Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone
  • Android

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Kindle-Preis: EUR 17,88
inkl. MwSt.

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lesen Sie bitte die Nutzungsbedingungen der jeweiligen Promotion.

An Ihren Kindle oder ein anderes Gerät senden

An Ihren Kindle oder ein anderes Gerät senden

Facebook Twitter Pinterest
Steal This Computer Book 4.0: What They Won't Tell You About the Internet von [Wang, Wallace]
Anzeige für Kindle-App

Steal This Computer Book 4.0: What They Won't Tell You About the Internet Kindle Edition

2.8 von 5 Sternen 37 Kundenrezensionen

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
EUR 17,88

Länge: 361 Seiten Optimiert für größere Bildschirme. Sprache: Englisch
  • Aufgrund der Dateigröße dauert der Download dieses Buchs möglicherweise länger.

Der lange Kindle-Lesesommer
Neu: Der lange Kindle-Lesesommer
Wir feiern die schönste Jahreszeit mit 30 Top-eBooks und einem Preisvorteil von mindestens 50%. Wir wünschen viel Freude mit Ihrer neuen Sommerlektüre. Jetzt entdecken

Produktbeschreibungen

Amazon.de

If ever a book on cyberculture wore a fedora and trench coat and leaned against a lamppost on a foggy street, this is the one. It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances.

Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected.

He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work.

Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis

Amazon.com

If ever a book on cyberculture wore a fedora and trench coat and leaned against a lamppost on a foggy street, this is the one. It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances.

Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected.

He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work.

Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis


Produktinformation

  • Format: Kindle Edition
  • Dateigröße: 12090 KB
  • Seitenzahl der Print-Ausgabe: 384 Seiten
  • Gleichzeitige Verwendung von Geräten: Keine Einschränkung
  • Verlag: No Starch Press; Auflage: 4 (11. Mai 2006)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B004OEJOA0
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Verbesserter Schriftsatz: Nicht aktiviert
  • Durchschnittliche Kundenbewertung: 2.8 von 5 Sternen 37 Kundenrezensionen
  • Amazon Bestseller-Rang: #735.658 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

Kundenrezensionen

Top-Kundenrezensionen

Format: Taschenbuch
Wally-boy really did it with this book. I bought it (and blew like, a huge load of money for such a poorly, overstated book that is hardly worth the paper it's written on)...I expected at least some type of introduction to something truly elite...However, if you're one of those warez d00dz (and you know who you are...crackers (who loudly call themselves supa leet hax0rs) who are named DrDeath, FinalFury, NukeTheWhales and other ridiculously unintimidating names, this book is for you.
However, for you other, half-normal (and those possessing at least half of a slightly functional brain)...Don't waste your time. This book is downtrodden with cynical humor (not that I mind, this was one of the only enjoyable aspects of the book)...Wang makes an attempt (and misses by about twelve feet) to introduce the reader/bored hacker to the (ooooo...this is the cue for spooky music) the...(GASP!) HACKER UNDERGROUND! What a creeping horror...
The main interests in this book surround political problems and simple explanations of what are actually interesting concepts. Wang, with a strained effort, I'm sure, managed to dumb-down, hash up, and generally take the reader for having the IQ of a brick (or a football jock, whichever you prefer). Concepts covered are encryption (this is somewhat worthwhile, as it explains PGP and Blowfish fairly well as well as stynography (only spelled right) which is hiding text and messages in graphics)
This is more of the book for people who WANT to be hackers, rather than being a hacker.
Lesen Sie weiter... ›
Kommentar 3 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Von Ein Kunde am 23. Juni 2000
Format: Taschenbuch
I do NOT reccomend this book. I ordered it, and I thought that maybe something useful would be in it... all this book does is explain "WHAT" hackers do, not "HOW" they do it... if you are looking for a HOW book, i reccomend Maximum Linux Security... dont hesitate to buy that one, you wont put it down! (until the last few chapters where it kinda starts getting repetitious) but it is a GREAT how book if you ask me.
Kommentar 2 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Format: Taschenbuch
From the outside the book might appear to contain an abundance of useful information, while in fact this is merely a disguise. In actuality it focuses too much effort on redundancy of useless information with the wrong intension. The book is great if you want to know locations of popular search engines or the local news in Third World Countries that no one really thinks exist. Some ideas were actually present, but were not presented very well and are extreamely incomplete. "Steal This Computer Book" does have a lot of potential and I hope that Wallace Wang does release newer editions of this book as promised. I am curious to see where he takes the book in the future, but for the time being, in my opinion, it needs a new cover. -dM
Kommentar Eine Person fand diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Format: Taschenbuch
This looks like a overview done by some mainstream news show reporter who is mostly clueless. Ex. under how to hack Linux is to download/install a copy and practice using it--end of lesson. Well duh! Chapter on viruses talks only about having a virus checker. Oooh, big secret. They killed a tree for this?
The chapter titles promise, but the material just doesn't deliver except for some links that are probably out of date. Whether you think this will tell you how to hack or whether you want to learn about hacking and secuity matters to protect your system, you will be sorely disappointed. Computer neophytes should save money and buy a used copy to put on their bookshelves to impress their equally neophyte friends.
Kommentar Eine Person fand diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Von Ein Kunde am 14. April 2000
Format: Taschenbuch
Don't bother stealing this book, it won't be worth the trouble of sneaking it out the door.
Most entry level computer books at least have a bit of humor or some interesting tidbits to make them worth a glance or two. This book offers nothing but outdated security information, something no admin can aford.
Kommentar Eine Person fand diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Format: Taschenbuch
"Steal This Computer Book" is a good introduction to the existence of the dark side of computing, but there's not a whole lot here for the advanced user. Some chapters just seem to be lists of reference material (URLs, mostly); others provide some in-depth info on specific topics. If you're looking for a "how-to" guide, this is not the book for you. The final chapter, "Hostile Java Applets," contains the entire code of three such applets, but has no explanation of how they work -- if you don't already know Java, this chapter will do almost nothing for you. It has the feel of an author who has some basic knowledge of the subject, and has read some other books or articles on the topic, but then went and found some things and just pasted them into his book. The section on phreaking is the same way. My advice? Buy this book, read it all the way through and copy down all the URLs, and then return it. Even advanced users (like, I daresay, myself) will have gained some additional perspective on certain matters, though a good amount of the material needs to be taken with a grain of salt. Newbies certainly should read this book, to gain at least a basic groundwork of knowledge (if not understanding) about the topics presented herein.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die neuesten Kundenrezensionen

click to open popover