Nemeth “knows how to build suspense” is this legal thriller about a bitter divorce that takes a frightening twist (Publishers Weekly). Florida entrepreneur Randle Marks has just been served with divorce papers by his wife Carrie. It’s not a shock. Conniving, loveless, and adulterous, she’s more of a threat. Randall’s new startup is about to go global, and the millions he’ll rack up will be fair game. He needs a master manipulator on his side—someone like attorney Tony Zambrana who’s already devising a cunning strategy to outwit the voracious soon-to-be divorcée. But Carrie has more on her side than Randle can imagine: outdated laws, shady judges, a dogged detective, and a cutthroat publicity-hungry prosecutor. Not to mention Carrie’s capricious twin sister, and the greedy officers of the court who are more than willing to pit one bull against the other. To win at this increasingly brutal contest, Randle agrees to become the bait in an elaborate and dangerous trap. But for both Carrie and Randle, the cost of losing could be their very lives.
Winner of the Beverly Hills Book Award for Southern Fiction: “A precise, elaborate tale that shows just how menacing a family’s history can be” (Kirkus Reviews). When Randle’s mother becomes critically ill he rushes to her bedside to comfort her. As he puts her affairs in order, he expects to face long-suppressed memories and contemptuous siblings, but he does not expect to discover that in her younger years, while he was an unaware child, his mother was a feisty, courageous woman who bravely battled an abusive husband and made fateful decisions for the good of her children. Now she wants nothing more than to die with dignity, with her secrets intact. But Randle learns that her husband was not his birth father, that a wealthy man who is being extorted claims to be his birth father, and his mother hopes to take the secret of his biological father’s true identity to her grave. As he grapples with the implications for his own identity, Randle uncovers a murder no one knew had been committed and struggles to protect the unwitting man who intends to bequeath him millions of dollars. When he unravels his mother’s dark secrets he unlocks his own demons and is left with the agonizing choice between revenge and greed or forgiveness. “An intriguing who-done-it story that critiques antiquated social practices and values while remaining affectionate to its Georgia setting . . . A story centered on an all-around Southern family, complete with all the dying pageantry and tradition of passing generations in a changing South.” —Deep South magazine
The groundbreaking invention of college football metrics that consistently explain game results and accurately value teams for their quality of play. Lies, Damned Lies and Statistics presents the Relative Performance Grading (RPG) system of statistical measures, which ends all arguments over how good college football teams are relative to one another. Using modern analytics and a dash of ingenious reasoning, Mike Nemeth exposes the need for, and then invents, a new set of statistical measures to explain how and why one team wins and another loses a college football game. The new statistics assign a numerical grade to the playing performances of both winners and losers, just as a student receives a numerical grade on a school test. The grades in this RPG system replace won/lost records and differentiate well-played wins from ugly wins and well-played losses from ugly losses. RPG accurately ranks college football teams according to how well they’ve played the game, i.e. how good a team they are (and, NOT how good their record appears to be).
Each year experts, odds makers, the polls, team records, tournament seeds, and the eyeball test mislead March Madness fans filling office pool brackets. 128 Billion to 1: Ten Steps to Beat the Odds and Win Your NCAA Tourney Office Pool by Mike Nemeth, explains the secrets and inner workings of the NCAA Tournament to exponentially increase one’s odds of filling a winning bracket. It was written for basketball fans who want to understand why they don’t often win their office pool. 128 Billion to 1 is a simple, yet ingenious guide to the way the NCAA Championship works, and explains the factors that best predict the outcome. Paramount among the factors is an accurate assessment of relative team strength to correct misleading polls and erroneous tournament committee selections and seedings. Using analytics, understandable mathematics and a dash of ingenious reasoning, Nemeth exposes the need for a new set of statistical measures to explain the outcomes of basketball games. The new statistics accurately rank each team entering the NCAA Tournament so that fans can make informed picks in their tournament brackets. Weekly accurate rankings can be found at https://nemosnumbers.com/basketball-rankings/.
Written by two successful authors, who are also senior examiners, this book provides students with their very own exam expert to take home, the friendly examiner - The Complete Companion! This tailor-made resource for the AQA A AS specifications will enable students to their understanding of psychology into even better examination performance.
This volume captures the radio scene during the 1970s and 1980s, chronicling how a small FM rock station, WMMS, became the top-rated station in Northeast Ohio and made Cleveland one of the most important radio markets in the world. It includes interviews with radio legends.
A fascinating romp through the life of a broadcasting legend, Mike Read's autobiography offers an exciting insight into his three decades in showbiz. From ventures in radio, television and music, to tales of sport, romance and the royals, Mike writes with candour and humour in equal measure, including tangential stories of famous friends, near-death experiences and extraordinary happenings along the way. Recounting his stints as a Radio One DJ on the Breakfast Show, a prime-time television presenter on Pop Quiz, a co-founder of The Guinness Book of British Hit Singles and a jungle star on I'm a Celebrity ... Get Me Out of Here!, this high-energy journey encapsulates all aspects of the celebrity's vast and varied career. Mike has seized every opportunity, whether in pop, poetry or politics, and continues to entertain audiences as a presenter on several major national radio networks. A story packed with scintillating anecdotes, witty observations, and nostalgic recollections, this is an autobiography that hits all the right notes.
Since the shocking news first broke in 1876 of the Seventh Cavalry’s disastrous defeat at the Little Big Horn, fascination with the battle—and with Lieutenant George Armstrong Custer—has never ceased. Widespread interest in the subject has spawned a vast outpouring of literature, which only increases with time. This two-volume bibliography of Custer literature is the first to be published in some twenty-five years and the most complete ever assembled. Drawing on years of research, Michael O’Keefe has compiled entries for roughly 3,000 books and 7,000 articles and pamphlets. Covering both nonfiction and fiction (but not juvenile literature), the bibliography focuses on events beginning with Custer’s tenure at West Point during the 1850s and ending with the massacre at Wounded Knee in 1890. Included within this span are Custer’s experiences in the Civil War and in Texas, the 1873 Yellowstone and 1874 Black Hills expeditions, the Great Sioux War of 1876–77, and the Seventh Cavalry’s pursuit of the Nez Perces in 1877. The literature on Custer, the Battle of the Little Big Horn, and the Seventh Cavalry touches the entire American saga of exploration, conflict, and settlement in the West, including virtually all Plains Indian tribes, the frontier army, railroading, mining, and trading. Hence this bibliography will be a valuable resource for a broad audience of historians, librarians, collectors, and Custer enthusiasts.
Written by a leading geographer of climate, this book offers a unique guide to students and general readers alike for making sense of this profound, far-reaching, and contested idea. It presents climate change as an idea with a past, a present, and a future. In ten carefully crafted chapters, Climate Change offers a synoptic and inter-disciplinary understanding of the idea of climate change from its varied historical and cultural origins; to its construction more recently through scientific endeavour; to the multiple ways in which political, social, and cultural movements in today’s world seek to make sense of and act upon it; to the possible futures of climate, however it may be governed and imagined. The central claim of the book is that the full breadth and power of the idea of climate change can only be grasped from a vantage point that embraces the social sciences, humanities, and natural sciences. This vantage point is what the book offers, written from the perspective of a geographer whose career work on climate change has drawn across the full range of academic disciplines. The book highlights the work of leading geographers in relation to climate change; examples, illustrations, and case study boxes are drawn from different cultures around the world, and questions are posed for use in class discussions. The book is written as a student text, suitable for disciplinary and inter-disciplinary undergraduate and graduate courses that embrace climate change from within social science and humanities disciplines. Science students studying climate change on inter-disciplinary programmes will also benefit from reading it, as too will the general reader looking for a fresh and distinctive account of climate change.
Written for both the computer layperson and the experienced programmer, this book explores the tenents of the UNIX operating system in detail, dealing with powerful concepts in a comprehensive, straightforward manner. It is a book to be read before tackling the highly technical texts on UNIX internals and programming.
Reimagining press freedom in a networked era: not just a journalist's right to speak but also a public's right to hear. In Networked Press Freedom, Mike Ananny offers a new way to think about freedom of the press in a time when media systems are in fundamental flux. Ananny challenges the idea that press freedom comes only from heroic, lone journalists who speak truth to power. Instead, drawing on journalism studies, institutional sociology, political theory, science and technology studies, and an analysis of ten years of journalism discourse about news and technology, he argues that press freedom emerges from social, technological, institutional, and normative forces that vie for power and fight for visions of democratic life. He shows how dominant, historical ideals of professionalized press freedom often mistook journalistic freedom from constraints for the public's freedom to encounter the rich mix of people and ideas that self-governance requires. Ananny's notion of press freedom ensures not only an individual right to speak, but also a public right to hear. Seeing press freedom as essential for democratic self-governance, Ananny explores what publics need, what kind of free press they should demand, and how today's press freedom emerges from intertwined collections of humans and machines. If someone says, “The public needs a free press,” Ananny urges us to ask in response, “What kind of public, what kind of freedom, and what kind of press?” Answering these questions shows what robust, self-governing publics need to demand of technologists and journalists alike.
This book offers an in-depth explanation of Task-Based Language Teaching (TBLT) and the methods necessary to implement it in the language classroom successfully. Combines a survey of theory and research in instructed second language acquisition (ISLA) with insights from language teaching and the philosophy of education Details best practice for TBLT programs, including discussion of learner needs and means analysis; syllabus design; materials writing; choice of methodological principles and pedagogic procedures; criterion-referenced, task-based performance assessment; and program evaluation Written by an esteemed scholar of second language acquisition with over 30 years of research and classroom experience Considers diffusion of innovation in education and the potential impact of TBLT on foreign and second language learning
Security is now a $500 billion global business, and it`s growing fast. It's developed from the night watchman keeping a sleepy eye out, to the guard patrolling the shopping mall, to smart surveillance systems monitoring everything, everywhere, all the time. This book explains: --how demand for security is generated by an alignment of interests between big business, insurance companies, the media, lawyers, politicians, and human nature; --how our response to terrorism is driven by fear rather than risk; --and how security has become a key feature of our lives at home, on-line, at work, when shopping, and when flying. This is a panoramic view from an industry insider who describes why the more security we have, the more we want. And crucial question emerges, as security incorporates new technology including facial recognition, drones, artificial intelligence, digital analytics, location and heart rate monitoring: are we creating Big Brother or Big Mother? It`s probably the most interesting book on security that you`ll ever read.
Annotation The authoritative solution to passing the Network+ exam! Has CompTIAs Authorized Quality Curriculum (CAQC) stamp of approval. Features exam tips, study strategies, review exercises, case studies, practice exams, ExamGear testing software, and more. This exam certifies that candi20020822s know the layers of the OSI model, can describe the features and functions of network components and have the skills needed to install, configure, and troubleshoot basic networking hardware peripherals and protocols. The Network+ exam, developed by CompTIA, is only two years old but already is held by 50,000 individuals. Readers preparing for this exam will find our Training Guide series to be an indispensiblenbsp;self-study tool. This book is their one-stop shop because of its teaching methodology, the accompanying ExamGear testing software, and Web site support at www.quepublishing.com/certification. Drew Bird(MCNI, MCNE, MCT, MCSE, MCP+I) has been working in the IT industry for over 12 years, instructing for the past five. Drew has completed technical training and consultancy assignments for a wide variety of organizations including the Bank of England, The London Stock Exchange, Iomega and the United Nations. Mike Harwood(MCT, MCSE, A+) has 6+ years experience in IT. As well as training and authoring technical courseware, he currently acts as a system manager for a multi site network and performs consultancy projects for a computer networking company. As a team, they have written Network+ Exam Cram(Coriolis) and Network+ Exam Prep(Coriolis).
As recently as 2008, when Presidents Bush and Obama acted to bail out the nation’s crashing banks and failing auto companies, the perennial objection erupted anew: government has no business in . . . business. Mike O’Connor argues in this book that those who cite history to decry government economic intervention are invoking a tradition that simply does not exist. In a cogent and timely take on this ongoing and increasingly contentious debate, O’Connor uses deftly drawn historical analyses of major political and economic developments to puncture the abiding myth that business once operated apart from government. From its founding to the present day, our commercial republic has always mixed—and battled over the proper balance of—politics and economics. Contesting the claim that the modern-day libertarian conception of U.S. political economy represents the “natural” American economic philosophy, O’Connor demonstrates that this perspective has served historically as only one among many. Beginning with the early national debate over the economic plans proposed by Alexander Hamilton, continuing through the legal construction of the corporation in the Gilded Age and the New Deal commitment to full employment, and concluding with contemporary concerns over lowering taxes, this book demonstrates how the debate over government intervention in the economy has illuminated the possibilities and limits of American democratic capitalism.
Author of The Girl With All the Gifts Mike Carey presents the first book in his hip supernatural thriller series featuring freelance exorcist Felix Castor. Felix Castor is a freelance exorcist, and London is his stomping ground. It may seem like a good ghostbuster can charge what he likes and enjoy a hell of a lifestyle, but there's a risk: sooner or later he's going to take on a spirit that's too strong for him. When Castor accepts a seemingly simple ghost-hunting case at a museum in the shadowy heart of London, what should have been a perfectly straightforward exorcism is rapidly turning into the Who Can Kill Castor First Show, with demons and ghosts all keen to claim the big prize. But that's business as usual: Castor knows how to deal with the dead. It's the living who piss him off. . ..
In Extreme Wine, wine economist and best-selling author Mike Veseth circles the globe searching for the best, worst, cheapest, most expensive, and most over-priced wines. Mike seeks out the most outrageous wine people and places and probes the biggest wine booms and busts. Along the way he applauds celebrity wines, tries to find wine at the movies, and discovers wines that are so scarce that they are almost invisible. Why go to such extremes? Because, Mike argues, the world of wine is growing and changing, and if you want to find out what’s really happening you can’t be afraid to step over the edge. Written with verve and appreciation for all things wine, Extreme Wine will surprise and delight readers.
The world of smart shoes, appliances, and phones is already here, but the practice of user experience (UX) design for ubiquitous computing is still relatively new. Design companies like IDEO and frogdesign are regularly asked to design products that unify software interaction, device design and service design -- which are all the key components of ubiquitous computing UX -- and practicing designers need a way to tackle practical challenges of design. Theory is not enough for them -- luckily the industry is now mature enough to have tried and tested best practices and case studies from the field. Smart Things presents a problem-solving approach to addressing designers' needs and concentrates on process, rather than technological detail, to keep from being quickly outdated. It pays close attention to the capabilities and limitations of the medium in question and discusses the tradeoffs and challenges of design in a commercial environment. Divided into two sections, frameworks and techniques, the book discusses broad design methods and case studies that reflect key aspects of these approaches. The book then presents a set of techniques highly valuable to a practicing designer. It is intentionally not a comprehensive tutorial of user-centered design'as that is covered in many other books'but it is a handful of techniques useful when designing ubiquitous computing user experiences. In short, Smart Things gives its readers both the "why" of this kind of design and the "how," in well-defined chunks. - Tackles design of products in the post-Web world where computers no longer have to be monolithic, expensive general-purpose devices - Features broad frameworks and processes, practical advice to help approach specifics, and techniques for the unique design challenges - Presents case studies that describe, in detail, how others have solved problems, managed trade-offs, and met successes
This book analyses the perceived legitimacy of health and safety in post-1960 British public life. Since 2010 health and safety has appeared to be in crisis, being attacked by press, politicians and public alike, but are these claims of crisis accurate? How have understandings of health and safety changed over the past 60 years? By exploring the history, culture, and operation of health and safety in contemporary Britain, this book provides a new assessment of an understudied, but surprisingly far-reaching, part of the British political and social landscape. Combining archival research with focus group, social survey and oral history testimony, the book examines the historical background to health and safety, how health and safety has been enacted in public and in the workplace, the impact of changing economic, occupational and social structures on the operation of health and safety, and the conflicts and interests that have shaped the area.
New strategies and techniques for today's fast-paced discoveryprocess Today, the pressure is on for high-throughput approaches toaccelerate the generation, identification, and optimization ofmolecules with desirable drug properties. As traditional methods ofanalysis become antiquated, new analytical strategies andtechniques are necessary to meet sample throughput requirements andmanpower constraints. Among them, mass spectrometry has grown to bea front-line tool throughout drug discovery. Integrated Strategies for Drug Discovery Using Mass Spectrometryprovides a thorough review of current analytical approaches,industry practices, and strategies in drug discovery. The topicsrepresent current industry benchmarks in specific drug discoveryactivities that deal with proteomics, biomarker discovery,metabonomic approaches for toxicity screening, lead identification,compound libraries, quantitative bioanalytical support,biotransformation, reactive metabolite characterization, leadoptimization, pharmaceutical property profiling, sample preparationstrategies, and automation. THIS BOOK: * Clearly explains how drug discovery and mass spectrometry areinterconnected * Discusses the uses and limitations of various types of massspectrometry in various aspects of drug discovery * Prominently features analytical applications that requiretrace-mixture analysis * Provides industry applications and real-world examples * Shares historical background information on various techniques toaid in the understanding of how and why new methods are now beingemployed to analyze samples
How to Teach Using Simulation in Healthcare provides an ideal introduction and easy-to-use guide to simulation in medical education. Written by a team of experienced medical educators, this practical text – packed full of case examples and tips – is underpinned by the theory of simulation in education, and explores how to integrate simulation into teaching. Key topics include: Use of low, medium and high fidelity equipment Issues of simulation mapping and scenario design Role of human factors Formative and summative assessment New social media and technologies Detailed explorations of some examples of simulation. How to Teach Using Simulation in Healthcare is invaluable reading for all healthcare professionals interested and involved in the origins, theoretical underpinnings, and design implications of the use of simulation in medical education.
In a time of uncertainty and change in the newspaper industry, this book provides a concise and thorough overview of the field, looking back at newspapers' history, and forward to their future - and insisting there will be one. The authors, former journalists who now teach the subject, review the practices of the profession - from defining news to examining who owns newspapers, from newspaper readership to the new media environment. Written in an accessible style, this comprehensive text is well suited for a range of courses on newspapers.
FinOps brings financial accountability to the variable spend model of cloud. Used by the majority of global enterprises, this management practice has grown from a fringe activity to the de facto discipline managing cloud spend. In this book, authors J.R. Storment and Mike Fuller outline the process of building a culture of cloud FinOps by drawing on real-world successes and failures of large-scale cloud spenders. Engineering and finance teams, executives, and FinOps practitioners alike will learn how to build an efficient and effective FinOps machine for data-driven cloud value decision-making. Complete with a road map to get you started, this revised second edition includes new chapters that cover forecasting, sustainability, and connectivity to other frameworks. You'll learn: The DNA of a highly functional cloud FinOps culture A road map to build executive support for FinOps adoption How to understand and forecast your cloud spending How to empower engineering and finance to work together Cost allocation strategies to create accountability for cloud and container spend Strategies for rate discounts from cloud commitments When and how to implement automation of repetitive cost tasks How to empower engineering team action on cost efficiency
Many inquiry reports blame management for their failures of foresight. These reports are based on the premise that, with a little more thought, these oversights, and so the crisis, would have been avoided. Is it really that simple? The important question is whether, without hindsight, it would have even been possible to identify the actual factors that lead to the failure. This book explores this issue as a practical problem. The book takes Barry Turner’s Disaster Incubation Theory as its central theme. The first chapter explores the way Turner structured his theory and the way it has been used, before re-imagining it as a way to fostering foresight. The next three chapters examine key issues in detail. They explain why Turner's model was chosen, outline the issues that need to be considered when seeking to prevent such failures and how to use the proposed frameworks. Chapter 5 examines the lessons learnt from this study and, in particular, looks at the mental approach required when seeking such foresight. Finally, Chapter 6 provides a fully worked example. It uses work by Frank Stech who has applied Turner's theory to a past case. Crises occur everywhere and we continue to struggle to avoid them. In this book Mike Lauder provides executives with thinking tools to help them avoid missing the warning signs of their next crisis.
More behind-the-screen stories from the golden age of local television! Let’s warm up the old family TV set, step through the screen, and see what was going on behind the scenes with some of our favorite Cleveland television personalities of the 1970s, ’80s, and ’90s. We’ll look back at the rise of glamorous news anchors (including more than one Miss America contestant) with perfect smiles, perky noses, and really big hair . . . Late-night horror-movie hosts battling to take over the legacy of the legendary Ghoulardi . . . The strange, sad saga of the former daytime host who shot himself after a bizarre sex scandal . . . A weatherman who was a lightning rod for coworkers’ endless practical jokes . . . The investigative reporters whose sting operations caught wrongdoers with their pants down—sometimes literally! . . . The gutsy reporter who interviewed Danny Greene hours before the mobster was blown up in his car . . . The Cleveland mayor who co-hosted a children’s show with a ventriloquist’s dummy . . . and many other true tales.
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including: How to plan, set up, and debug an NFS network Using the NFS automounter Diskless workstations PC/NFS A new transport protocol for NFS (TCP/IP) New security options (IPSec and Kerberos V5) Diagnostic tools and utilities NFS client and server tuning NFS isn't really complete without its companion, NIS, a distributed database service for managing the most important administrative files, such as the passwd file and the hosts file. NIS centralizes administration of commonly replicated files, allowing a single change to the database rather than requiring changes on every system on the network.If you are managing a network of Unix systems, or are thinking of setting up a Unix network, you can't afford to overlook this book.
This is the first book created primarily for the field identification of parrots, one of the most familiar and colorful groups of birds. From the mighty. macaws to the diminutive pygmy parrots, the 350 species of parrots include cockatoos, parakeets, lovebirds, and Budgerigar. Most are brightly colored or even gaudy, but a few are drab, and some are nocturnal and flightess. Parrots, found throughout most of the warmer regions of the world, occur in greatest numbers in Australasian and South America. This book includes 88 superb color illustrations of every species and most identifiable subspecies of parrot, as well as range maps of their locations. It offers many firsthand insights into the ecology of each species, vocalizations, life cycle characteristics, and geographical variation. It also provides up-to-date information on the conservation status of those species of parrots that are threatened or endangered.
Widely recognized by sportswriters and fans as the most complete and accurate annual sports record, this sixth edition promises to be the best volume yet. Impeccably researched, it features 64 additional pages and expanded sections on the Winter Olympics and World Cup soccer, 275 photos and cartoons, specially commissioned essays, complete statistics, thumb tabs, and much more.
Each year experts, odds makers, the polls, team records, tournament seeds, and the eyeball test mislead March Madness fans filling office pool brackets. 128 Billion to 1: Ten Steps to Beat the Odds and Win Your NCAA Tourney Office Pool by Mike Nemeth, explains the secrets and inner workings of the NCAA Tournament to exponentially increase one’s odds of filling a winning bracket. It was written for basketball fans who want to understand why they don’t often win their office pool. 128 Billion to 1 is a simple, yet ingenious guide to the way the NCAA Championship works, and explains the factors that best predict the outcome. Paramount among the factors is an accurate assessment of relative team strength to correct misleading polls and erroneous tournament committee selections and seedings. Using analytics, understandable mathematics and a dash of ingenious reasoning, Nemeth exposes the need for a new set of statistical measures to explain the outcomes of basketball games. The new statistics accurately rank each team entering the NCAA Tournament so that fans can make informed picks in their tournament brackets. Weekly accurate rankings can be found at https://nemosnumbers.com/basketball-rankings/.
Winner of the Beverly Hills Book Award for Southern Fiction: “A precise, elaborate tale that shows just how menacing a family’s history can be” (Kirkus Reviews). When Randle’s mother becomes critically ill he rushes to her bedside to comfort her. As he puts her affairs in order, he expects to face long-suppressed memories and contemptuous siblings, but he does not expect to discover that in her younger years, while he was an unaware child, his mother was a feisty, courageous woman who bravely battled an abusive husband and made fateful decisions for the good of her children. Now she wants nothing more than to die with dignity, with her secrets intact. But Randle learns that her husband was not his birth father, that a wealthy man who is being extorted claims to be his birth father, and his mother hopes to take the secret of his biological father’s true identity to her grave. As he grapples with the implications for his own identity, Randle uncovers a murder no one knew had been committed and struggles to protect the unwitting man who intends to bequeath him millions of dollars. When he unravels his mother’s dark secrets he unlocks his own demons and is left with the agonizing choice between revenge and greed or forgiveness. “An intriguing who-done-it story that critiques antiquated social practices and values while remaining affectionate to its Georgia setting . . . A story centered on an all-around Southern family, complete with all the dying pageantry and tradition of passing generations in a changing South.” —Deep South magazine
Nemeth “knows how to build suspense” is this legal thriller about a bitter divorce that takes a frightening twist (Publishers Weekly). Florida entrepreneur Randle Marks has just been served with divorce papers by his wife Carrie. It’s not a shock. Conniving, loveless, and adulterous, she’s more of a threat. Randall’s new startup is about to go global, and the millions he’ll rack up will be fair game. He needs a master manipulator on his side—someone like attorney Tony Zambrana who’s already devising a cunning strategy to outwit the voracious soon-to-be divorcée. But Carrie has more on her side than Randle can imagine: outdated laws, shady judges, a dogged detective, and a cutthroat publicity-hungry prosecutor. Not to mention Carrie’s capricious twin sister, and the greedy officers of the court who are more than willing to pit one bull against the other. To win at this increasingly brutal contest, Randle agrees to become the bait in an elaborate and dangerous trap. But for both Carrie and Randle, the cost of losing could be their very lives.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.