𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Threat Rising

✍ Scribed by KJ Kalis


Publisher
BDM LLC
Year
2022
Tongue
English
Series
Travis Bishop Thrillers Book 2
Category
Fiction

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


A dead body disappears. A plot to get vengeance. They are tied together by one man.
Former CIA Agent Travis Bishop gets roped into the case by the local sheriff and coroner who know they are out of their depths when the body of a John Doe disappears from inside the coroner’s office.

The condition of the body was bad enough – shot and burned until it was unrecognizable.

But what they found inside the body was even worse…

As he investigates, Travis gets more than he bargained for, drawn into a web of terrorism, a plot to install a global caliphate, and the release of powerful biotech the world hasn’t ever seen before.

But can he unravel the mystery before thousands die?


πŸ“œ SIMILAR VOLUMES


Rising Threat
✍ S. J. Schauer πŸ“‚ Fiction πŸ“… 2021 πŸ› Dawnrunner Press 🌐 English

Rising Threat - Things just got real.<br />As the cadets enter their final annura at the academy, they leave the simulator behind to engage in real universe missions throughout Confed Space.<br />However, as they set out on their own to explore a trio of empty solar systems, the cadets fraction when

Risk Centric Threat Modeling: Process fo
✍ Tony UcedaVelez, Marco M. Morana πŸ“‚ Library πŸ“… 2015 πŸ› Wiley 🌐 English

<p>This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to t

Risk Centric Threat Modeling: Process fo
✍ Tony UcedaVelez, Marco M. Morana πŸ“‚ Library πŸ“… 2015 πŸ› Wiley 🌐 English

This book introduces the Process for Attack Simulation &amp; Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to