Jeff Aiken Series
3.5/5
()
About this series
A thought-provoking new short story from the acclaimed author of Zero Day and Trojan Horse.
Challenging Anonymous is like waving a red flag in front of a bull. But the CEO of a major investment firm has done just that, and now cyber security expert Jeff Aiken has to try to protect the company from its leader's mistakes. The timing couldn't be worse, as Jeff is scheduled to appear at a conference that has invited an Anonymous representative as well. And Jeff's about to discover that the hacker outfit plans to bring their fight offline--and into the real world.
Titles in the series (3)
- Zero Day: A Jeff Aiken Novel
1
An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe. Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today---it's a cataclysmic disaster just waiting to happen.
- Trojan Horse: A Jeff Aiken Novel
2
It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team. But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace---more sophisticated than any virus seen before---has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance. A thrilling suspense story and a sober warning from one of the world's leading experts on cyber-security, Trojan Horse exposes the already widespread use of international cyber-espionage as a powerful and dangerous weapon, and the lengths to which one man will go to stop it.
- Rogue Code: A Jeff Aiken Novel
3
Michael Lewis' Flash Boys revealed how high-frequency trading has created a ruthless breed of traders capable of winning whichever way the market turns. In Rogue Code, Mark Russinovich takes it one step further to show how their grip on high finance makes the stock market vulnerable to hackers who could bring about worldwide financial collapse. Cyber security expert Jeff Aiken knows that no computer system is completely secure. When he's called to investigate a possible breach at the New York Stock Exchange, he discovers not only that their system has been infiltrated but that someone on the inside knows. Yet for some reason, they have allowed the hackers to steal millions of dollars from accounts without trying to stop the theft. When Jeff uncovers the crime, the NYSE suddenly turns on him. Accused of grand larceny, he must find and expose the criminals behind the theft, not just to prove his innocence but to stop a multibillion-dollar heist that could upend the U.S. economy. Unwilling to heed Jeff's warnings, the NYSE plans to continue with a major IPO using a new, untested system, one that might be susceptible both to hackers and to ruthless high-frequency traders willing to take any risk to turn a profit. Now Jeff Aiken must unearth the truth on his own, following the thread to the back alleys of Rio de Janeiro to take on one of the world's most ruthless cartels. Praised for his combination of real-world technology and quick-paced action, with Rogue Code Mark Russinovich delivers an intense thriller about a cyber threat that seems all too possible---and the Wall Street traders who might allow it to happen. Includes a foreword by Haim Bodek, author of The Problem of HFT: Collected Writings on High Frequency Trading & Stock Market Structure Reform.
Mark Russinovich
MARK RUSSINOVICH works at Microsoft as a Technical Fellow, Microsoft’s senior-most technical position. A cofounder of Winternals, he joined Microsoft when the company was acquired in 2006. He is author of the novels Zero Day and Trojan Horse, the popular Sysinternals tools, coauthor of the Windows Internals book series, a contributing editor for TechNet Magazine, and a senior contributing editor for Windows IT Pro Magazine. He lives in Washington State.
Related to Jeff Aiken Series
Related ebooks
Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto Rating: 0 out of 5 stars0 ratingsSmarter Than Us: The Rise of Machine Intelligence Rating: 4 out of 5 stars4/5Rogue Code: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Extended Reality in Practice: 100+ Amazing Ways Virtual, Augmented and Mixed Reality Are Changing Business and Society Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsWhere Wizards Stay Up Late: The Origins Of The Internet Rating: 4 out of 5 stars4/5Cypherpunks: Freedom and the Future of the Internet Rating: 4 out of 5 stars4/5Hackers, Heroes of the Computer Revolution Chapters 1 and 2 Rating: 5 out of 5 stars5/5Greatest Hackers in the History Rating: 5 out of 5 stars5/5Zero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5Python for Cybersecurity: Using Python for Cyber Offense and Defense Rating: 0 out of 5 stars0 ratingsThe Project Saboteur: Knowing Him is Just the Beginning Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 3 out of 5 stars3/5Summary of Kevin D. Mitnick's The Art of Invisibility Rating: 0 out of 5 stars0 ratingsTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World Rating: 5 out of 5 stars5/5Advanced Penetration Testing Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsUnderstanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition Rating: 0 out of 5 stars0 ratingsThe Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Rating: 3 out of 5 stars3/5Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5Buffer Overflow Attacks: Detect, Exploit, Prevent Rating: 4 out of 5 stars4/5Designing Machine Learning Systems with Python Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Burp Suite A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsBreaking and Entering: the extraordinary story of a hacker called ‘Alien’ Rating: 3 out of 5 stars3/5Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsThe Antivirus Hacker's Handbook Rating: 0 out of 5 stars0 ratingsPenetration Tester's Open Source Toolkit Rating: 0 out of 5 stars0 ratingsThe Sentient Machine: The Coming Age of Artificial Intelligence Rating: 3 out of 5 stars3/5
Thrillers For You
The 7 1/2 Deaths of Evelyn Hardcastle Rating: 4 out of 5 stars4/5Pretty Girls: A Novel Rating: 4 out of 5 stars4/5The Institute: A Novel Rating: 4 out of 5 stars4/5The Last Flight: A Novel Rating: 4 out of 5 stars4/5I'm Thinking of Ending Things: A Novel Rating: 4 out of 5 stars4/5Billy Summers Rating: 4 out of 5 stars4/5Cryptonomicon Rating: 4 out of 5 stars4/5Animal Farm Rating: 5 out of 5 stars5/5Leave the World Behind: A Read with Jenna Pick Rating: 3 out of 5 stars3/5The Housemaid Rating: 4 out of 5 stars4/5The Dark Tower I: The Gunslinger Rating: 4 out of 5 stars4/5The Sympathizer: A Novel (Pulitzer Prize for Fiction) Rating: 4 out of 5 stars4/5Shantaram: A Novel Rating: 4 out of 5 stars4/5The Only Good Indians Rating: 4 out of 5 stars4/5The Eyes of the Dragon Rating: 4 out of 5 stars4/5Razorblade Tears: A Novel Rating: 4 out of 5 stars4/5Rock Paper Scissors: A Novel Rating: 4 out of 5 stars4/5You: A Novel Rating: 4 out of 5 stars4/5Fairy Tale Rating: 4 out of 5 stars4/5The Lying Game: A Novel Rating: 4 out of 5 stars4/5Finn Rating: 4 out of 5 stars4/5The It Girl Rating: 4 out of 5 stars4/5The Maidens: A Novel Rating: 3 out of 5 stars3/5Needful Things Rating: 4 out of 5 stars4/5The Cabin at the End of the World: A Novel Rating: 4 out of 5 stars4/5The Rose Code: A Novel Rating: 5 out of 5 stars5/5Mr. Mercedes: A Novel Rating: 4 out of 5 stars4/5The Golden Spoon: A Novel Rating: 4 out of 5 stars4/5The Family Upstairs: A Novel Rating: 4 out of 5 stars4/5The Huntress: A Novel Rating: 4 out of 5 stars4/5
Related categories
Reviews for Jeff Aiken Series
155 ratings0 reviews