Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks, and Spies over Time
||Author: John Chirillo|
List Price: $64.99
Our Price: Click to see the latest and low price
Publisher: John Wiley & Sons (22 August, 2001)
Sales Rank: 85,931
Average Customer Rating: 5 out of 5
Customer ReviewsRating: 5 out of 5
Gain Insight of the Mindset of Hackers, Crackers, Phreakers!
The widespread availability of computers and access to telephone and Internet technologies has contributed to the sharp rise in the number of people going online over the years. Unfortunately, many of these people found their way online through less-than-honest means, and once online, they would set out to perform a great deal of mischief and damage to various computers and computer information systems.
Hack Attacks Encyclopedia edited by John Chirillo serves as the ultimate source for collected information on the history of hacking, cracking, and phreaking. The book features nearly 2,000 text and HTML document extracts that includes news articles, online postings, and other snippets of insightful information. Some of the accounts are startling. Readers will quickly pick up just how clever some hackers, crackers, and phreakers really are. The following snippet exemplifies available talent in Northern America:
"Silver Spy has everything going for him - comfortable surroundings, a father who is an engineer. He ranks in the top 3 percent of his high-school class. His SAT scores for college admission totaled 1,400 of a possible 1,600. He wants to attend Stanford or the Massachusetts Institute of Technology. But in the eyes of the phone companies he is a thief, and in the eyes of the law he's a criminal. Such is the portrait of this 17-year-old computer "hacker" and "phone phreaker" who lives about 20 miles outside Boston. He spoke with U.S. News & World report on the condition that neither his real name nor home town be revealed."
The Hack Attack Encyclopedia is broken up into major sections by decade - the 70's, the 80's, the 90's, the Millennium, and a special historical synopsis. From beginning to end, readers will be able to follow the history of mischievous behavior. It will be an eye-opening experience for anyone to follow the advancements made in communications technologies and how they can be easily circumvented and otherwise compromised to carryout further activities. Although some of the technologies disclosed in the book are outdated and have been replaced, readers will still gain helpful insight of the mindset of hackers, crackers, and phreakers operating today. They are a force to be taken very seriously.
An extensive 217-page glossary of terms will enlighten readers about the slang talk used in the hacking, cracking, and phreaking communities. As a special bonus, the CD accompanying the book features full-length editions of the article and snippet extracts included in the book, hundreds of computing and Internet exploits, and a sampling of useful utility programs.
Hacking, cracking, phreaking, and virus infection still poses problems for many people today. This book will open the eyes of many people - including business people, IT managers, and law enforcement officials. It will serve as an excellent starting point for taking necessary corrective action to prevent further mischief and harm caused to personal and company computer systems. I can't wait to see an updated edition. Highly recommended reading.
Rating: 5 out of 5
five stars on the scale of worthless-ness
this book is culled from sources across the internet, almost all of the information is freely available somewhere. in most cases the author has not even bothered to change the filenames or unique file extensions. the book itself is barely an index of the cd-rom, with the first paragraph of a file serving as a description. there is some (un)original writing done by the author himself, comprising a miniscule amount of the actual text. if you would like to learn what these files are actually about, you would be much better served by going to the sites they were taken from
Rating: 5 out of 5
What a great book, with tons of info...recommend it to anyone who knows anything about hacking.
· Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition
· Hacking Exposed Linux, 2nd Edition (Hacking Exposed)
· Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses