To see what your friends thought of this book, please sign up. To ask other readers questions about Black Hat , please sign up. Lists with This Book. This book is not yet featured on Listopia.fercapafuli.ga
Black Hat | John Biggs Book | In-Stock - Buy Now | at Mighty Ape NZ
Community Reviews. Showing Rating details. More filters. Sort order. Jul 13, Dennis Littrell rated it liked it. Readable intro for the neophyte While reading this breezy introduction to the unlikely but inevitable cloak and dagger cyber world of hackers and spammers, encryption and "things that go ping in the night," I had a terrible sense of estrangement mixed with fear and loathing simply because I knew and know jack diddly about hacking and how to protect myself against it.
Join Kobo & start eReading today
So I suppose this book is a start, lesson one in Cyberspace judo. There are eight chapters, covering such topics as spam and spyware Readable intro for the neophyte While reading this breezy introduction to the unlikely but inevitable cloak and dagger cyber world of hackers and spammers, encryption and "things that go ping in the night," I had a terrible sense of estrangement mixed with fear and loathing simply because I knew and know jack diddly about hacking and how to protect myself against it.
There are eight chapters, covering such topics as spam and spyware, worms and viruses, scams and counterattacks against the black hats. In one chapter Biggs explores the "Dear Friend," advanced-fee fraud, often referred to as the "Nigerian potentate scam," or simply "" since it is section in the Nigerian Criminal Code.
You might recognize this con as the outrageous come-on that promises you a nice percentage of some many millions of dollars if you will allow an abused princess or such of some African country to use YOUR bank account for a transfer of the millions.
Of course you'll be asked for a few thousand dollars up front There are some black and white photos of Web pages and persons, including one of Patrick Kroupa aka "Lord Digital" caught in dark light in front of his lap top, looking for all the world like a cross between Darth Vader and a young Bobby Fischer. There is an element of glorification in this book that may be off-putting to some.
There is also something eternally juvenile about the nether world of Internet "hax0rs" and spammers, something gloriously amateurish about their pursuits and values. Why hack? To make a buck, to gain fame, to win the heart of the prom queen? Because it's fun and because it's there? Yes, oh, yes. Why spam? Well, in the case of spam, if somehow the monetary reward could be removed, that is, if somehow people would NOT reply to spammers and their scams, then spam would gurgle to a trickle. In other words, the nefarious world of black hats and white hats, phreaks and crackers, acne-sprouting adolescents in trailer parks and spam king millionaires in Cancun is an all too human world doing what humans do best.
That is, trying to rip each other off while puffing out their chests. John Biggs draws a distinction between amateurs e.
- Instability in models connected with fluid flows 2?
- Plant Desing and Economics for Chemical Engineers.
- Ruskin’s Maze: Mastery and Madness in His Art!
- Black Hat: Misfits, Criminals, and Scammers in the Internet Age;
- Small Implants in Knee Reconstruction.
Script kiddies create nothing "but are just stupid enough to be dangerous" p. He also makes a distinction between "free as in freedom" and "free as in free beer"--a very nice distinction new to these ears. There is freedom of expression, and there are free things worth having. Be sure you know which is which. I should also note that Biggs's mantra throughout is "open source, open source, open source.
The Net is in a sense a soap opera in which you can play a part. All it needs is a musical score. Like many books that have their birth on or about the Internet, Black Hat is full of flashy terminology and tortured syntax, missing words and choppy organization characteristic of quick and easy netstyle communications, featuring not fully professional editing. Nonetheless this book is definitely worth reading if you are, like me, pretty much an amateur Cyberian. A more engaging and professionally accomplished but more narrowly focused intro to this world is Spam Kings by Brian McWilliams, which I also recommend.
Oct 08, Paul rated it it was ok.
Download Black Hat: Misfits, Criminals, And Scammers In The Internet Age
Although John Biggs does make some valid points, I found the tone of the book to be excessively sensationalist. This is not helped by the fact that he feels the need to simplify issues to the point of inaccuracy. Deepak Baliga rated it it was ok May 17, Davide Montesarchio rated it liked it Jan 10, Daniel rated it it was amazing Jul 29, Robert rated it it was ok Feb 02, Marta Pancaldi rated it liked it Jun 02, Charlie White rated it it was amazing Apr 05, Ward Wouts rated it did not like it Dec 07, Mike rated it liked it Nov 24, Mike Han rated it really liked it Sep 13, Michael Howard rated it it was ok Jun 18, Lynne rated it liked it Oct 25, Jason S rated it liked it Mar 13, Philip rated it liked it Sep 18, Jeremy Kriegel rated it it was amazing Dec 29, Ronald marked it as to-read Jun 01, David Schwan marked it as to-read Jun 04, Jacrify marked it as to-read Jun 18, Leonardo marked it as to-read Jul 27, Pickup not available.
This fun, gossipy read takes a balanced look at recent hacking cases that made the news and the people behind them--known as Black Hats--as well as the legislation currently in process regarding hacking, reverse-engineering, cracking, and spam. About This Item We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here, and we have not verified it.
See our disclaimer.
General Internet use is all the experienced required. This is a fun, gossipy read about Black Hats - aka hackers. This is not an alarmist book.
It will take a balanced look at the hacking cases that made the news in the past few years and the people behind them as well as the legislation currently in process regarding hacking, reverse-engineering, cracking, and spam. This book has will attract an educated, technology-savvy audience, someone who doesn't want to slog through a thousand dry pages on computer security but would enjoy a wide survey of the modern threats we all face in the techno jungle.
Specifications Publisher Apress. Customer Reviews. Write a review.
See any care plans, options and policies that may be associated with this product. Email address. Please enter a valid email address.
Walmart Services. Get to Know Us. Customer Service. In The Spotlight.
Shop Our Brands. All Rights Reserved.