- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Ships in 1 to 3 days
More copies of this ISBN
Hackers: Heroes of the Computer Revolutionby Steven Levy
Synopses & Reviews
"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?
Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.
Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."
The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
And here's a taste of what you'll find in Hackers & Painters:
"In most fields the great work is done early on. The paintings made between 1430 and 1500 are still unsurpassed. Shakespeare appeared just as professional theater was being born, and pushed the medium so far that every playwright since has had to live in his shadow. Albrecht Durer did the same thing with engraving, and Jane Austen with the novel.
Over and over we see the same pattern. A new medium appears, and people are so excited about it that they explore most of its possibilities in the first couple generations. Hacking seems to be in this phase now.
Painting was not, in Leonardo's time, as cool as his work helped make it. How cool hacking turns out to be will depend on what we can do with this new medium."
Andy Hertzfeld, co-creator of the Macintosh computer, says about Hackers & Painters: "Paul Graham is a hacker, painter and a terrific writer. His lucid, humorous prose is brimming with contrarian insight and practical wisdom on writing great code at the intersection of art, science and commerce."
Paul Graham, designer of the new Arc language, was the creator of Yahoo Store, the first web-based application. In addition to his PhD in Computer Science from Harvard, Graham also studied painting at the Rhode Island School of Design and the Accademia di Belle Arti in Florence.
Book News Annotation:
This volume is the 25th anniversary edition of technology writer and editor Levy's book on computer hacking and the people who shaped the computers we know today. The author profiles the "brainiacs" who found solutions to the thorniest computer engineering problems from the days of early computer research laboratories and into the era of the earliest home computers. Some notable names jump out of the roster, such as Bill Gates, Mark Zuckerberg, and Steve Wozniak. Annotation ©2010 Book News, Inc., Portland, OR (booknews.com)
In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.\n
This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification that teach basic hacking techniques as well as essential reverse engineering skills.
Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks. This book reviews the many possible VoIP attacks, and discusses the best defenses against them.
Watson reviews Rails development and then moves to essential enterprise subjects like Web services and their relationships with SOA, data persistence, messaging, interoperability with other platforms, handling documents and search, spell-checking, report generation, and how to access del.icio.us and Flickr from Ruby.
In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.
This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
This is the first book to focus on important new threats and attacks against modern Web 2.0 networks, sites, and applications. The security world is changing rapidly. A new generation of hacking techniques has appeared, combining social abuse with purely technical attacks, and focusing on new vulnerabilities that are inherent in wireless technologies. "Hacking: The Next Generation" is a must-read for anyone involved in defending a site, a network, or an application — including social networks and applications based in the cloud.
Silverlight 2, Microsoft\'s new Web framework for developing rich Internet applications, brings the developer and the designer together. This example-rich tutorial reveals how to work on projects in Visual Studio and Expression Blend, how to use source control to manage projects, and how to deploy applications successfully.\n
The book addresses "geeky" owners of Canon consumer cameras who would like to explore the possibilities of their cameras, and eventually tweak them to do things way beyond their original specifications, such as
- RAW file (or DNG) support in addition to the camera's JPEG output - Manual control for aperture, shutter speed, and ISO - Expand shutter speeds way beyond the specification limits - Enable bracketing
The hacks are based on the Canon Hack Development Kit (CHDK), a free software maintained by a group of enthusiasts. Many scripts are already published on the web. The book teaches how to use existing scripts and how to write new ones.
Canon cameras, especially their consumer lines of PowerShot/IXUS cameras, allow the user to temporarily upload so called add-ons into the camera through the memory card. The next time the camara is switched on, the add-on is active, when the camera is switched off, the camera returns to its original state, so there is no risk of loosing the manufacturers warranty.
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.
Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.
Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:
Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.
About the Author
Paul Graham , designer of the new Arc language, was the creator of Yahoo Store, the first web-based application. His technique for spam filtering inspired most current filters. He has a PhD in Computer Science from Harvard and studied painting at RISD and the Accademia in Florence.
Table of Contents
HACKING: THE ART OF EXPLOITATION, 2ND EDITION.ACKNOWLEDGMENTSPREFACEChapter 0x100: INTRODUCTIONChapter 0x200: PROGRAMMINGChapter 0x300: EXPLOITATIONChapter 0x400: NETWORKINGChapter 0x500: SHELLCODEChapter 0x600: COUNTERMEASURESChapter 0x700: CRYPTOLOGYChapter 0x800: CONCLUSIONCOLOPHON
What Our Readers Are Saying
Other books you might like
Computers and Internet » Computers Reference » Beginning and Reference