Facebook Twitter Pinterest <Einbetten>
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 2 Bilder anzeigen

The Best of 2600: A Hacker Odyssey (Englisch) Gebundene Ausgabe – 12. August 2008

3.0 von 5 Sternen 1 Kundenrezension

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Gebundene Ausgabe
"Bitte wiederholen"
EUR 65,74 EUR 36,35
5 neu ab EUR 65,74 5 gebraucht ab EUR 36,35
click to open popover

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.



Produktinformation

Produktbeschreibungen

Pressestimmen

" ... The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier."
--John Baichtal (Wired Blog, August, 2008)
 
"...a testament to a culture which thrived before computers and the internet mattered to most of the world." (New statesman, September, 2008)

"...a testament to a culture which thrived before computers and the internet mattered to most of the world." New Statesman Thursday 4 September 2008

Synopsis

Since 1984, the quarterly magazine "2600" has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in "Best of 2600: A Hacker Odyssey", a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer 'red box' that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

Alle Produktbeschreibungen

Kundenrezensionen

3.0 von 5 Sternen
5 Sterne
0
4 Sterne
0
3 Sterne
1
2 Sterne
0
1 Stern
0
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel

Top-Kundenrezensionen

Format: Gebundene Ausgabe
An sich nicht schlecht, aber das Buch krankt an den selben Problemen wie die Zeitschrift, sie ist für meinen Geschmack etwas wenig technisch. Leider sind auch bei den technischeren Artikeln keine Bilder enthalten, was sie deutlich verständlicher gemacht hätte.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 4.6 von 5 Sternen 29 Rezensionen
58 von 64 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen no surprises for readers of 2600 19. November 2008
Von Neurasthenic - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
I remember finding my first issue of 2600, in a bookshop attached to an enormous, secretive government laboratory. Those were in the days after ESS but before the Internet (well, we had NNTP and SMTP and telnet, but HTML hadn't been invented). It seemed so illicit and exciting, I bought every issue I could find for years, and even wrote one article for them.

Over time, I read it less and less, both because the writing was generally bad, and because the revelations were often so weak. The Best Of book fairly reflects the content of the magazine -- it gives a good sense for the passions of a particular technological subculture, but much of what is here is dross.

So many articles were clearly written by people who did not know much, and who punt when they get to difficult work. "The encryption is done by a custom chip and, uh, you might want to decompile the EEPROM and see what's in there." Or they contain only trivial information, made to fill many pages through the inclusion of anecdotes about how the writer came to know the trivial information. (Four pages on how you discovered that ATMs run OS/2? The entire article could have been reduced to four words: "Many ATMs run OS/2.") And then there are the political articles, most of which are screeds about how the government and/or big companies are coming to take your freedom away, and their desire to be paid for your pirated movies proves it.

In some cases, it is hard to imagine how a given article was selected for inclusion in the magazine, let alone for reprinting in the book. An essay on the mathematics of lotteries is particularly weak, using high school level combinatorics to argue that nobody should ever play. The article contradicts a much more interesting essay earlier in the book in which the weaknesses in certain lotteries were revealed and methods for exploiting these weaknesses detailed.

The best material in the book is historical -- the stories of individual hacks, arrests, court battles, etc., by the people involved. Emmanuel Goldstein could have printed just those and had a better book while saving 550 pages.
6 von 7 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen A book on the history of hacking by the people who wrote the magazine on hacking 25. August 2008
Von Mr. Hacks - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
Emmanuel Goldstien and his companions have written alot about hacking over the years, but now most of their writings have come together in tome form.

If there was anything you ever wanted to know concerting what hacking was like before the explosion of the Internet, or how hackers have been portrayed with biased by the media and in some cases the government, this is a must read book.

If you subscribe to 2600: The Hacker Quarterly or if you patiently wait at the book store or mail box for a new issue every three months, you will definitely want to pick up this book.

It will be interesting to see in the future, online hacker zines to try their hand at publishing their writings such as TOTSE and Phrack.
6 von 7 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen An important part of the history of computing 25. August 2008
Von John C. Stepper - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
The hacker ethos is beautifully captured in this anthology. I've often skimmed 2600 at bookstores but it was only when I went through this hefty tome that I realized how deep and rich are the culture and accomplishments of the hacking community.

More than just the cartoonish representation in popular media, the hacking movement is a testament to creativity and innovation. Rightly so, this book is a celebration of cleverness and ingenious engineering instead of the more malevolent applications.
30 von 43 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Fifteen Years of Extreme Hacking on the Edge, Under-Priced! 19. Juli 2008
Von Robert David STEELE Vivas - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
I am attending Hackers on Planet Earth (HOPE) in NYC this week-end, and have just spent time with this volume. Unlike the individual issues, all of which I have had in my possession over the years, this volume is HUGE, readable, indexed, and priceless. I mean that--PRICELESS.

The publisher is to be saluted for not only putting a great deal of effort along with the editor, the founder of 2600 Magazine and also of the HOPE conference, for making this volume a true reference work. I was immediately impressed by the selection of "best of the best," the organization of the material, the index, and the fact that the publisher moved away from the micro-print that was used to keep costs down on the volume of knowledge being transmitted in the individual journal issues, and instead went for a high-end glossy, "just right" white space presentation that should be in every Information Technology library across the country, and is also a collectible for anyone who pretends to know anything at all about information INsecurity.

If you got this far, this lovely volume, easily worth $60, is a real value at the much lower price being offered, and I hope enough people buy it to occasion a reprint or a second volume.

It merits comment that this is not just a volume of hand-picked items from a single journal. The editor and his closest colleagues created a community of over 30,000 hackers (whom I have always said are like astronauts on the edge with the "right stuff") and this volume LITERALLY represents the 30,000 who were decades ahead of the US Government, which is still--as are corporations and public utilities--largely stupid about information system security, to include our Supervisory Control and Direction (SCADA) systems, all of them on the Internet.

For a really good time on what the Chinese know and can do that we cannot, see my Memorandum, easily found online, <Chinese Irregular Warfare oss.net>. They brought Dick Cheney's plane down over Singapore in Feburary 2007, and when he got off to stretch his legs, told him exactly what they could do, and what the US would not be allowed to do. Thus did the power of the information age move East.

Other great Hacker books (the last one is the ultimate public hack, taking back the power):
Hackers: Heroes of the Computer Revolution
The Second Self: Computers and the Human Spirit, Twentieth Anniversary Edition
The Hacker Crackdown: Law And Disorder On The Electronic Frontier
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption
Collective Intelligence: Creating a Prosperous World at Peace

Three DVDs, the first based on the real-life of the editor of this book:
Hackers
The Net
Live Free or Die Hard (Unrated Edition)

There are two sets of hackers: these, and the ones who came out of the Homebrew Garage Club (Lee Felsenstein, Eric Hughes, etc) and tended to created businesses rather than live free. Bill Gates is certainly in that number, as are Stewart Brand and others. The most famous Free/Open Hacker in the first group is Richard Stahlman, whose book on the origins of Free/Open Source Software (F/OSS) is most recently complemented by Yochai Benkler's book on Wealth of Networks. With a tip of the hat to Nat at O'Reilly, open source software is Darwinism, while malware and proprietary software are Intelligent Design that is not so intelligence. VISTA by Microsoft is the biggest scam in history, for the first time forcing documents to be uniquely tied to the Microsoft operating system and not processable anywhere else. It is time for Microsoft to die, or come to its senses and put its money into F/OSS while monetizing the transactions. Bill Gates has called F/OSS communist. In my view, that makes Bill Gates a fascist. My money is on F/OSS.
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Excellent value, great stories 2. März 2011
Von T. A. Baker - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
For anyone who has any interest in technology, this will be a great investment. I've only begun to dig in and already the stories are interesting - stories from an era before my time! The book is organized by decade. The stories are varied and quite fascinating, most of them also amusing or just plain hilarious. I look forward to reading more of it.

If you are a nerd or really into computers, this is a must. It will help you to understand and better appreciate the technology that today is taken quite for granted, simply because it's no longer impressive compared to what's out there now on the cutting edge, and because today's younger generations grew up with it. But think on this: any search website provides you with search results for the ENTIRE INTERNET in less than a second. Every second of every day, people travel through the air all over the entire world. Satellites communicate tirelessly with almost anything and provide us most of the everyday pleasures which we also take for granted - streaming video, online games, and phone service, just to name a few. Video conferencing is common and affordable, allowing you to talk to loved ones face-to-face from the other side of the world. Phones can now function as your media player, personal planner, and portable gaming system all in one. Many phones and other small devices today are orders of magnitude more powerful than the first mainframe computers, which took up an entire room of a building.

If any of this got you thinking or even curious about technology, give this book a read. You don't need to be a "hacker" to understand it. Most of the articles are written for (and sometimes, by) people who are not themselves hackers.

Overall, a great value and great stories contained within.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.