Net Force Explorer Charlie Davis is worried about his friend Rick, who has been hanging out at a punk rock/morbo site called Deathworld, a place rumored to be responsible for a couple of suicides. Charlie decides to visit the place undercover. What he finds may kill him.
Tom Clancy's Net Force. The great race
β Scribed by Clancy, Tom;Pieczenik, Steve R.
- Publisher
- Perfection Learning Corporation; Berkley Jam Books
- Year
- 1999
- Tongue
- English
- Weight
- 166 KB
- Series
- Net Force Explorers 7
- Category
- Fiction
- City
- New York, United States.
- ISBN
- 042516991X
No coin nor oath required. For personal study only.
β¦ Synopsis
The Federation ship unfurls its sails and catches the "wave" it needs to jump into hyperspace. As the ship accelerates past the speed of light the inertial dampers kick in to keep the ship from being torn apart. The net force explorers are at the helm of this virtual ship in a race against other teens of the world for a spot in an upcoming episode of a hit Holo show.
β¦ Subjects
United States
π SIMILAR VOLUMES
Cuando el director de Net Force muere asesinado, el subdirector, Alex Michaels, se ve obligado a ocupar uno de los cargos mΓ‘s importantes y peligrosos del mundo. Al mismo tiempo, terroristas cibernΓ©ticos sabotean ordenadores centrales a lo largo y ancho del paΓs, provocando caos, hambruna y muerte.
**The tenth novel in the Net Force series, Tom Clancy's #1 _New York Times_ bestselling phenomenon.** Bypassing all safeguards, terrorists enter Fort Stephens, the newest high-tech Army base, and detonate a truck full of powerful explosives. Within hours, other bases are hit. Under attack, the
**The eighth novel in Tom Clancy's #1 _New York Times_ bestselling Net Force series. **Though the head of a major multinational corporation--and a key player in world affairs--Samuel Walker Cox has a past that few people know about. But that group is about to get bigger. A computer disk has fallen
Un virus provoca el caos en el sistema financiero americano, y los agentes de Net Force deben tratar de localizar al hacker a travΓ©s del laberinto del ciberespacio, hasta dar con una pista que los conduce peligrosamente cerca de su propia organizaciΓ³n.