The Algorithm Man: America's Cyber Sleuth
()
About this ebook
Say hello to Teddy “A-Man” Douglas. “A-Man”, the lovingly adopted abbreviate for Algorithm Man is America’s preeminent Cyber Sleuth.
Using advanced mathematical algorithms "The A-Man" can decode complex malware, decipher intricate computer virus schemes and secure even the most sophisticated computer networks.
Along with his team of collaborators, Teddy will unravel any Cyber Attack. He specializes in helping his clients recover monetary losses and will even bring the hackers to justice.
Follow Teddy “A-Man” Douglas as he levels the playing field against the world’s illegitimate treasure hunters.
J. Salvatore Domino
J. Salvatore Domino is an author and blogger based in Scottsdale, Arizona, U.S.A.Best known for his non-fiction work and technical documents, he has found writing fiction to be more fun.His stories run the gamut from cozy to dark. But his goal is always the same. He likes his readers to escape into an entertaining story where fiction and reality converge. His characters, whether you love them or despise them, often mirror real life.Join him for a few minutes or several hours of enjoyable leisure.
Read more from J. Salvatore Domino
The Algorithm Man: If I Were A Rich Man Rating: 0 out of 5 stars0 ratingsThe DiMarco Incident Rating: 0 out of 5 stars0 ratingsThe Algorithm Man: The Cerberus Solution Rating: 0 out of 5 stars0 ratingsThe Algorithm Man: The Return of The A-Man Rating: 0 out of 5 stars0 ratings
Related to The Algorithm Man
Related ebooks
The Cryptos Files: ICE Rating: 0 out of 5 stars0 ratingsSeven Deadliest Wireless Technologies Attacks Rating: 0 out of 5 stars0 ratingshacktivist: Hacker School Attacked Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsThe Oracle Hacker's Handbook: Hacking and Defending Oracle Rating: 4 out of 5 stars4/5Free & Opensource Video Editor Software For Windows, Ubuntu Linux & Macintosh Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker Second Edition Rating: 0 out of 5 stars0 ratingsOpen Source Fuzzing Tools Rating: 0 out of 5 stars0 ratingsThe New Frontier In Web Api Programming Rating: 0 out of 5 stars0 ratingsOffensive Security A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsHacking Your Destiny Rating: 0 out of 5 stars0 ratingsMaking Passwords Secure Rating: 0 out of 5 stars0 ratingsRed Hat Ansible A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSOA Security Rating: 0 out of 5 stars0 ratingsVirtual Machines A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCertified Cyber Forensics Professional The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Charter Standard Requirements Rating: 0 out of 5 stars0 ratings21st Century Privacy Rating: 0 out of 5 stars0 ratingsEscape Dark Web Victims Rating: 0 out of 5 stars0 ratingsClient-Side Attacks and Defense Rating: 0 out of 5 stars0 ratingsFreeSWITCH Cookbook Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5Least Privilege Security for Windows 7, Vista and XP Rating: 0 out of 5 stars0 ratingsHacker's Diary: Duty Free Rating: 0 out of 5 stars0 ratingsBad Code: Overcoming Bad Mental Code That Sabotages Your Life Rating: 0 out of 5 stars0 ratingsHidden Realms - A Pathway To Hacking Rating: 5 out of 5 stars5/5Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' Rating: 5 out of 5 stars5/5Clean Ruby: A Guide to Crafting Better Code for Rubyists Rating: 0 out of 5 stars0 ratingsBeginning Mobile Application Development in the Cloud Rating: 0 out of 5 stars0 ratingsBuilding a Pentesting Lab for Wireless Networks Rating: 0 out of 5 stars0 ratings
Mystery For You
The Strange Case of the Alchemist's Daughter Rating: 4 out of 5 stars4/5The Stories of Ray Bradbury Rating: 4 out of 5 stars4/5None of This Is True: A Novel Rating: 4 out of 5 stars4/5The Paris Apartment: A Novel Rating: 4 out of 5 stars4/5The Good Daughter: A Novel Rating: 4 out of 5 stars4/5The Complete Short Stories Rating: 5 out of 5 stars5/5Pretty Girls: A Novel Rating: 4 out of 5 stars4/5Pieces of Her: A Novel Rating: 4 out of 5 stars4/5Hallowe'en Party: Inspiration for the 20th Century Studios Major Motion Picture A Haunting in Venice Rating: 4 out of 5 stars4/5False Witness: A Novel Rating: 4 out of 5 stars4/5The Hunting Party: A Novel Rating: 4 out of 5 stars4/5Still Life: A Chief Inspector Gamache Novel Rating: 4 out of 5 stars4/5The Last Flight: A Novel Rating: 4 out of 5 stars4/5Murder Your Employer: The McMasters Guide to Homicide Rating: 4 out of 5 stars4/5Devil in a Blue Dress (30th Anniversary Edition): An Easy Rawlins Novel Rating: 4 out of 5 stars4/5The Big Sleep Rating: 4 out of 5 stars4/5The Hidden Staircase: Nancy Drew #2 Rating: 5 out of 5 stars5/5The Murder of Roger Ackroyd Rating: 4 out of 5 stars4/5Everyone in My Family Has Killed Someone: A Murdery Mystery Novel Rating: 4 out of 5 stars4/5Murder Under a Red Moon: A 1920s Bangalore Mystery Rating: 5 out of 5 stars5/5The Woman in the Library: A Novel Rating: 4 out of 5 stars4/5How to Write a Mystery: A Handbook from Mystery Writers of America Rating: 5 out of 5 stars5/5The Club: A Reese's Book Club Pick Rating: 4 out of 5 stars4/5The Life We Bury Rating: 4 out of 5 stars4/5Finlay Donovan Is Killing It: A Novel Rating: 4 out of 5 stars4/5Eight Perfect Murders: A Novel Rating: 4 out of 5 stars4/5The Pale Blue Eye: A Novel Rating: 4 out of 5 stars4/5Dean Koontz: Series Reading Order - with Summaries & Checklist Rating: 5 out of 5 stars5/5The Pharmacist Rating: 4 out of 5 stars4/5The People Next Door Rating: 4 out of 5 stars4/5
Related categories
Reviews for The Algorithm Man
0 ratings0 reviews
Book preview
The Algorithm Man - J. Salvatore Domino
The Algorithm Man
America’s Cyber Sleuth
J. Salvatore Domino
Copyright ©2019 Joseph Salvatore Domino
All Rights Reserved
Table of Contents
Chapter 1 - The Attack
Chapter 2 - Digging In
Chapter 3 - The Police Story
Chapter 4 - Follow The Money
Epilogue
This e-book is licensed for your personal enjoyment only. This e-book may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient.
Thank you for respecting the hard work of this author.
Chapter 1
The Attack
The duo stepped through the front door into the reception area. It was early, only about 8:15, so the place looked deserted. Finally, James spotted a woman coming down a hallway and waved her over. A middle-aged woman with a name tag that read Rebecca
approached. May I help you?
Good morning. My name is James Doro. This is Teddy Douglas. We are here from C.P.A. Inc. We received a call from Barnard Hect to investigate a cyber intrusion.
Oh, you probably want to speak with Justin,
she said. Wait here. I will call him for you.
A few minutes later, a handsome young man, tall with dark floating hair, appeared.
So, you are the guys that are here to save the company? My name is Justin Ryder, I am the Marketing Manager. My boss Mr. Hect has been all over my ass about this. I hope you guys find something.
James handed his business card to Justin. Justin glanced at the card that read in large bold letters C.P.A. Inc
. Below the bold letters was the slogan Your Security is Our Business
. At the bottom of the card appeared the names Teddy ‘A-Man’ Douglas
and James Doro, Ph.D.
. Along with the names were their telephone numbers and email addresses.
Don’t worry,
James affirmed, C.P.A. Inc. is the best. If anyone can find it, we can.
Justin was a little confused. C.P.A. Inc.? What are you guys’ accountants?
No, we are network security specialists. The name C.P.A. comes from the proprietary software we use. It’s called the Cyber Patterning Algorithm, or C.P.A. for short. ‘A-Man’ developed it in college.
’A-Man’, what kind of name is that?
It is my nickname,
Teddy interjected. My full name is Teddy ‘A-Man’ Douglas."
No one is better at analyzing criminal cyber-attacks than Teddy.
James declared. He has come a long way from his days as a junior analyst at the IRS.
The IRS? No kidding?
remarked Justin.
Teddy continued, Yes, my algorithm helped me locate tax cheaters and recovered millions of dollars for the U.S Treasury. It correlates people’s spending habits, their savings, investments and how much income they have declared. The patterning algorithm is especially effective for small businesses and independent contractors. You know, the type of people that like to slip some cash money into their pocket without reporting it.
What do you do, James?
"I help him. I am a certified cyber-security expert. I have a Ph.D. in Network Trafficking. Between the two of us, we can sniff out any security breach. But in all honesty, Teddy is the one with a unique way of looking at things. He finds things that elude conventional