Download E-books Operation Desolation: A Short Story (Jeff Aiken Series) PDF

A thought-provoking new brief tale from the acclaimed writer of Zero Day and Trojan Horse.

Challenging nameless is like waving a purple flag in entrance of a bull. however the CEO of a massive funding company has performed simply that, and now cyber safety specialist Jeff Aiken has to attempt to guard the corporate from its leader's error. The timing could not be worse, as Jeff is scheduled to seem at a convention that has invited an nameless consultant to boot. And Jeff's approximately to find that the hacker outfit plans to deliver their struggle offline--and into the genuine world.

Show description

Read or Download Operation Desolation: A Short Story (Jeff Aiken Series) PDF

Similar Espionage books

The Golden Rendezvous

A undying vintage of modern day piracy from the acclaimed grasp of motion and suspense. Aboard the SS Campari, all isn't really good. For Johnny Carter, the executive Officer, the voyage has already began badly; yet it’s basically whilst the Campari sails that night, after a succession of delays that he realises anything is heavily incorrect.

The Executioner's Game

An elite executive murderer is distributed to kill the guy who informed him, basically to discover that his challenge has been compromised and he's trapped within the deadliest video game of all. Luther eco-friendly is a central authority murderer. he's hired through E-1, an supplier so mystery, even the President is ignorant of its actions.

Solo: A James Bond Novel (James Bond Novels (Paperback))

It truly is 1969, and, having simply celebrated his forty-fifth birthday, James Bond—British certain agent 007—is summoned to headquarters to obtain an strange project. Zanzarim, a stricken West African country, is being ravaged through a sour civil struggle, and M directs Bond to quash the rebels threatening the validated regime.

Scorpia Rising (Alex Rider)

Do not omit the ultimate Alex Rider undertaking - now in paperback! Scorpia has dogged Alex Rider for many of his existence. They killed his mom and dad, they did their top to con Alex into turning traitor, and so they simply continue coming again with extra energy. Now the world's most threatening 17 November is fiddling with hearth within the world's such a lot flamable land: the center East.

Extra info for Operation Desolation: A Short Story (Jeff Aiken Series)

Show sample text content

And hold this quiet. It’s very important. ” Ten mins later, the trio used to be seated in Clive’s suite at the 3rd ground. Clive handed out bottles of water from the minibar as Jeff started. “I used to be contacted via RegSec simply after the DDoS assault on their website. They employed me to improve their defense as they have been receiving consistent cyber-attacks from nameless. That’s what I’ve been engaged on and why I’ve been so absent. ” Norm nodded with politeness as he listened closely. It used to be as though he might feel that anything vital used to be approximately to ensue. His correct hand was once raised to his cheek and he moved the arms throughout the brief hair of his beard. “I was once in a position to do a little patching on their working system,” Jeff persisted, “and encrypted the company’s purchaser on-line account passwords database. I then set it up so i'll hint any destiny hacking assault. regrettably, the company’s IT humans didn't movement quickly sufficient on matters I known as to their cognizance and the location used to be defaced, as you recognize. ” “I’m continually amazed,” Clive acknowledged, “at what percentage high-profile businesses fail to accurately safe their website and knowledge. this is often specially remarkable because the CEO used to be so competitive in his public statements, all yet bold nameless to move after RegSec. ” “I agree. I’m surprised nearly each day at what I research and that’s now not the 1/2 it,” Norm stated. “You should still see the protection shortcomings in lots of of the govt. and seller desktops. ” He checked out Jeff. “Were you capable of hint the IP? ” “I was once, and that’s why I’ve requested to work out you . ” He paused then acknowledged, “The hack originated from this resort. ” Clive and Norm either straightened of their seats. “Given that CyberCon is assembly the following, i believe a logical end is that an attendee has performed it. ” “This is bad,” Clive acknowledged. “Very undesirable. ” If—or particularly, when—word of this leaked, it'll most likely negatively impact him and his corporation, because it could CTI. Jeff now informed them concerning the attack on him the former evening. Clive checked out him with difficulty. “Have you visible a physician? ” “It’s now not worthwhile. i used to be simply surprised. ” “You know,” Norm acknowledged, “it can be that an analogous one that hacked the RegSec website additionally attacked you. ” Jeff nodded in contract. “I imagine that’s most likely. yet what’s vital now could be what we do. I’ve requested to speak to you simply because i've got a plan. If it succeeds, and that i imagine we've an excellent chance of that, we will flip this right into a confident. ” “You suggest, capture the nameless hacker? ” Norm acknowledged. Jeff smiled. “That’s precisely what I suggest. seize him red-handed. ” His attacker have been a guy so if the hacker used to be a similar individual, then they have been looking for a “he” no longer a “she,” except there has been an companion. Jeff watched as a sluggish smile unfold around the agent’s face. “I imagine I’m going to take pleasure in studying precisely the way you intend to do this. ” by the point Jeff had accomplished explaining what he sought after, Norm was once beaming. a couple of minutes later the lads went again downstairs to CyberCon, with Jeff retiring to the prep room. The lodge community CyberCon used hired Dynamic Host Configuration Protocol, or DHCP, in its pcs.

Rated 4.10 of 5 – based on 36 votes