Rogue Code »

Enter to Win a Signed Copy of Rogue Code Before It’s Published!

April 27, 2014 | 6 Comments | Mark Russinovich

Want a signed copy of Rogue Code and want it before the book is even out? Every day from April 28 to May 2 I’ll draw the winner of a signed Rogue Code Advanced Reading Copy (ARC) to be delivered before the May 20 publication date! Email the receipt of your Rogue Code pre-order (from any seller in any format) to me at  by May 2 to enter.

 

rogue_code_bookshot

« My Sessions at RSA Conference US 2014

Wall Street Journal: Now There’s a Novel About High Frequency Trading »

6 responses to “Enter to Win a Signed Copy of Rogue Code Before It’s Published!”

  1. Sable Cantus says:

    I’ve been a fan of this series and have pre-ordered my copy of rogue code. A signed copy would go on my book shelf right next to the cryptonomicon 🙂

  2. Xander Bikbergen says:

    Your books are the best, excellent reading material. After you start hard to put down!!!

    Greetz from The Netherlands

  3. Maneesh S says:

    Greetings!

    Watched your excellent session on – Malware Hunting with the Sysinternals Tools.

    Wondering whether Rogue Code could have be offered as a campaign for wider reach at indiegogo.com & kickstarter.com.

    Thanks.

  4. Gary Jackson says:

    Looking forward to rogue code

Leave a Reply

Your email address will not be published. Required fields are marked *


*


About Mark

Mark Russinovich works at Microsoft in the Microsoft Azure product team as Chief Technology Officer. Read more...

Contact Mark to
Schedule an Appearance

Upcoming Events

There are no upcoming events at this time.

Recent Press & News

Zero Day has been inducted into the Cybersecurity Canon
Zero Day is now part of the collection of books recognized as ones everyone interested in cybersecurity should read: The Cybersecurity Canon

Wall Street Journal on Rogue Code:
Now There’s a Novel About High-Frequency Trading

Publisher's Weekly on Rogue Code:
“In Russinovich’s well-crafted third Jeff Aiken novel (after 2012′s Trojan Horse), the cyber security specialist must contend with insider trading, long cons, and multimillion-dollar thefts”