Download Carrie's Run (Homeland Novels, Book 1) by Andrew Kaplan PDF

By Andrew Kaplan

An edge-of-your-seat unique prequel according to Showtime's hit sequence Homeland

Beirut, 2006. CIA operations officer Carrie Mathison slightly escapes an ambush whereas making an attempt a clandestine assembly with a brand new touch, code-name Nightingale. Suspicious that defense has been compromised, she demanding situations the station leader in a heated disagreement that will get her booted again to Langley.

Expert in spotting and looking forward to behavioral patterns—a ability more desirable through her bipolar affliction she retains mystery to guard her career—Carrie is more and more definite terrorist plot has been set in movement. She hazards a stunning act of insubordination that is helping her discover mystery proof connecting Nightingale with Abu Nazir, the chief of Al Qaeda in Iraq. decided to prevent the terrorist mastermind, she embarks on an obsessive quest that may approximately smash her.

Filled with the suspense and plot twists that experience made place of birth a must-watch sequence, this riveting story finds the compelling untold backstories of the series' major characters and takes lovers deeper into the lifestyles and brain of 1 terrific lady undercover agent.

Show description

Read or Download Carrie's Run (Homeland Novels, Book 1) PDF

Best espionage books

Tiger Trap: America's Secret Spy War with China

For many years, whereas the US obsessed over Soviet spies, China quietly penetrated the top degrees of presidency. Now, for the 1st time, according to a number of interviews with key insiders on the FBI and CIA in addition to with chinese language brokers and folks just about them, David clever tells the complete tale of China’s many victories and defeats in its American undercover agent wars.

Shock Warning

Countdown To Armageddon

It starts in California with a devastating organic assault - a terrible reveal of homegrown terror unseen on U. S. soil - simply weeks earlier than the presidential election.

For the White condo, it's a political nightmare, because it threatens to plunge the rustic into panic and financial chaos. yet for the NSA's secret agent Devlin, it's the final caution.

Devlin is familiar with who's at the back of the mayhem.
He is aware who controls the media.
And he understands that, except he can cease it, the tip of Days starts off. . . on Election Day.

Billion-Dollar Brain (Secret Files)

The vintage mystery of a deadly machine age and a maniac's inner most chilly war…
General Midwinter loves his kingdom, and hates communism. In a bid to destabilize the Soviet energy bloc he's working his personal intelligence supplier, whose “brain” is the world's greatest supercomputer.
With his previous coming again to hang-out him, the unnamed agent of The Ipcress dossier is shipped to Finland to penetrate Midwinter's secret agent phone. yet then a dangerous virus is stolen, and our hero needs to cease it from falling into the palms of either the Russians and the billionaire madman.

Operation Desolation (Jeff Aiken, Book 1.5)

A thought-provoking new brief tale from the acclaimed writer of 0 Day and Trojan Horse.

Challenging nameless is like waving a crimson flag in entrance of a bull. however the CEO of a massive funding enterprise has performed simply that, and now cyber safety professional Jeff Aiken has to aim to guard the corporate from its leader's error. The timing couldn't be worse, as Jeff is scheduled to seem at a convention that has invited an nameless consultant to boot. And Jeff's approximately to find that the hacker outfit plans to carry their struggle offline—and into the genuine international.

Extra resources for Carrie's Run (Homeland Novels, Book 1)

Sample text

26 (September 2, 2008); Alice Miller, “The New Party Politburo Leadership,” China Leadership Monitor, no. 40 (January 14, 2013). 30. Document 27, “State Informatization Leading Group Opinion on Strengthening Information Security,” is apparently classified, but it is frequently referenced in open sources; see “China’s National Information Assurance Policy Framework: Ministry of Public Security Multi-Level Protection Scheme,” USITO Issue Paper 626, United States Information Technology Office, 2009.

53. Jon R. Lindsay, “Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations,” Journal of Strategic Studies 36, no. 3 (2013): 422–53. 54. On Chinese nationalist “hacker wars” see Desmond Ball, “China’s Cyber Warfare Capabilities,” Security Challenges 17, no. 2 (2011): 81‒103; and Scott Henderson, Dark Visitor: Inside the World of Chinese Hackers (Fort Leavenworth, KS: Foreign Military Studies Office, 2007). 55. On “wicked” problems see Horst Rittel and Melvin Webber, “Dilemmas in a General Theory of Planning,” Policy Sciences 4 (1973): 155–69.

He then articulates philosophical principles to help nations avoid cyberwarfare, arguing that most important thing is to extend the notion of sovereignty into the domain of cyberspace. Ye’s normative prescriptions anticipate the discussion in the chapters by Li Yuxiao and Xu Lu and by Fred Cate of international Internet governance. The chapters by Cate and McKune both point out that there is some East-West controversy about how best to govern the cyber commons, in particular regarding how norms of “Internet sovereignty” might affect the legacy “multistakeholder” regime.

Download PDF sample

Rated 4.14 of 5 – based on 17 votes