Trojan Horse: A Jeff Aiken Novel
Written by Mark Russinovich and Kevin Mitnick
Narrated by Johnny Heller
4/5
()
About this audiobook
It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team.
But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace---more sophisticated than any virus seen before---has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.
A thrilling suspense story and a sober warning from one of the world's leading experts on cyber-security, Trojan Horse exposes the already widespread use of international cyber-espionage as a powerful and dangerous weapon, and the lengths to which one man will go to stop it.
Mark Russinovich
MARK RUSSINOVICH works at Microsoft as a Technical Fellow, Microsoft’s senior-most technical position. A cofounder of Winternals, he joined Microsoft when the company was acquired in 2006. He is author of the novels Zero Day and Trojan Horse, the popular Sysinternals tools, coauthor of the Windows Internals book series, a contributing editor for TechNet Magazine, and a senior contributing editor for Windows IT Pro Magazine. He lives in Washington State.
Related to Trojan Horse
Titles in the series (3)
Zero Day: A Jeff Aiken Novel Rating: 3 out of 5 stars3/5Trojan Horse: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5Rogue Code: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5
Related audiobooks
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime Rating: 4 out of 5 stars4/5The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Rating: 4 out of 5 stars4/5The God's Eye View Rating: 4 out of 5 stars4/5Rogue Code: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5Zero Day: A Jeff Aiken Novel Rating: 3 out of 5 stars3/5Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5Schneier on Security Rating: 4 out of 5 stars4/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Russian Cyber Warfare: The History of Russia’s State-Sponsored Attacks across the World Rating: 4 out of 5 stars4/5Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Hackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsThe Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Cybersecurity: On Threats Surfing the Internet and Social Media Rating: 0 out of 5 stars0 ratings
Thrillers For You
Leave the World Behind: A Novel Rating: 3 out of 5 stars3/5Never Lie Rating: 4 out of 5 stars4/5The Silent Patient Rating: 4 out of 5 stars4/5A Flicker in the Dark: A Novel Rating: 4 out of 5 stars4/5Holly Rating: 4 out of 5 stars4/5Fairy Tale Rating: 5 out of 5 stars5/5Dark Tower I: The Gunslinger Rating: 4 out of 5 stars4/5The Teacher Rating: 4 out of 5 stars4/5Listen for the Lie: A Novel Rating: 4 out of 5 stars4/5The Institute: A Novel Rating: 4 out of 5 stars4/5Perfect: A Thriller That Will Grab You By Your DNA Rating: 4 out of 5 stars4/5The Perfect Marriage: a completely gripping psychological suspense Rating: 4 out of 5 stars4/5The Guest List: A Novel Rating: 4 out of 5 stars4/5Bright Young Women: A Novel Rating: 4 out of 5 stars4/5The Fury Rating: 4 out of 5 stars4/5Wrong Place Wrong Time: A Novel Rating: 4 out of 5 stars4/5The Paris Apartment: A Novel Rating: 4 out of 5 stars4/5Local Woman Missing Rating: 4 out of 5 stars4/5The Future Rating: 4 out of 5 stars4/5The Inmate Rating: 4 out of 5 stars4/5You Like It Darker: Stories Rating: 5 out of 5 stars5/5Mr. Mercedes: A Novel Rating: 4 out of 5 stars4/5Did I Kill You?: A Thriller Novel Rating: 4 out of 5 stars4/5The Wife Upstairs Rating: 4 out of 5 stars4/5The Rose Code: A Novel Rating: 5 out of 5 stars5/5The Dead Zone Rating: 4 out of 5 stars4/5All the Sinners Bleed: A Novel Rating: 5 out of 5 stars5/5What Lies Between Us Rating: 4 out of 5 stars4/5The Turn of the Key Rating: 4 out of 5 stars4/5The Hunting Party: A Novel Rating: 4 out of 5 stars4/5
Related categories
Reviews for Trojan Horse
9 ratings4 reviews
- Rating: 2 out of 5 stars2/5As a technical manual excellent (this is my professional area). As a work of fiction, well... No believable characters whatsoever. The plot does get more and more ludicrous as the story lurches from one manufactured crisis to the other.
I don't really care how close it follows the Stuxnet worm Modus Operandi. A fiction book has got to follow up the rules of good fiction.
A really good non-fiction book on this: "Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power" by David Sanger.1 person found this helpful
- Rating: 3 out of 5 stars3/5Interesting plot, authentic technical background (and I deal with security issues myself). But the writing is just not up to the task. It makes for quite boring reading, despite plot attractiveness. I enjoyed technical references the most, rather than narrative.
- Rating: 3 out of 5 stars3/5Was ok, but not as much fun as the first one, the main character trying to hero it out is not really something that feels fits for the idea i had of him.
Would probaly buy the next book of the author, but i hope thats more techincally oriented again. - Rating: 5 out of 5 stars5/5I won an ARC of Trojan Horse: A Novel by Mark Russinovich in a giveaway for free on Goodreads First/Reads- Wow* what an eye opener** Trojan Horse is a brilliant story... filled with enough action and suspense to have you flipping through the second half of this novel with no problems... Reesa***