“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy
From #1 New York Times bestselling author Brad Thor.
As a storm rages across the Mediterranean Sea, a terrifying distress call is made to the Italian Coast Guard. Days later, a body washes ashore.
Identified as a high value terrorism suspect (who had disappeared three years prior), his name sends panic through the Central Intelligence Agency.
Where was he headed? What was he planning? And could he be connected to the “spectacular attack” they have been fearing all summer?
In a race against time, the CIA taps an unorthodox source to get answers: Navy SEAL turned covert counterterrorism operative, Scot Harvath.
Hired on a black contract, Harvath will provide the deniability the United States needs, while he breaks every rule along the way.
Packed with pulse-pounding action, fascinating characters, and electrifying intrigue, Brad Thor does it again and proves why he is known around the world as the “Master of Thrillers.”
Learn Objective-C for Java Developers Objective-C is a wonderful language that has received far less attention than it deserves. It has suddenly become (more) popular with the success of Apple’s Mac OS X and iPhone, where it is the supreme development language. If you’re going to learn a language to write applications for Mac OS X or the iPhone, Objective-C is the language... Big Java: Compatible with Java 5, 6 and 7
This book introduces programmers to objects at a gradual pace. The syntax boxes are revised to show typical code examples rather than abstract notation. This includes optional example modules using Alice and Greenfoot. The examples feature annotations with dos and don'ts along with cross references to more detailed explanations in the...
Creating Development Environments with Vagrant
Vagrant is a tool for building complete development environments. With an easy-to-use workflow and focus on automation, Vagrant lowers development environment setup time, increases development/production parity, and makes the "it works on my machine" excuse a thing of the past.
"Creating Development Environments with...
Investigating Child Exploitation: The Internet, Law and Forensic Science This work is the culmination of many years of study and work. During my undergraduate
and graduate work, my primary research interests revolved around
domestic violence, sexual assault, child abuse, and child exploitation. Feminism,
the Constitution, freedom of expression and privacy, politics, and the
dynamics of power are...