Credible threat
Resource Information
The work Credible threat represents a distinct intellectual or artistic creation found in Manchester City Library. This resource is a combination of several types including: Work, Language Material, Books.
The Resource
Credible threat
Resource Information
The work Credible threat represents a distinct intellectual or artistic creation found in Manchester City Library. This resource is a combination of several types including: Work, Language Material, Books.
- Label
- Credible threat
- Statement of responsibility
- J. A. Jance
- Subject
-
- Death threats -- Fiction
- Detective and mystery fiction
- Detective and mystery fiction
- Fiction
- Large print books
- Large type books
- Murder -- Investigation -- Fiction
- Mystery fiction
- Reynolds, Ali (Fictitious character) -- Fiction
- Women private investigators -- Arizona -- Fiction
- Women private investigators -- Fiction
- Arizona -- Fiction
- Bishops -- Crimes against -- Fiction
- Language
- eng
- Summary
- Years after her son?s fatal overdose, grieving mother Rachel Higgins learns that his addiction may have grown out of damage suffered at the hands of a pedophile priest while he was in high school. Looking for vengeance, she targets the Catholic Church?s most visible local figure, Archbishop Francis Gillespie. When the archbishop begins receiving anonymous threats, local police dismiss them, saying they?re not credible. So he turns to his friends, Ali Reynolds and her husband, B. Simpson. With B. out of the country on a cybersecurity emergency, it?s up to Ali to track down the source of the threats. When a shooter assassinates the archbishop?s driver and leaves the priest himself severely injured, Ali forms an uneasy alliance with a Phoenix homicide cop in hopes of preventing another attack. But Ali doesn?t realize that the killer has become not only more unhinged but also more determined to take out his or her target
- Cataloging source
- AUTNL
- Index
- no index present
- Literary form
- fiction
- Series statement
- Ali Reynolds mysteries
- Series volume
- 15
Context
Context of Credible threatWork of
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.manchesterlibrary.org/resource/yWChRRaRMhI/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.manchesterlibrary.org/resource/yWChRRaRMhI/">Credible threat</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.manchesterlibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.manchesterlibrary.org/">Manchester City Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Credible threat
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.manchesterlibrary.org/resource/yWChRRaRMhI/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.manchesterlibrary.org/resource/yWChRRaRMhI/">Credible threat</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.manchesterlibrary.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.manchesterlibrary.org/">Manchester City Library</a></span></span></span></span></div>