Explore: Security Consultants In Fiction
Discover books, insights, and more — all in one place.
Learn more about Security Consultants In Fiction with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “security-consultants-in-fiction”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Shelter from the storm
a novel
By Michael Mewshaw

“Shelter from the storm” Metadata:
- Title: Shelter from the storm
- Author: Michael Mewshaw
- Language: English
- Number of Pages: Median: 284
- Publisher: ➤ G. P. Putnam's Sons - Blue Hen Trade
- Publish Date: 2003 - 2004
- Publish Location: New York
“Shelter from the storm” Subjects and Themes:
- Subjects: ➤ Fiction - Security consultants in fiction - Kidnapping - Americans in fiction - Security consultants - Fathers-in-law - Kidnapping in fiction - Americans - Eastern europe in fiction - Middle-aged men - Fathers-in-law in fiction - Middle-aged men in fiction - Americans -- Europe, Eastern -- Fiction - Europe, eastern, fiction - Fiction, thrillers, suspense
- Places: Eastern Europe
Edition Identifiers:
- The Open Library ID: OL7504897M - OL3570686M
- Online Computer Library Center (OCLC) ID: 54480493 - 49991550
- Library of Congress Control Number (LCCN): 2002074640
- All ISBNs: 0425193756 - 9780425193754 - 9780399149887 - 0399149880
First Setence:
"The wolf boy, the wild child, the strange feral creature appeared early one spring as the iced-over screams started to crack and the blown snow on the steppes was melting."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Shelter from the storm at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Don't Look Down
By Suzanne Enoch

“Don't Look Down” Metadata:
- Title: Don't Look Down
- Author: Suzanne Enoch
- Language: English
- Number of Pages: Median: 384
- Publisher: Avon - HarperCollins
- Publish Date: 2005 - 2006
- Publish Location: New York
“Don't Look Down” Subjects and Themes:
- Subjects: ➤ Romance - Security consultants in fiction - Fiction - Security consultants - Billionaires in fiction - Billionaires - Samantha Jellicoe Series - Fiction, romance, contemporary - Florida, fiction
- People: Samantha Jellicoe - Richard Addison
- Places: Palm Beach (Fla.)
Edition Identifiers:
- The Open Library ID: OL7279457M - OL9234164M - OL24252218M
- Library of Congress Control Number (LCCN): 2006567208
- All ISBNs: ➤ 0061199834 - 9780060593643 - 9780061199820 - 0060593644 - 9780061743443 - 9780061199837 - 0061743445 - 0061199826
First Setence:
"Headlights blazing, a car slowed at the turn-off to the main house, hesitated, then accelerated down the road and into the dark again."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Don't Look Down at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Foolproof
By Barbara D'Amato

“Foolproof” Metadata:
- Title: Foolproof
- Author: Barbara D'Amato
- Language: English
- Publisher: Forge
- Publish Date: 2009
- Publish Location: New York
“Foolproof” Subjects and Themes:
- Subjects: ➤ Security consultants in fiction - September 11 Terrorist Attacks, 2001 - Terrorism in fiction - Presidents - Influence - Fiction - Security consultants - Presidents in fiction - Terrorism - September 11 Terrorist Attacks, 2001 in fiction - Prevention - Election - Fiction, thrillers, general
- Places: United States
Edition Identifiers:
- The Open Library ID: OL23688381M
- Online Computer Library Center (OCLC) ID: 317928768
- Library of Congress Control Number (LCCN): 2009034610
- All ISBNs: 0765322668 - 9780765322661
Author's Alternative Names:
"Barbara D'amato"Access and General Info:
- First Year Published: 2009
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Foolproof at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Wiki
Source: Wikipedia
Wikipedia Results
Search Results from Wikipedia
Pulp Fiction
Pulp Fiction is a 1994 American independent crime film written and directed by Quentin Tarantino from a story he conceived with Roger Avary. It tells
Aircraft in fiction
JN-4 featured in the 1921 silent film Stranger than Fiction which starred Katherine MacDonald. The Jenny features in a major sequence in which the aircraft
Computer security
security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security.
Chris Ryan
presenter, security consultant and former Special Air Service sergeant. After the publication of fellow patrol member Andy McNab's Bravo Two Zero in 1993,
The Murderbot Diaries
The Murderbot Diaries is a science fiction series by American author Martha Wells, published by Tor Books. The series is told from the perspective of
Hummingbird Salamander
Jeff VanderMeer. It is set in a near-future dystopia affected by climate change, and narrated by a corporate security consultant, "Jane Smith," who is drawn
Security hacker
A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system
Sandy Berger
18th US National Security Advisor for U.S. President Bill Clinton from 1997 to 2001 after he had served as the Deputy National Security Advisor for the
Victoria Coates
Brouillette in 2020 and later was appointed to run the Middle East Broadcasting Networks. She served on the United States National Security Council, originally
Bob McNally
McNally is an author and consultant who is president of Rapidan Energy Group, a Washington D.C.- consulting firm he established in 2009. During the first