Download Robert Ludlum's The Hades Factor (Covert-One, Book 1) by Gayle Lynds PDF

By Gayle Lynds

Robert Ludlum has been acclaimed because the grasp of .suspense and foreign intrigue. His many books have delighted thousands of readers, achieving the pinnacle of bestsellers lists internationally and atmosphere a regular that hasn't ever been exceeded. Now, from the mind's eye of 1 of America’s maximum storytellers comes Robert Ludlum’s The Hades Factor--a exciting new access within the Covert-One series

.A homeless guy in Boston, a military significant in California, and a teenage woman in Atlanta all die without warning and painfully--each a sufferer of an unknown doomsday virus. for 3 days, a group of scientists is a U.S. executive laboratory has been frantically attempting to liberate the virus's secrets and techniques. whilst the major researcher from that lab, Lt. Col. Jonathan Smith, returns from abroad, he slightly survives a chain of well-orchestrated makes an attempt made on his lifestyles. by the point Smith eludes his pursuers and makes it domestic, he discovers that the virus has claimed its fourth sufferer, Dr. Sophia Russell--Smith's fiancee. Devastated and enraged, Smith speedy uncovers facts that his lover's dying was once no accident--that an individual available in the market has the virus, and the pandemic that threatens enormous quantities of thousands of lives isn't any twist of fate. yet at any place he turns, Smith unearths that a few unseen strength has blocked his quest for information.

Not figuring out whom to belief, Smith assembles a personal staff to look for the reality in the back of the lethal virus. whereas the loss of life toll mounts, their quest results in the top degrees of strength and the darkest corners of the earth, as they fit wits with a made up our minds genius--and because the destiny of the area lies within the stability.

Show description

Read Online or Download Robert Ludlum's The Hades Factor (Covert-One, Book 1) PDF

Best espionage books

Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)

Scan with cryptography—the technological know-how of mystery writing. Cipher and decipher codes: transposition and polyalphabetical ciphers, recognized codes, typewriter and phone codes, codes that use cards, knots, and swizzle sticks. .. even invisible writing and sending messages via outer house.

At the Center of the Storm: My Years at the CIA

Within the whirlwind of accusations and recriminations that emerged within the wake of Sep 11 and the Iraq conflict, one man's important testimony has been conspicuously absent. Candid and gripping, on the heart of the hurricane recounts George Tenet's time on the important Intelligence business enterprise, a revealing examine the internal workings of crucial intelligence association on the planet through the such a lot difficult instances in contemporary background.

Dragon Head (Beatrix Rose: Hong Kong Stories, Book 3)

Husband has been murdered and her daughter, Isabella, kidnapped. She flees to the Hong Kong underworld to plan her revenge.

Those who wronged her can pay. Beatrix is the main risky girl you’ve ever met. She was once an murderer for The company, the past most sensible mystery employer that did the soiled paintings for the British mystery Services.

She is deadly. Ethically versatile. completely ruthless.

And you recognize what they are saying approximately payback…

Mr. Ying, the underboss of the ruthless Wo Shun Wo triad extended family, desires Beatrix useless. He has Grace, the younger chinese language lady who Beatrix rescued from demise at his hand. Beatrix appeals to the chief of the triads, the just about legendary Dragon Head. yet will he be ready to aid her? And, if he's, what is going to he wish in return?

DRAGON HEAD is the 3rd and ultimate prequel novella within the bestselling BLOOD & ROSES sequence, which follows the saga of the British government’s deadliest ex-operative.

The urged examining order is:

WHITE satan
NINE DRAGONS
DRAGON HEAD

IN chilly BLOOD
BLOOD MOON emerging
BLOOD AND ROSES-

Routledge Companion to Intelligence Studies

This identify offers a huge assessment of the starting to be box of intelligence reports, and is vital examining for a person drawn to the topic. Divided into 5 complete sections, this ebook offers a powerful survey of the innovative examine within the box of intelligence stories.

Additional info for Robert Ludlum's The Hades Factor (Covert-One, Book 1)

Sample text

Vitel to Paris to make contact with Charles Perlet, the These informants proved militarily useful to Napoleon leader of a secret committee apparently dedicated to the as well, although he relied on local intelligence when he overthrow of Emperor Napoleon Bonaparte. commanded his army in war. His military organisation But Vitel had walked into a trap. There was no secret specialised in the transmission of information quickly committee and Perlet was a double agent, directing an and efficiently. The backbone of a successful intelligence operation to encourage the British to send eminetwork resided less on colourful characters that Louis Fauche-Borrel, gré agents to France, where they were unmasked who mistakenly sent collected the information than with the infrahis nephew into a and used to embarrass the British regime.

On the night of 27 February 1943, the wind was blowing, everything was covered in snow and all was silent. The Nazis had occupied Norway for almost three years and had wasted 58 The Secret History of Spies no time in taking control of the Norsk Hydro plant. Situated on one side of the valley on the outskirts of Rjukan, great pipes, fed by natural waterfalls, used the vast energy of descending water to power great turbine engines. The Nazis had been putting these to use to help produce heavy water, a vital component in their atomic bomb programme.

For Google, China was a test case of its principles, but it also became a wider sign of a struggle as American dominance of the internet was challenged by others. China – and other countries – would increasingly push to control the internet within their borders and limit US influence. Stuxnet June 2010 In 2010, computer security researchers revealed the discovery of a new virus, christened Stuxnet, which signalled a new moment in information warfare. According to former NSA director Michael Hayden, it had the “whiff of August 1945”, comparing it to the first use of the atom bomb.

Download PDF sample

Rated 5.00 of 5 – based on 30 votes