Michael Lewis' Flash Boys published how high-frequency buying and selling has created a ruthless breed of investors able to successful whichever manner the marketplace turns. In Rogue Code, Mark Russinovich takes it one step additional to teach how their grip on excessive finance makes the inventory industry prone to hackers who may result in all over the world monetary collapse.
Cyber protection specialist Jeff Aiken is aware that no laptop approach is totally safe. while he is referred to as to enquire a potential breach on the manhattan inventory alternate, he discovers not just that their approach has been infiltrated yet that somebody at the inside of is aware. but for a few cause, they've got allowed the hackers to scouse borrow thousands of bucks from debts with no attempting to cease the theft.
When Jeff uncovers the crime, the NYSE all at once activates him. Accused of grand larceny, he needs to locate and divulge the criminals in the back of the robbery, not only to turn out his innocence yet to forestall a multibillion-dollar heist which can upend the U.S. economic climate. Unwilling to heed Jeff's warnings, the NYSE plans to proceed with an enormous IPO utilizing a brand new, untested method, one who will be vulnerable either to hackers and to ruthless high-frequency investors keen to take any hazard to show a profit.
Now Jeff Aiken needs to unearth the reality on his personal, following the thread to the again alleys of Rio de Janeiro to tackle one of many world's such a lot ruthless cartels.
Praised for his blend of real-world know-how and quick-paced motion, with Rogue Code Mark Russinovich grants an extreme mystery a few cyber chance that turns out all too possible---and the Wall highway investors who may possibly permit it to happen.
Includes a foreword by means of Haim Bodek, writer of The challenge of HFT: accumulated Writings on excessive Frequency buying and selling & inventory marketplace constitution Reform.
Read Online or Download Rogue Code: A Jeff Aiken Novel (Jeff Aiken Series) PDF
Similar Security books
An in-depth examine of the army, fiscal, and political implications of the strategic and tactical missile defenses for the Asian-Pacific area. It bargains up to date learn at the prestige of SDI and Asian-Pacific international locations and gives an creation to the SDI debate and Europe. Michael Mazarr has written for a couple of periodicals together with "Defense Analysis".
This booklet charts the prevalence of territorial alterations and armed forces conflicts from 1816 to 1980. utilizing statistical and descriptive research, the authors try to resolution 3 comparable units of questions: * whilst does army clash accompany the method of nationwide independence? * whilst do states struggle over territorial adjustments and while are such transactions accomplished peacefully?
The top of the chilly conflict has spread out a 'real international laboratory' during which to check and refine basic theories of diplomacy. utilizing the frameworks supplied through structural realism, institutionalism and liberalism, The Post-Cold warfare overseas process examines how significant powers answered to the cave in of the Soviet Union and built their international regulations over the interval of post-Cold battle transition.
This paintings attracts upon the background of Arctic improvement and the view of the Arctic in several states to provide an explanation for how this sort of discourse has manifested itself in present broader cooperation throughout 8 information research in line with association advancements from the overdue Nineteen Seventies to the current, indicates that overseas quarter discourse has principally been forwarded throughout the huge function of North American, rather Canadian, networks and deriving shape their frontier-based conceptualization of the north.
Additional info for Rogue Code: A Jeff Aiken Novel (Jeff Aiken Series)
Aiken will be tipped off at any time if event intended whatever. That was once why he’d acted so fast with the subpoena. It was once a lesson he’d realized the tough means. The muscled U. S. Marshal accountable for the SWAT crew got here out, sporting his helmet in a single hand, his weapon within the different. “No one domestic, Mr. Alshon,” he acknowledged. “We’re checking for bombs instantaneously. We’ll be entire in a couple of minutes and you'll ship your humans in. ” Alshon appeared again on the van parked at the back of the SUV he’d arrived in and gestured with palms. The aspect door instantly popped open and a workforce of 5 stepped out, able to pass. He’d now not formerly labored with them as they labored out of the D. C. place of work. He’d informed them his expectancies and the urgency he’d conveyed was once obvious of their demeanor. Ten mins later, the U. S. Marshal responsible gave the all transparent. His deputies exited the home, entered SUVs and one van, and drove off, because the seek staff entered. “Shall we? ” Griffin stated. within was once unusually neat and orderly on condition that the objective was once a bachelor. town residence was once conscientiously divided among residing and paintings house. The crew was once already at paintings within the well-illuminated place of work, which have been the lounge. inside of mins, the desktops have been being carried off to the autos in addition to external drives, discs, thumb drives, something which may carry info or function a backup. there has been no use for Alshon to provide directions, inform them to take every little thing. They knew that. where will be stripped naked ahead of they left. It was once precise he didn’t actually need all of it. Taking the suspect’s own results, his garments and intimate goods used to be meant to set the tone of the research. And owning them put Alshon in a robust mental place. “I made a choice this morning,” Griffin acknowledged tentatively, relocating delicately to the aspect to permit a tender lady wheeling a dossier cupboard cross. “This Aiken has a good recognition. have you ever seemed into his historical past but? ” “No. There’s been no time. The Exchange’s IT file is lovely conclusive on its face,” he stated. “This is sort of a formality. I’d similar to to discover whatever linking him to the brokerage account or locate proof of alternative, related acts. ” “You recognize he was once with the corporate. ” “Of direction. ” The antipathy among the FBI and CIA was once popular in govt, and whereas Alshon may now be with the SEC, he’d began with the Bureau. “I’m informed he’s basically accountable for uncovering Operation Pandora. you recognize approximately it? ” Griffin requested. Alshon shook his head. “Those Saudi brothers in Paris who attempted to deliver down the net and planted damaging viruses in desktops. They have been ready to execute at the comparable date. there have been a few deaths. ” “That’s probably not my region nowadays. i would have learn whatever someplace. ” “It was once hushed up so the whole volume of the hassle isn’t universal wisdom. They didn’t wish the general public to understand how shut these got here to inflicting quite severe damage. ” Griffin paused, then acknowledged, “You do not forget that alert on integrity matters together with your machine content material?