offices, she finds her boss holding a bomb. Definitely no time for the shakes as Morgan jumps right back into her old life and saves the day. But the bomber has other ideas, igniting a killing spree targeting those Morgan holds most dear. Morgan must decide what to sacrifice: her promise to never kill again or the lives of everyone she loves. Praise for CJ Lyons’ thrillers “Everything a great thriller should be—action packed, authentic, and intense.” —Lee Child, #1 New York Times–bestselling author “A pulse-pounding adrenalin rush!” —Lisa Gardner, #1 New York Times–bestselling author “A high stakes adventure with dire consequences.” —Steve Berry, New York Times–bestselling author “A compelling new voice in thriller writing . . . I love how the characters come alive on every page.” —Jeffery Deaver, New York Times–bestselling author
In Lynch’s fourth collection, we carefully navigate the fine line between terror and beauty as we face palpable trauma, heartbreak, and wild astonishment through the raw and personal poems. The genuine, delicate voice works to examine who we are, after everything.
Tripwire is the gripping saga of one man's struggle against the shadows of war, revealing to all the silent thunder that can continue long after the shelling has stopped. Tripwire strips away the falsehoods that PTSD embeds in its victims, forcing it into the light of truth where it can be seen for what it really is.It is my hope that Tripwire will cut PTSD off at the knees before it can cause irreparable damage. I have learned that PTSD's coup de grace is knowledge and truth. And when you become entangled in its web, it is only these two weapons that can disarm the maze of tripwires this affection throws in your path.A testament to the human spirit's ability to overcome all obstacles, prepare to be catapulted into an adventure with as many twists and turns as the rivers that raged through the mountainous jungles of South Vietnam. Graphic, suspenseful and fast-moving, follow the trail of fear and courage that will challenge you to the very core.So...look out ahead for...tripwires!
Of Jackson Park, the first Cook County mystery featuring an unconventional trio of sleuths, Margo Jefferson of The New York Times said, “Charlotte Carter blends street savvy with wry urbanity and delivers a truly modern big-city crime tale.” Now Carter returns with another suspenseful novel that brings the black experience to vivid life during one of the most turbulent times in American history. It is December 1968. In the wake of assassinations and the violence of the Democratic convention in Chicago, “Summer of Love” idealism has disintegrated into suspicion and disillusion. On the city’s North Side, twentyishCassandra Perry longs to be independent. She leaves the overprotective embrace of her granduncle and grandaunt, Woody ans Ivy Lisle, and moves into a multiracial commune dedicated to brotherhood and just causes. But Cassandra’s search for identity plunges her into the dark side of peace, love, and unlimited freedom–even before she discovers the brutally violated bodies of the commune’s most charismatic activist couple. As Cassandra investigates with the help of Woody and Ivy, she begins to see some friends–especially one of her dearest–in a disturbing, deadly light. But when the three amateur sleuths run afoul of a police cover-up with explosive political ramifications, they face a desperate enemy determined to bury the–along with the truth.
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
Jack Reacher hunts the hunter in the third novel in Lee Child’s #1 New York Times bestselling series. DON'T MISS REACHER ON PRIME VIDEO! Ex military policeman Jack Reacher is enjoying the lazy anonymity of Key West when a stranger shows up asking for him. He’s got a lot of questions. Reacher does too, especially after the guy turns up dead. The answers lead Reacher on a cold trail back to New York, to the tenuous confidence of an alluring woman, and the dangerous corners of his own past.