The Sword of Attila

The Sword of Attila Image

“AD 439: The Roman Empire is on the brink of collapse. With terrifying speed a Vandal army has swept through the Roman provinces of Spain and North Africa, conquering Carthage and threatening Roman control of the Mediterranean. But a far greater threat lies to the east, a barbarian force born in the harsh steppelands of central Asia, warriors of unparalleled savagery who will sweep all before them in their thirst for conquest - the army of Attila the Hun.

For a small group of Roman soldiers and a mysterious British monk, the only defense is to rise above the corruption and weakness of the Roman emperors and hark back to the glory days of the army centuries before, to find strength in history. Led by Flavius, a young tribune, and his trusty centurion Macrobius, they fight a last-ditch battle against the Vandals in North Africa before falling back to Rome, where they regroup and prepare for the onslaught to come. Flavius learns that the British monk who had fled with them from Carthage is more than he seems, and he is drawn into a shady world of intelligence and intrigue under the aegis of Flavius' uncle Aetius, commander-in-chief of the Roman armies in the west, the man who alone has the power to rally Rome and her allies and save the western empire from annihilation.
Aetius is desperate to buy time until his army is strong enough to confront the Huns on the field of battle, and meanwhile will do anything to undermine their strength. Together they devise a plan of astonishing audacity that will take Flavius and Macrobius across the frontier and far up the river Danube to the heart of darkness itself, to the stronghold of the most feared warrior-emperor the world has ever known – and into alliance with the emperor's daughter, a warrior-princess who has sworn vengeance against her father for the death of her mother. In the showdown to come, in the greatest battle the Romans have ever fought, victory will go to those who can hold high the most potent symbol of war ever wrought by man - the sacred sword of Attila.

Details e-Book The Sword of Attila

🗸 Author(s):
🗸 Title: The Sword of Attila
🗸 Rating : 4 from 5 stars (6 reviews)
🗸 Format ebook: PDF, EPUB, Kindle, Audio, HTML and MOBI
🗸 Supported Devices: Android, iOS, MacOS, PC and Amazon Kindle

What do I get?

✓ Read as many eBooks you want!
✓ Secure Scanned. No Virus Detected
✓ Thousands of eBooks to choose from - Hottest new releases
✓ Click it and Read it! - no waiting to read eBooks, it's instant!
✓ Keep reading your favorite eBooks over and over!
✓ It works anywhere in the world!
✓ No late fees or fixed contracts - cancel anytime!

Readers' opinions about The Sword of Attila by David Gibbins

The plot twists were executed masterfully. I was left gasping at every unexpected turn, and the suspense kept me on edge throughout. Bravo to the author for keeping me guessing.

This is a book I'll cherish and recommend to everyone. It touched my soul and made me reflect on life's profound mysteries.

This is a book I'll cherish and recommend to everyone. It touched my soul and made me reflect on life's profound mysteries.

More by David Gibbins

Related eBook The Sword of Attila

Ghost in the Wires by William L. Simon, Steve Wozniak & Kevin Mitnick System Design Interview – An Insider's Guide by Alex Xu Networking All-in-One For Dummies by Doug Lowe IT Auditing Using Controls to Protect Information Assets, Third Edition by Chris Davis, Mike Schiller & Kevin Wheeler Black Hat Bash by Nick Aleks & Dolev Farhi C# 6 for Programmers by Paul Deitel & Harvey Deitel A Beginner's Guide to Ham Radio by GEORGE FREEMAN Understanding AI: A Comprehensive Guide for Beginners by Frank Zanish Cloud Native Go by Matthew A. Titmus Industrial Automation from Scratch by Olushola Akande iCloud for Beginners by Scott La Counte Explain the Cloud Like I’m 10 by Todd Hoff Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition by Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez & Moses Frost How to Hack Like a Legend by Sparc Flow Mastering Docker by Russ McKendrick (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests by Mike Chapple & David Seidl Network Architect's Handbook by Alim H. Ali Mastering Apple iPhone - iPhone XS, XS Max, XR, 8 Plus, and IOS 12 Ultimate User Guide by Adidas Wilson Official (ISC)2 Guide to the CISSP CBK by Hal Tipton & Steven Hernández TCP / IP For Dummies by Candace Leiden & Marshall Wilensky Cisco IOS Quick Reference Cheat Sheet by Douglas Chick VMware vSphere For Dummies by Daniel Mitchell & Tom Keegan Storage Area Networks For Dummies by Christopher Poelker & Alex Nikitin Day One: Junos Monitoring & Troubleshooting by Jamie Panagos & Albert Statti Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) by Benjamin Walker Day One Exploring IPV6 by Chris Grundemann Day One: Configuring EX Series Ethernet Switches, Second Edition by Yong Kim Hacking Exposed 7 by Stuart McClure, Joel Scambray & George Kurtz Day One: Configuring Junos Policies and Firewall Filters by Jack W. Parks, IV Network+ All-in-One Exam Guide, Sixth Edition (Exam N10-006) by Mike Meyers Official (ISC)2 Guide to the CISSP CBK by Hal Tipton Virtualization For Dummies by Bernard Golden TCP/IP Illustrated by Kevin Fall & W Stevens Day One: Deploying Basic QoS by Guy Davies Day One: Advanced IPv6 Configuration by Chris Grundemann DNS and BIND by Cricket Liu & Paul Albitz Synology NAS Setup Guide by Nicholas Rushton Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson SharePoint 2010 For Dummies by Vanessa L. Williams Wireless Home Networking For Dummies by Danny Briere & Pat Hurley Time Management for System Administrators by Thomas A. Limoncelli Network Warrior by Gary A. Donahue Mastering Active Directory for Windows Server 2008 by John A. Price, Brad Price & Scott Fenstermacher Microsoft Windows Networking Essentials by Darril Gibson Ethical Hacking by Daniel G. Graham The Pentester BluePrint by Phillip L. Wylie & Kim Crawley Official (ISC)2 Guide to the CISSP CBK by Hal Tipton Microsoft SharePoint 2007 For Dummies by Vanessa L. Williams Getting Started with RFID by Tom Igoe Networking for Systems Administrators by Michael W. Lucas