Friday, September 21, 2018

Friday's Forgotten Books, September 21, 2018


This is the third book of what McKinty calls THE TROUBLES TRILOGY. This won the Ned Kelly Award and I enjoyed it immensely. It's a locked room murder inside a story of the troubles. I have not read the first two books so that probably factors in to a certain lack of knowledge of the character and his problems with the Royal Ulster Constabulary,

Sean Duffy has a chance for reinstatement in the local forces if he is able to find the whereabouts of an infamous IRA member. The two were childhood friends so this gives him a certain insight into the terrorist. His deal with those who can tell him Dermot's whereabouts is to solve the locked room murder of their daughter a few years back. And watching Duffy solve this crime is enjoyable. McKinty writes very clearly and yet doesn't repeat himself. It's a pleasure to be led through the clues by such a good plotter.

Also enjoyable is McKinty's use of Joseph Kennedy Jr. on a trip to Belfast. And the final scenes, which take place during Margaret Thatcher's stay in a Brighton Hotel, are exciting. I liked the style of writing and the cast of characters a lot. We get some of Duffy's life but not enough to slow the action down. I also really like the single POV in this book. It does make following a plot easier. Highly recommended for crime fiction lovers.

Frank Babics, CONJURE WIFE, Fritz Leiber
Mark Baker, MURDER ON MARBLE ROW, Victoria Thompson
Les Blatt, THE WIDOW's CRUISE, Nicholas Blake
Elgin Bleecker, STOOL PIGEON, Louis Malley
Brian Busby, Five Short Canadian Plays, Fred Jacob
Crossexaminingcrime, POISON IN JEST, John Dickson Carr
Martin Edwards, MURDER'S FEN, Andrew Garve
Curt Evans, THE RELUCTANT MURDERER, Bernice Carey
Richard Horton, DREK  YARMAN, Keith Roberts
George Kelley, WAR OF THE DONS/BLACK MAFIA, Peter Rabe
Margot Kinberg, MARLBOROUGH MAN, Alan Carter
Rob Kitchin, FLETCH, Gregory McDonald
Kate Laity, A FAR CRY FROM KENSINGTON, Muriel Spark
B.V. Lawson, DEATH OF A DUTCHMAN, Magdelen Nabb
Evan Lewis, THE DOOM LEGION, Will Murray
Steve Lewis, THE BUY BACK BLUES, Frank Dennis
Todd Mason,  MY LIFE AS A CARTOONIST by Harvey Kurtzman as told to Howard Zimmerman
Only Detect, HALO FOR SATAN, Howard Browne
Matt Paust, DETECTIVE INSPECTOR HUSS, Helene Tursten
James Reasoner, SCARRED FACES, Hank Janson
Richard Robinson, THE BOOKMAN, Lavie Tildar
Kevin Tipple. MURDER ON THE ICE, Ted Wood
TomCat, Vegetable Duck, John Rhoade
TracyK, LIMBO LINE, Victor Canning


Jeff Meyerson said...

I agree. I've very much enjoyed the six (so far) books in the series. I see Blackstone will be publishing the next three, as well as reprinting the earlier books.

Yvette said...

Patti, I'm taking a blogging break for a few weeks. Just need some time to refresh and to get some things that need doing done. Thanks again for all you do and for allowing me to be a part of FFB. Hopefully I can still contribute when I return.

pattinase (abbott) said...

I sure hope so, Yvette. Take care.

Mathew Paust said...

You won't be forgotten, Yvette, but don't you dare forget about us!

K. A. Laity said...

I got around to one!

Gerard Saylor said...

I'm behind on my notes and have nothing for this week. I just read a Stuart Neville novel and keep getting him and Adrian McKinty confused.

Elgin Bleecker said...

Thanks for compiling the FFB list, Patti.

Curt Lennix said...


Have you ever wondered if it's possible to hack things the way hackers do it in the movies.πŸ€”πŸ€”

         Yeah its possible!!!😁😁😁


    Hacking can easily be done by planting a computer virus or spyware(depending on what the hacker intend to do) in the targeted device.🀐🀐

     We at THE HACK GEEKS give you the best hacking service there ever is.πŸ‘ŒπŸ‘Œ

We understand the Issues of scammers all over the internet and that's why we give you a solid prove of our services.

         We have got the top hackers in that are always ready to hack for you anytime ,anywhere, any device, organisation, federal agencies, university, college you just think of it.

 We can help:

*To Hack, Clone or Track a Phone?πŸ“±πŸ“²

Eg: Cloning of phones

       Spying on kids, wife or husband.

      Tracking of user location & daily routine.

*To Sniff, Erase or Change a file in a Company, Organisation or in a Federal agency?πŸ“–πŸ“ƒ

Eg: Changing of grades in a university.

      Changing of identity.

      Deleting of files such as criminal records and evidence.

      Changing of files and evidence in federal facilities.

      Stealing of files and document from companies and organizations.

*To retrieve lost BitCoinπŸ’°πŸ’°

*Mining of BitCoinπŸ’°πŸ’°

*To hack an Email or any Social Media account?πŸ’ž

*To Transfer funds without been detected?πŸ’΄πŸ’΅πŸ’·

*To increase your credit score?πŸ”πŸ”

*To Hack Credit/Debit card?πŸ’³πŸ’³

*Obtaining black Credit/Debit card.πŸ’³πŸ’³


    We are descrete and won't expose our service to you to anyone.


We look forward to hacking for you.

Unknown said...

colorectal cancer surgery kingwooda
colon cancer surgery kingwood
rectal surgeon kingwood
general surgeon kingwood
colon cancer surgery Houston
Dr Ambe
surgery for colon cancer Houston
Anal surgery houston
colon surgeon kingwood
Hemorrhoid doctor Houston
colon surgery Houston
colorectal surgeon Houston
colorectal surgery Houston
rectal surgery Houston
general surgery Houston
laparoscopic surgery for colon cancer
laparoscopic colorectal surgery
colon cancer surgeon
hemorrhoid surgeon