Tripwire

Tripwire
ISBN-10
0553811851
ISBN-13
9780553811858
Series
Tripwire
Category
Detectives
Pages
540
Language
English
Published
2000
Publisher
Random House
Author
Lee Child

Description

"Digging swimming pools by hand in Key West, Florid, Jack Reacher is as tanned and as fit as he's ever been. A local girly says he looks like a condom filled with walnuts. Being invisible has become a habit. He doesn't want to be found. So when a private detective comes nosing around and asking questions, Reacher is not pleased. Especially when he later finds the guy dead, with his fingertips sliced off. Why was he so determined to find him? What does the vicious Wall Street honcho Hook Hobie have to do with it? And what about the reappearance of a woman from Reacher's own troubled past?" -- back cover.

Other editions

Similar books

  • Tripwire
    By Lee Child

    Jack Reacher hunts the hunter in the third novel in Lee Child’s New York Times bestselling series.

  • Tripwire: Korea and U.S. Foreign Policy in a Changed World
    By Doug Bandow

    Contends that Washington should initiate a phased withdrawal

  • Tripwire
    By Robert Adams

    I'm standing outside of my hootch. A soft blue light inside illuminates a form– my own; I lie asleep, unaware of the danger. Can't be. How–? If I'm–? My Jesus. My Jesus I gotta wake up! I gotta know I'm gonna die! I tear at the netting, ...

  • Hack Proofing Linux: A Guide to Open Source Security
    By James Stanger, Patrick T. Lane

    Here are some of the more popular titles: s Network Intrusion Detection:An Analyst's Handbook (2nd Edition), Stephen Northcutt, Donald McLachlan, and Judy Novak. Indianapolis: New Riders Publishing, 2000.

  • Multitool Linux: Practical Uses for Open Source Software
    By Michael Schwarz, Peter Curtis, Jeremy D. Anderson

    It obeys UUCP (Unix-to-Unix Communications Program) locking protocols, so you can use the same modem for dial-in and dial-out applications simultaneously. It understands fax/modems, so if an incoming call is from a fax machine, ...

  • Linux Server Security
    By Michael D. Bauer

    Long-Form Commands Versus Short-Form Throughout this chapter, I use the longform of Tripwire commands: any flag or directive beginning with a double-dash (“--”) is a long form and has a corresponding short form.

  • Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
    By William von Hagen, Brian Jones

    Karen Montgomery designed the cover of this book, based on a series design by Edie Freedman. The cover image was created from an original photo- graph from the CMCD collection. Karen Montgomery produced the cover layout with Adobe ...

  • Tripwire
    By Robert Adams

    Gotta get off my feet. Feels like half the war is going on inside of my gut. A blanket of darkness begins to spread across the valley. LT signals the platoon to a halt. Ahead is a wide stream to cross. He motions Nichols to take his ...

  • The Official Ubuntu Server Book
    By Benjamin Mako Hill, Kyle Rankin

    Written by leading members of the Ubuntu community, The Official Ubuntu Server Book covers all you need to know to make the most of Ubuntu Server, whether you’re a beginner or a battle-hardened senior system administrator.

  • Network Security Hacks
    By Andrew Lockhart

    Introduces more than one hundred effective ways to ensure security in a Linux, UNIX, or Windows network, covering both TCP/IP-based services and host-based security techniques, with examples of applied encryption, intrusion detections, and ...