๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Mace: Lighthouse Security Investigations

โœ Scribed by Jordan, Maryann


Publisher
MaryAnn Litton
Year
2018
Tongue
English
Category
Fiction

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


*This book was originally published in the USA Today Bestselling boxed set Love Under Siege***Lighthouse Security InvestigationsMace Hanover, former Special Forces and CIA Special Ops, filled his security company with other men and women from the SEALs, Rangers, Special Forces, Deltas, and AF Special Ops. All having been trained in CIA Special Ops, his Keepers were the best of the best. His focus had been on building his security company and the missions they undertook. A relationship was not on his radar.Single mom, Sylvie Gardner, toiled at a job she hated but she would do anything to provide for her son. When he witnesses a crime and danger lurked, she is grateful when Mace comes into their lives to protect themMace just wanted to provide security for the beautiful Sylvie and her son, while the Keepers investigated the crime, but the two worked their way under his skin and the mission became personal.Can a woman who is scared to love again and a man who is afraid of love, find happiness together? Scenes in the book are similar to what you would find in an R-rated movie. For 18+ readers only.



**


Number of Words in Auth: 2
Formats : EPUB
Number of Formats : 1
Has Cover : Yes
All Identifiers : amazon:1947214284, isbn:9781947214286
Single Author : Maryann Jordan
Original Source : New_Files_Train_Pack_2018-182
Sorted Author by LN, FN: Jordan, Maryann
Title Length : 039
Title Parm D : Mace_Lighthouse Security Investigations
Title Parm G : Mace
Num of Aut : 1
Title Parm B : (
Title Parm H : Lighthouse Security Investigations
Record ID : 7627
Uncomma Author : Maryann Jordan
Title Parm A : Mace_Lighthouse Security Investigations


๐Ÿ“œ SIMILAR VOLUMES


CyberForensics: Understanding Informatio
โœ Jennifer Bayuk (auth.), Jennifer Bayuk (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Humana Press ๐ŸŒ English

<p>This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the