Zero-Day Protocol
The notification came in at 2:47 a.m., the way the best ones always did. Ren Solis doesn't take partners. Eleven years as a freelance white-hat hacker have taught her that the only variable she can fully trust is herself — her instincts, her code, her ability to disappear when the job is done. So when Nexen Pharmaceutical's board contracts her to verify a contained data breach, the words you'll be working alongside another consultant land like a threat. The other consultant is Margot Voss. Margot has spent fifteen years building her reputation on something Ren has never wanted: institutional trust. As Nexen's head of cybersecurity, she controls every variable, documents every discrepancy, and has been sitting alone with a secret for seven days — a rack in server room 4B that no one was supposed to find, evidence of a breach that is far older than the board believes, and the growing certainty that moving on it with the wrong support would be worse than not moving at all. Within seventy-two hours of their forced collaboration, they uncover the truth: the data breach is a decoy. Behind it lies a falsified clinical trial operation sophisticated enough to have evaded detection for years — and poised to kill thousands. To dismantle it, they'll need what neither of them has ever been willing to offer: access. Not just to systems, but to each other. Ren maps the architecture from the outside in, finding the gaps that only become visible when you refuse to trust the surface. Margot reads the institution from the inside, fluent in the language of power that moves through buildings and people and paper trails. Together, they are exactly as dangerous as the conspiracy needs them not to be. The problem is that working alongside someone and trusting them are different variables. So are trusting someone and needing them. And needing someone and refusing, despite all professional instinct, to let them go. Zero-Day Protocol is a slow-burn WLW corporate thriller about two brilliant, difficult women who are both better at finding vulnerabilities in systems than in themselves — and what happens when the most significant threat to their professional equilibrium turns out to be each other.
-
Autore:
-
Anno edizione:2026
-
Editore:
-
Formato:
-
Lingua:Inglese
Formato:
Gli eBook venduti da Feltrinelli.it sono in formato ePub e possono essere protetti da Adobe DRM. In caso di download di un file protetto da DRM si otterrà un file in formato .acs, (Adobe Content Server Message), che dovrà essere aperto tramite Adobe Digital Editions e autorizzato tramite un account Adobe, prima di poter essere letto su pc o trasferito su dispositivi compatibili.
Cloud:
Gli eBook venduti da Feltrinelli.it sono sincronizzati automaticamente su tutti i client di lettura Kobo successivamente all’acquisto. Grazie al Cloud Kobo i progressi di lettura, le note, le evidenziazioni vengono salvati e sincronizzati automaticamente su tutti i dispositivi e le APP di lettura Kobo utilizzati per la lettura.
Clicca qui per sapere come scaricare gli ebook utilizzando un pc con sistema operativo Windows