Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption

Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption

List Price: $16.95
Your Price: $11.87
Product Info Reviews

<< 1 2 3 >>

Rating: 5 stars
Summary: Excellent Book
Review: This is one of the best books that I've read, ever. It gives you a sense of what the hacker culture is like with great examples and provides excellent information.

Rating: 1 stars
Summary: Worse book on the subject
Review: This is quite possibly the worse book I ever read on the subject. The author has a tendency to make unqualified statements with no supportive evidence. He thinks Hong Kong is an ".... emerging country around the Far East, having problems with software piracy. (Where have you been for the last 50 yrs ? Australia has a software piracy rates on par to Hong Kong. The highest is in Thailand and Vietnam.) He thinks when you start a web browser, and a small program running in the background, it is written in a "new" computer language called JAVA. Not knowing that JavaScirpt and JAVA has nothing in common, but share a name. He is not sure whether to called hacker as "immature bastards" with no real skills, or to take the high road and suggest that talented individuals like them should be nutured, and jail sentences should be reserved for murderers - so he did both.
The author has the hallmark of a typical sales/marketing/management type, knowing all the buzz words: risk management, business contingency plan, ..etc. CEO loves it, but can he tell the different between PPTP and IPSec ? and why should you use one and not the other ? I started questioning his credential after reading three chapters. If you want a better introduction to the subject, try Personal Firewalls by Lisa Yeo, Firewalls and Internet Security by Cheswick and Bellovin or Hacker's Challenge by Schiffman. Luckily, I only paid $4 for this paper weight.

Rating: 0 stars
Summary: This is a very important book
Review: Usually, we don't comment here on Amazon about our books, because, really, we're fairly biased. Of course, we're going to say good things about our own book. This book demands some special attention, however.

We feel very strongly that it is in your best interests to read Cybershock. Winn Schwartau has described all of the big electronic dangers you'll encounter by being a part of society. There are measures you can take. Read the book, and soon.

Rating: 5 stars
Summary: A great security awareness tool.
Review: Winn has again produced a book that not only keeps you interested but adds to your knowledge base. He presents one of the most complete descriptions of the hacker culture that one is likely to find anywhere. By emphasizing privacy, he has picked a theme that everyone can related to. This book should be read in the board rooms of corporations and on Capital Hill. It should greatly increase the awareness of the risks we face in the cyber world.

Rating: 1 stars
Summary: Sensational and erroneous
Review: Winn Schwartau's new book is rife with sensational statements and overblown generalizations--both guaranteed to inflate book sales. This book attempts to distill a paranoia that reaches *far* beyond what is necessary to instill proper caution in those who manage computer system. He demarks no difference between malicious, destructive crackers and those thrill-seekers who enter unauthorized sites with no thought of destruction, or even of unauthorized reading or downloading. The final straw came when Schwartau began talking about terrorists using focused microwaves to turn one's dental fillings into radio receivers. Next thing you know, he'll be advocating that everyone wear aluminum foil helmets to "keep out evil mind-control radio wave". If you want sensationalism and terror-mongering, buy this book. If you want to read about the *real world*, go elsewhere.


<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates