Twenty-six-year-old, Shanaya, finds her idea of home and family ripped apart when she loses her mother. Her effort to drown herself in her job proves to be financially rewarding and her work is recognized by the organisation. But, even...
“Two people so different yet so alike. The one thing that unites them is obsession.” ‘Consumed By Obsession’ is the story of a grieving widower, Raj, who is convinced his wife’s grisly death is not an accident. Raj becomes...
SHORTLISTED FOR THE POL ROGER DUFF COOPER PRIZE LONGLISTED FOR THE CUNDILL HISTORY PRIZE SHORTLISTED FOR THE HWA CROWN AWARDS When Thomas Roe arrived in India in 1616 as James I’s first ambassador to the Mughal Empire, the English...
A serial killer is terrorizing Dilli and Mughal nobleman and detective Muzaffar Jang might have finally met his match. In the spring of 1657, the Mughal armies have reached the Deccan, besieging the Fort of Bidar. Back home in...
“Curfewed Night” is a brave and unforgettable piece of literary reporting that reveals the personal stories behind one of the most brutal conflicts in modern times. Since 1989, when the separatist movement exploded, more than seventy thousand people have...
Largely set in upper-middle-class Delhi in the 1990s, kapur’s fifthe novel opens iwth a premise familiar in fables – that the beautiful and lucky can do what they want, usually at the expense of the less fortunate. The story...
Isabel, born into the British Raj, and Asha, a young Hindu girl, both consider India their home. Mischance will bring them together and drive them from the bustle of Delhi to the shores of the Andaman Islands, from glittering...
A body recovered from a tandoor oven. A young accountant missing with a suitcase full of cash. A city in the heady grip of T20 fever. Private eye Arjun Arora works the streets of Delhi dealing with the shady...
Moira Madhwa is the typical young, beautiful and successful urban woman until the day she goes missing. Her friends start looking for her, but quickly realize nothing is as it seems. Moira had kept devastating secrets—secrets that could wreck...
Terrorism in one of the world’s flashpoints Dotan Naor, a former Israeli security agent, now private investigator, agrees to locate the missing son of ruthless Israeli arms merchant Willy Mizrachi. Willy is desperate to find his only son, Itiel,...
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.