About the Series

The Z.R.A.K. series is a five-book young adult techno-thriller collection by Miro Feld, a Czech author and IT professional with over 30 years in the industry. Set in Prague, the stories follow two teenagers — Tomas and Nela — as they uncover wireless security threats using observation, documentation, and technical skill.

Each book is grounded in real cybersecurity concepts. The threats are authentic. The tools are real. The techniques described actually work. But the series teaches a clear ethical framework: observation instead of action, documentation instead of confrontation.

Available in English and Czech editions as eBooks.


View on mirofeld.com →

Teaching Principles

The series consistently models these ethical principles:

  • Observation and documentation without system manipulation
  • Evidence prioritized over suspicion
  • Willingness to acknowledge error and false positives
  • Institutional deference regarding resolution
  • Restraint as a security practice
  • Competence as responsibility, not power

Main Series

Book 1

Z.R.A.K.: Signal

Two Prague teenagers independently detect the same crime — fake hotspots, skimmers, suspicious surveillance — and connect their findings through a shared device address, uncovering something larger than either expected.

Teaching Focus

Seeing invisible infrastructure. Public WiFi vulnerabilities. Bluetooth and WiFi signal leakage. Physical proximity requirements for digital attacks.

Book 2

Z.R.A.K.: Baseline

Someone is poisoning the WiFi at Prague's cafes. The passwords are real. The encryption is active. But the threat is inside the trust — operating within networks that look completely normal.

Teaching Focus

Distinguishing normal from abnormal. DNS and certificate-based trust. The challenge of detecting attacks within authenticated networks.

Book 3

Z.R.A.K.: Pattern

A classmate's mother receives unauthorized invoices despite strong security measures. Investigation reveals a familiar device appearing where it shouldn't — with implications nobody anticipated.

Teaching Focus

Threat migration patterns. Physical access as an attack vector. Upstream compromise of secured accounts. False assumptions about who poses a threat.

Book 4

Z.R.A.K.: Source

Unmarked wireless devices appear throughout Prague utility closets — no claimed ownership, no installation records. The focus shifts from ongoing crime to systemic vulnerability in institutional infrastructure.

Teaching Focus

Institutional responsibility. Hardware supply chain misuse. Evidence preservation. Systemic versus individual accountability.

Book 5

Z.R.A.K.: Trace

A police investigation of a fractal antenna photograph connects separate cases across different cities. Larger patterns emerge — without clean resolution, reflecting the reality of real-world cybersecurity investigations.

Teaching Focus

Pattern persistence across time. Institutional versus individual agency. Permanent awareness despite incomplete outcomes. The reality that not all investigations end with clear answers.

Additional Books

Standalone Thriller

Signal Lost

A disgraced signals intelligence specialist detects an anomalous Bluetooth signal beneath an abandoned garage — where no transmission should exist. The signal strength is declining, and that means the danger is growing.

Coming soon. English edition.

Short Story Collections

Z.R.A.K. Field Stories

Two volumes, 271 stories total. Wireless Recon (135 stories) covers WiFi detection, network reconnaissance, counter-surveillance, and RF analysis. Active Defense (136 stories) covers incident response, physical counter-surveillance, skimmer hunts, rogue cell tower takedowns, and courtroom forensics.

Global settings from Bieszczady mountains to Mumbai. Fiction that teaches. Suspense that educates.

From Fiction to Practice

Each book maps to hands-on lab exercises

Mapping of Z.R.A.K. books to related lab exercises
Book Key Concept Related Lab
Signal Rogue hotspot detection, signal analysis Evil Twin Detection Lab
Baseline Network baseline, DNS poisoning Network Baseline & Drift Lab
Pattern Device tracking, rogue device identification Bluetooth Reconnaissance Lab
Source Infrastructure audit, unknown device discovery Device Discovery & Inventory Lab
Trace Incident correlation, cross-case patterns Incident Response & Reporting Lab

About the Author

Miro Feld is a Czech author and IT professional based in Polička, Czech Republic, with over 30 years of experience spanning architecture, programming, and cybersecurity. His writing sits at the intersection of cybersecurity, youth culture, and the invisible digital infrastructure that holds modern life together.

His stories examine real threats and real tradecraft — grounded in authentic technical knowledge from three decades of industry work.

More about the author →