Fiction Books

Rogue Code NovelRogue Code: A Novel

Cyber security expert Jeff Aiken knows that no computer system is completely secure. When he’s called to investigate a possible breach at the New York Stock Exchange, he discovers that not only has their system been infiltrated but that someone on the inside knows. Yet for some reason, they have allowed the hackers to steal millions of dollars from accounts without trying to stop the theft. Learn more…


Trojan Horse NovelTrojan Horse: A Novel

It’s two years post-Zero Day, and former government analyst Jeff Aiken is reaping the rewards for crippling al-Qaida’s attack on the computer infrastructure of the Western world. His cyber – security company is flourishing, and his relationship with Daryl Haugen intensifies when she becomes a part of his team. Learn more…


Zero Day NovelZero Day: A Novel

An airliner falls from the sky. A nuclear reactor nearly melts down. An oil tanker runs aground. Jeff Aiken and Daryl Haugen believe these incidents are the result of a massive cyber attack that’s under way. The clock is ticking as they race to figure out who is behind it and how to stop it. Learn more…


Operation Desolation Short StoryOperation Desolation: A Short Story

Jeff Aiken has to try to protect a company from an attack by the hacktivist group Anonymous. And Jeff is about to discover that the hacker outfit plans to bring their fight offline–and into the real world. Learn more…


Nonfiction Books

Windows Internals 6Windows Internals: Covering Windows Server 2008 R2 and Windows 7, 6th Edition

Delve inside Windows architecture and internals—guided by a team of internationally renowned internals experts. Fully updated for Windows 7 and Windows Server 2008 R2, this classic guide delivers key architectural insights on system design, debugging, performance, and support—along with hands-on experiments to experience Windows internal behavior firsthand. Learn more…


Windows Sysinternals Administrator's ReferenceWindows Sysinternals Administrator’s Reference

The Windows Sysinternals Administrator’s Reference is the official book on the Sysinternals tools, written by tool author and Sysinternals cofounder Mark Russinovich, and Windows expert Aaron Margosis. The book covers all 70+ tools in detail, with full chapters on the major tools like Process Explorer and Autoruns. Learn more…


Windows Internals 5Windows Internals: Covering Windows Server 2008 and Windows Vista, 5th Edition

See how the core components of the Windows operating system work behind the scenes—guided by a team of internationally renowned internals experts. Fully updated for Windows Server® 2008 and Windows Vista®, this classic guide delivers key architectural insights on system design, debugging, performance, and support—along with hands-on experiments to experience Windows internal behavior firsthand. Learn more…


Windows Internals 4Windows Internals: Microsoft Windows Server 2003, Windows XP, and Windows 2000, 4th Edition

The classic, in-depth developer’s guide to the Windows kernel now covers Windows .NET Server 2003, Windows XP, and Windows 2000. Written by noted Windows internals experts David Solomon and Mark Russinovich in collaboration with the Microsoft Windows .NET Server product development team, this book packs the latest concepts and terms, kernel and source code specifics, undocumented interfaces, component and tool descriptions, and architectural perspectives that reveal the inner workings of the OS. Learn more…


About Mark

Mark Russinovich works at Microsoft in the Microsoft Azure product team as Chief Technology Officer. Read more...

Contact Mark to
Schedule an Appearance

Upcoming Events

Recent Press & News

Zero Day has been inducted into the Cybersecurity Canon
Zero Day is now part of the collection of books recognized as ones everyone interested in cybersecurity should read: The Cybersecurity Canon

Wall Street Journal on Rogue Code:
Now There’s a Novel About High-Frequency Trading

Publisher's Weekly on Rogue Code:
“In Russinovich’s well-crafted third Jeff Aiken novel (after 2012′s Trojan Horse), the cyber security specialist must contend with insider trading, long cons, and multimillion-dollar thefts”