Thursday, August 16, 2018

Amish Christmas Secrets



By Debby Giusti

The end of a series is always bittersweet. Amish Christmas Secrets, the fourth and final book in my Amish Protectors series, comes out in October. Although I’m eager to see how readers like the story, I’ve become attached to my characters and hate to let them go.

Over the past few months, I’ve written Amish Safe House, book 2 in the new Amish Witness Protection continuity from Love Inspired Books, which will be out in early 2019. I’ve also been working on a new proposal. Still, a part of me wants to return to the characters I’ve grown to love, especially Rosie Glick, the surprise heroine in Amish Christmas Secrets.

Two years ago, I submitted the proposal for the Amish Protectors series as a three book deal, featuring three sisters, each with her own story.  When my editor added a fourth book to the contract, Rosie started to make herself known. The sheriff in the first book, Amish Refuge, mentioned her—quite unexpectedly. Rosie made another surprise visit in Undercover Amish. By the third story, Amish Rescue, Rosie was demanding her own book.


I like Rosie Glick. She’s strong and determined. Plus, she’s an unwed mom who will do anything to protect her baby. She’s also one of my favorite characters.


Do you get attached to the characters in a series? Do you have a favorite character from a Love Inspired story you’ve either read or written?

Happy writing! Happy reading!

Wishing you abundant blessings,
Debby Giusti


AMISH CHRISTMAS SECRETS
By Debby Giusti

Safe Haven for the Holidays
The thrilling Amish Protectors conclusion.
Leaving the nursing home where she works, Rosie Glick’s accosted
by a man demanding incriminating evidence her murdered boyfriend
stole—until Ezra Stoltz scares him off. Now with a killer dead set on
silencing the Amish single mother, Ezra must hide Rosie and her baby
to keep them safe. But can he expose a sinister conspiracy in time
to save the woman he secretly loves?

Pre-order Amish Christmas Secrets here!






16 comments:

  1. Debby, I've truly enjoyed reading this series. It is bittersweet to say goodbye to a series. I know we, as authors, get attached to them. They become our friends. It's hard to say goodbye to a friend.

    ReplyDelete
    Replies
    1. Thanks so much, Mary!

      Yes, the characters do become friends, don't they? We know them so well and enter into their worlds. I always need time to bid them farewell before I move on to the next project.

      Delete
  2. I know what you mean, Debby--so easy to get attached to characters, especially when you continue to learn new things about them in succeeding novels. I have some favorites in the series I'm currently writing and know I will miss them when it ends.

    I'm behind on your Amish Protectors series and need to catch up!

    ReplyDelete
  3. In my Military Investigations series, I had planned to write the special agent in charge's story at the conclusion of the series...then my editor asked me to write an Amish suspense series. Perhaps someday I'll write the military story that still tugs at my heart. Interesting how our characters weave their way into our lives. :)

    ReplyDelete
  4. I love it when characters get pushy like that! Sounds like an interesting story, Debby.

    ReplyDelete
  5. This sounds sooo good!!! I love series, the characters become good friends.

    ReplyDelete
    Replies
    1. I feel the same way, Jennifer! They do become friends.

      Delete
  6. I'm always amazed by how a mere mention of a name can spawn a whole book. Looking forward to reading this one.

    ReplyDelete
  7. Debby, I am sooo behind in reading this series and would like to purchase the series on Kindle...not separately but combined. (does that make sense? ha) I checked Amazon, but did not see that available. ??
    Thx

    ReplyDelete
  8. SOFT TECH GEEKS
    Soft Tech Geeks is a chinese underground organisation of computer experts and hackers. We stay discrete in order to prevent the identity of our clients from FEDs and individuals.
    • Hacking really takes the right tools and equipment (Spywares and other necessary softwares).
    Most people really think that a hacker can just breaking into a security system just by browsing through the site.
    But if you really need a hacker we are here for you. We give you full details of our strategy on how we are going to get the job done, then you can decide if we are really or not.

    HOW WE WORK:

    • We don't ask personal questions about you and we dont give out our personal information.
    We strictly do business and don't expose you or your service to you to anyone.
    That's how discrete we are.

    OUR HACKING SERVICES:
    As long as technology is involved anything can be hacked.
    *Most people want to Hack a target's email I.D, social media websites or apps, smartphones, for many reasons such as husband cheating on wife, girlfriend cheating on boyfriend.
    *if you need to hack a particular organisation so as to sniff, delete, change a particular information or records.
    *as a parent you might need to monitor what your children are doing on social media and on their personal computers or even clone their phones to also hear their calls or see text messages on any app they chatting with, so that they don’t get into trouble.
    *if you want to hack a private domain email account(business email).
    *you want to eraze your name from court’s criminal records, perhaps you might want to Hack into the database of any government agency,
    *you want to spend someone's money by cloning another credit card to their account without bank or the user's notification,
    *some people want to mine bit coin, we can create a platform for you to mine bit coin without having to cheat anyone.
    All these are what we can get done within few hours.

    OUR ASSURANCE TO YOU:
    Fankly speaking, we always give a 100% guarantee on an job we take. Time to complete a job depends on the complication of the job and if we take your job then be rest assured that it will be done, and we give you a 100% assurance that we cover our tracks well enough, so when we do a job its like we were never there. We have also come across FAKE HACKERS claiming they will get the job done in a short time , and sharing testimony of themselves but they are all scams (AVOID THEM).
    REMEMBER THIS "AS LONG AS IT'S TECHNOLOGY IT CAN BE HACKED"

    We look forward to working for you.
    SOFT TECH GEEKS
    softtechgeeks@gmail.com

    ReplyDelete