Your cart

Close

Total AUD

Checkout

Imprint

  • Sphere
  • Sphere

On Target

Mark Greaney

3 Reviews

Rated 0

Gray Man, Fiction, Crime & mystery, Thriller / suspense

The second razor-sharp thriller by the number one New York Times-bestselling author of The Gray Man.

The killer second Gray Man thriller by number one New York Times-bestseller Mark Greaney sees the past catching up with Court Gentry with fatal results.

Four years ago, Court Gentry was betrayed by his handlers in the CIA. To survive, he has to eliminate his own brothers in arms. Now, as a master assassin known as the Gray Man, he makes his living killing other people. But when an old comrade he thought dead returns to haunt him, his own life is put in the crosshairs.

The man wants Court to complete a mission - but instead of an assassination, the job will entail a nearly impossible kidnapping - and Court must return his quarry to the very CIA team that turned on him...

Soon to be a major Netflix series, On Target takes the Gray Man into the depths of danger - and ready to fight.

Read More Read Less

Praise for On Target

  • Hard, fast and unflinching - Lee Child

  • Writing as smooth as stainless steel and a hero as mean as razor wire - David Stone

  • From the opening pages, the bullets fly and the bodies pile up...Comparisons will be made to Jason Bourne, but The Gray Man is his own character - Booklist

Read More Read Less

Mark Greaney

Mark Greaney has a degree in international relations and political science. In his research for the Gray Man novels he travelled to more than fifteen countries and trained alongside military and law enforcement in the use of firearms, battlefield medicine, and close-range combative tactics. With Marine Lt Col Rip Rawlings, he wrote the New York Times bestseller Red Metal. He is also the author of the New York Times bestsellers Tom Clancy Support and Defend, Tom Clancy Full Force and Effect, Tom Clancy Commander in Chief, and Tom Clancy True Faith and Allegiance. With Tom Clancy, he co-authored Locked On, Threat Vector, and Command Authority.

This website uses cookies. Using this website means you are okay with this but you can find out more and learn how to manage your cookie choices here.Close cookie policy overlay