Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks, and Spies over Time

Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks, and Spies over Time

List Price: $64.99
Your Price:
Product Info Reviews

<< 1 2 3 4 >>

Rating: 5 stars
Summary: Worth the wait!
Review: Most computer-security textbooks approach the subject from a single point of view. In contrast, Hack Attacks Encyclopedia talks about almost every security topic from thousands of view points. That's right, the book is like "60-Minutes Goes Underground"-there are documentaries from past and present hacker's; actual texts, e-mail, articles-a HUGE collection, some dating back to Cap'n Crunch and other legends. Really an excellent composition of "just the facts"-excerpts from before the 70's to the Millennium. 5 Stars for the research that went into this text, and the kicker...the COMPLETE text containing each excerpt is organized on the CD. It will literally take me months to get through all this history!

Rating: 5 stars
Summary: The best computer book of all time.
Review: Often it's difficult to read a book with so much in-depth technical knowledge, but this is so entertaining that you may actually find it hard to put down. The information in this book is still relevant to anyone who strives to be a well-rounded CISSP.

Rating: 5 stars
Summary: hacking
Review: One cannot put this book down- it is fantastic! It is not only for hacking gurus but for everyone interested in hacking!

Rating: 5 stars
Summary: Youll love this book!
Review: Revealed gave me a good understanding of the network security. This is the first book I've ever read from the Wiley series. I now know where to turn if I want to get going on something fast. In conclusion this book might not make you a master at hacking but if you want a good foundation and methodoligal approach, take a look.
Denied is the second part to Hack Attacks Revealed, over 500 pages, whose value is in the patches for all the security holes illustrated in the first book. The CD is loaded with compiled programs for securing systems, building firewalling devices, and secure browsing, telnet, ftp, chat, and mail. Again, there are extensive walkthroughs which makes it unique in this category.
Encyclopedia is something completely different. The book is a look at hacking and cracking and phreaking and some I haven't the title for, all from different user submissions from all over the globe. I rated high Revealed and Denied, but this book is much better organzied and a pleasure to read.

Rating: 1 stars
Summary: I would give it zero stars if I could.
Review: The book looks damned impressive from the outside; it's 960 pages! Surely, this must be the most complete discussion of the hacking and phreaking subculture ever published! The cover, a sunset-colored affair with barbed wire and neat lettering, tells you it'll have a more up-to-date sensibility. Everything said this would be my next purchase.

My heart sank as I read through the book.

The vast, vast, VAST (over two-thirds) majority of the book consists of the first paragraph of BBS textfiles, with a line telling you the filename included on the CD that comes with the book. In some cases, Chirillo deigns to visit upon you a single-line description, but many don't even have that. So now, imagine this: page after page of filenames, then descriptions, then the first paragraph, of files located on a CD that's in the back of a book. What a horrible waste! There's a computer "glossary" in the back which looks suspiciously like similar documents available on the web, although I can't be sure. Also, there are a few tiny chapters giving general descriptions of the hacker and phreaking subculture. If you were to remove the filenames and descriptions and paragraphs, I doubt this book could get past 100 pages, if that.

Rating: 5 stars
Summary: Just as we expected...
Review: The third book in the Hack Attacks series is unlike the first two as a unique text full of surprises. The book is exactly what the author said it would be, "A Complete History of Hacks, Cracks, Phreaks, and Spies Over Time". There are exploits in here, e-mails from hackers, crackers, and phreakers, designs and documents written by well known hackers from every crack in the world. An excellent reference for anyone to enjoy.

Rating: 5 stars
Summary: Gain Insight of the Mindset of Hackers, Crackers, Phreakers!
Review: The widespread availability of computers and access to telephone and Internet technologies has contributed to the sharp rise in the number of people going online over the years. Unfortunately, many of these people found their way online through less-than-honest means, and once online, they would set out to perform a great deal of mischief and damage to various computers and computer information systems.

Hack Attacks Encyclopedia edited by John Chirillo serves as the ultimate source for collected information on the history of hacking, cracking, and phreaking. The book features nearly 2,000 text and HTML document extracts that includes news articles, online postings, and other snippets of insightful information. Some of the accounts are startling. Readers will quickly pick up just how clever some hackers, crackers, and phreakers really are. The following snippet exemplifies available talent in Northern America:

"Silver Spy has everything going for him - comfortable surroundings, a father who is an engineer. He ranks in the top 3 percent of his high-school class. His SAT scores for college admission totaled 1,400 of a possible 1,600. He wants to attend Stanford or the Massachusetts Institute of Technology. But in the eyes of the phone companies he is a thief, and in the eyes of the law he's a criminal. Such is the portrait of this 17-year-old computer "hacker" and "phone phreaker" who lives about 20 miles outside Boston. He spoke with U.S. News & World report on the condition that neither his real name nor home town be revealed."

The Hack Attack Encyclopedia is broken up into major sections by decade - the 70's, the 80's, the 90's, the Millennium, and a special historical synopsis. From beginning to end, readers will be able to follow the history of mischievous behavior. It will be an eye-opening experience for anyone to follow the advancements made in communications technologies and how they can be easily circumvented and otherwise compromised to carryout further activities. Although some of the technologies disclosed in the book are outdated and have been replaced, readers will still gain helpful insight of the mindset of hackers, crackers, and phreakers operating today. They are a force to be taken very seriously.

An extensive 217-page glossary of terms will enlighten readers about the slang talk used in the hacking, cracking, and phreaking communities. As a special bonus, the CD accompanying the book features full-length editions of the article and snippet extracts included in the book, hundreds of computing and Internet exploits, and a sampling of useful utility programs.

Hacking, cracking, phreaking, and virus infection still poses problems for many people today. This book will open the eyes of many people - including business people, IT managers, and law enforcement officials. It will serve as an excellent starting point for taking necessary corrective action to prevent further mischief and harm caused to personal and company computer systems. I can't wait to see an updated edition. Highly recommended reading.

Rating: 5 stars
Summary: Absolutely Phenomenal
Review: This 1000-page encyclopedia is absolutely phenomenal in scope. Within you'll find in-depth scholarly discussions of security woes, and pragmatic tips that can help you through an immediate crisis.

Rating: 5 stars
Summary: Highly Recommended
Review: This book comes highly recommended as a library of hack variations. With thousands of submissions and many from renown sources, this book is HOT! It even goes as far as to categorize hacks for easy reference, including hacking, cracking, phreaking, spying, anarchy and underground spite, and hack/phreak technical library.

Rating: 5 stars
Summary: Another five star book from John Wiley & Sons!
Review: This book covers everything-security from Prehistory (before 1969), Elder Days (1970-1979), The Golden Age (1980-1989), The Great Hacker War (1990-1994, Zero Tolerance (1994-1999), to the Early Millennium (Resurrection of Tiger Teams). I was relieved that it doesn't glorify "Hacks, Cracks, Phreaks, and Spies" but exposes only the real facts of each.


<< 1 2 3 4 >>

© 2004, ReviewFocus or its affiliates