AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau ISBN: 1-56025-307-X Publisher: Thunder's Mouth Press Pub. Date: 30 March, 2001 Format: Paperback Volumes: 1 List Price(USD): $16.95 |
Average Customer Rating: 3.9 (20 reviews)
Rating: 5
Summary: book review
Comment: I thoroughly enjoyed Winn Schwartau's book. He gives the reader an insightful look of hackers and phreakers community. He doesn't berate that community, but helps the reader understand what they are about. Schwartau's book makes this dangerous issue easy to understand and is written in a way that everyone has a chance of reading this book. He also fills the book with examples of security breaks that he has encountered. His stories seem scary at first, but he also emphasizes that there are ways to deter such attacks. His idea is not to get readers to stop using computers and the Internet because of such attacks, but to get them aware of what it out there and to take countermeasures. His real life stories are what make the book interesting to read and enjoy. I think that he could have offered sort of program that would allow the reader to see an example of a security program, maybe negotiating a deal to market a program would have been nice to include.
Rating: 5
Summary: Terrorism Research Center Review of Cybershock
Comment: Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau is an enlightening look at the dangers of the Internet from a consumer/ general user perspective. If I had one book to give friends and family that demonstrates the types of threats they need to be aware of in the information age, it would be Schwartau's Cybershock. Winn wrote this book for the mass market and he never strays from his target audience. He makes no apologies to those who are familiar with technology and security when he provides real-life examples of information security horror stories involving fraud or identity theft that many might label as fear mongering. Winn's stories are personal because he has been a victim and many of his friends and relatives have been targeted as well. One of Winn's major objectives in writing this book was to advance ideas on privacy and Internet rights, and many of the examples point the reader in a specific direction. However, Winn doesn't hide the fact that he is trying to be somewhat controversial to raise awareness on specific issues. The book, after all is entitled Cybershock, not Cybercalm. As an added bonus, the book also provides some interesting historical perspectives as Winn describes and interviews individuals who were visionaries offering information security services or predicted new threats before they emerged.
Rating: 1
Summary: Worse book on the subject
Comment: This is quite possibly the worse book I ever read on the subject. The author has a tendency to make unqualified statements with no supportive evidence. He thinks Hong Kong is an ".... emerging country around the Far East, having problems with software piracy. (Where have you been for the last 50 yrs ? Australia has a software piracy rates on par to Hong Kong. The highest is in Thailand and Vietnam.) He thinks when you start a web browser, and a small program running in the background, it is written in a "new" computer language called JAVA. Not knowing that JavaScirpt and JAVA has nothing in common, but share a name. He is not sure whether to called hacker as "immature bastards" with no real skills, or to take the high road and suggest that talented individuals like them should be nutured, and jail sentences should be reserved for murderers - so he did both.
The author has the hallmark of a typical sales/marketing/management type, knowing all the buzz words: risk management, business contingency plan, ..etc. CEO loves it, but can he tell the different between PPTP and IPSec ? and why should you use one and not the other ? I started questioning his credential after reading three chapters. If you want a better introduction to the subject, try Personal Firewalls by Lisa Yeo, Firewalls and Internet Security by Cheswick and Bellovin or Hacker's Challenge by Schiffman. Luckily, I only paid $4 for this paper weight.
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments