Steal This Computer Book 4.0 und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr

Gebraucht kaufen
Gebraucht - Gut Informationen anzeigen
Preis: EUR 8,14

oder
 
   
Jetzt eintauschen
und EUR 0,10 Gutschein erhalten
Eintausch
Möchten Sie verkaufen? Hier verkaufen
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 
Beginnen Sie mit dem Lesen von Steal This Computer Book 4.0 auf Ihrem Kindle in weniger als einer Minute.

Sie haben keinen Kindle? Hier kaufen oder eine gratis Kindle Lese-App herunterladen.

Steal This Computer Book 4.0: What They Won't Tell You About The Internet [Englisch] [Taschenbuch]

Wallace Wang
2.8 von 5 Sternen  Alle Rezensionen anzeigen (37 Kundenrezensionen)

Erhältlich bei diesen Anbietern.


Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 12,65  
Taschenbuch --  
Taschenbuch, 1. Mai 2006 --  

Kurzbeschreibung

1. Mai 2006
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely succesful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineeering and look picking, exploiting P2P filesharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving of questionable accuracy. If you´ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you´r paranoid doesn´t mean they aren´t after you. Ans, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.

Produktinformation

  • Taschenbuch: 361 Seiten
  • Verlag: No Starch Press; Auflage: 4., Aufl. (1. Mai 2006)
  • Sprache: Englisch
  • ISBN-10: 1593271050
  • ISBN-13: 978-1593271053
  • Größe und/oder Gewicht: 2,5 x 17,6 x 22,4 cm
  • Durchschnittliche Kundenbewertung: 2.8 von 5 Sternen  Alle Rezensionen anzeigen (37 Kundenrezensionen)
  • Amazon Bestseller-Rang: Nr. 467.481 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Amazon.de

If ever a book on cyberculture wore a fedora and trench coat and leaned against a lamppost on a foggy street, this is the one. It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances.

Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected.

He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work.

Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis -- Dieser Text bezieht sich auf eine vergriffene oder nicht verfügbare Ausgabe dieses Titels.

Synopsis

National bestseller with over 175,000 copies sold! If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy.Inside, you'll discover: How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD If you ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer, or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated.

As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more.CD compatible with Windows, Mac, and Linux.


In diesem Buch (Mehr dazu)
Einleitungssatz
Hackers are no more criminals than lawyers, politicians, or TV evangelists are. Lesen Sie die erste Seite
Mehr entdecken
Wortanzeiger
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:

Kundenrezensionen

Die hilfreichsten Kundenrezensionen
3 von 3 Kunden fanden die folgende Rezension hilfreich
Format:Taschenbuch
Wally-boy really did it with this book. I bought it (and blew like, a huge load of money for such a poorly, overstated book that is hardly worth the paper it's written on)...I expected at least some type of introduction to something truly elite...However, if you're one of those warez d00dz (and you know who you are...crackers (who loudly call themselves supa leet hax0rs) who are named DrDeath, FinalFury, NukeTheWhales and other ridiculously unintimidating names, this book is for you.
However, for you other, half-normal (and those possessing at least half of a slightly functional brain)...Don't waste your time. This book is downtrodden with cynical humor (not that I mind, this was one of the only enjoyable aspects of the book)...Wang makes an attempt (and misses by about twelve feet) to introduce the reader/bored hacker to the (ooooo...this is the cue for spooky music) the...(GASP!) HACKER UNDERGROUND! What a creeping horror...
The main interests in this book surround political problems and simple explanations of what are actually interesting concepts. Wang, with a strained effort, I'm sure, managed to dumb-down, hash up, and generally take the reader for having the IQ of a brick (or a football jock, whichever you prefer). Concepts covered are encryption (this is somewhat worthwhile, as it explains PGP and Blowfish fairly well as well as stynography (only spelled right) which is hiding text and messages in graphics)
This is more of the book for people who WANT to be hackers, rather than being a hacker.
Lesen Sie weiter... ›
War diese Rezension für Sie hilfreich?
2 von 2 Kunden fanden die folgende Rezension hilfreich
1.0 von 5 Sternen DONT BUY THIS 23. Juni 2000
Von "gootch"
Format:Taschenbuch
I do NOT reccomend this book. I ordered it, and I thought that maybe something useful would be in it... all this book does is explain "WHAT" hackers do, not "HOW" they do it... if you are looking for a HOW book, i reccomend Maximum Linux Security... dont hesitate to buy that one, you wont put it down! (until the last few chapters where it kinda starts getting repetitious) but it is a GREAT how book if you ask me.
War diese Rezension für Sie hilfreich?
1 von 1 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen Doormatt 4. Mai 2000
Format:Taschenbuch
From the outside the book might appear to contain an abundance of useful information, while in fact this is merely a disguise. In actuality it focuses too much effort on redundancy of useless information with the wrong intension. The book is great if you want to know locations of popular search engines or the local news in Third World Countries that no one really thinks exist. Some ideas were actually present, but were not presented very well and are extreamely incomplete. "Steal This Computer Book" does have a lot of potential and I hope that Wallace Wang does release newer editions of this book as promised. I am curious to see where he takes the book in the future, but for the time being, in my opinion, it needs a new cover. -dM
War diese Rezension für Sie hilfreich?
1 von 1 Kunden fanden die folgende Rezension hilfreich
1.0 von 5 Sternen Lame 14. April 2000
Von Ein Kunde
Format:Taschenbuch
Don't bother stealing this book, it won't be worth the trouble of sneaking it out the door.
Most entry level computer books at least have a bit of humor or some interesting tidbits to make them worth a glance or two. This book offers nothing but outdated security information, something no admin can aford.
War diese Rezension für Sie hilfreich?
1 von 1 Kunden fanden die folgende Rezension hilfreich
Format:Taschenbuch
This looks like a overview done by some mainstream news show reporter who is mostly clueless. Ex. under how to hack Linux is to download/install a copy and practice using it--end of lesson. Well duh! Chapter on viruses talks only about having a virus checker. Oooh, big secret. They killed a tree for this?
The chapter titles promise, but the material just doesn't deliver except for some links that are probably out of date. Whether you think this will tell you how to hack or whether you want to learn about hacking and secuity matters to protect your system, you will be sorely disappointed. Computer neophytes should save money and buy a used copy to put on their bookshelves to impress their equally neophyte friends.
War diese Rezension für Sie hilfreich?
5.0 von 5 Sternen A real mind buster ! 25. Januar 2000
Format:Taschenbuch
I had seven days of my live. This book showed me stuff I didn't know excisted. This book opened a whole new world on the internet. INCREDIBLE !
WE NEED MORE OF THESE KIND OF BOOKS!
War diese Rezension für Sie hilfreich?
1.0 von 5 Sternen Do not waste your money 19. Januar 2000
Von Ein Kunde
Format:Taschenbuch
This book is (1) dated, (2) very shallow, (3) attempts to be funny by using anti-government witticisms. I have nothing against being anti-government, but I did not read this book to get that information. I read this book, painfully, from cover to cover. As stated in other reviews, some chapters were just one URL after another (some now 404s). The Visual Basic coding used Version 3, come on, it is now Version 6. The Java, as another reviewer said, was deviod of comment or explanation. If you are totally new to the industry, this book may be of use. If you are looking for pseudo-sensational ramblings, I guess it may be acceptable.
War diese Rezension für Sie hilfreich?
3.0 von 5 Sternen Good general understanding but not lots of depth 28. November 1999
Von sIN
Format:Taschenbuch
This book wasn't to bad as some make it out to be but not as good as others act like it is. I gives a pretty decent general understanding on a wide variety of things: encryption, viruses, phreaking, a bit of hacking, etc. It also gives lots of info that i found basically useless about different kinds of scams which are basically common sense, and other things like how foreigners hate americans. Basically this would be a good book for someone to pick up that is newer to the computer underground but has a little bit of knowledge about it. But if you already have a good understanding then pass this up and get a book that goes into more depth on one lone subject.
War diese Rezension für Sie hilfreich?
Möchten Sie weitere Rezensionen zu diesem Artikel anzeigen?
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Die neuesten Kundenrezensionen
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden


Ihr Kommentar