Master your Minecraft
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Tour our stores


    Recently Viewed clear list


    Interviews | October 28, 2014

    Jill Owens: IMG Miriam Toews: The Powells.com Interview



    Some people are compelled by a restlessness from within; others are shaped by the unwieldy forces around them. In Miriam Toews's poignant new novel... Continue »

    spacer
Qualifying orders ship free.
$15.50
List price: $21.99
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
1 Burnside History of Science- Computers

This title in other editions

Hackers: Heroes of the Computer Revolution

by

Hackers: Heroes of the Computer Revolution Cover

 

Synopses & Reviews

Publisher Comments:

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham

We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?

Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.

Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."

The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.

And here's a taste of what you'll find in Hackers & Painters:

"In most fields the great work is done early on. The paintings made between 1430 and 1500 are still unsurpassed. Shakespeare appeared just as professional theater was being born, and pushed the medium so far that every playwright since has had to live in his shadow. Albrecht Durer did the same thing with engraving, and Jane Austen with the novel.

Over and over we see the same pattern. A new medium appears, and people are so excited about it that they explore most of its possibilities in the first couple generations. Hacking seems to be in this phase now.

Painting was not, in Leonardo's time, as cool as his work helped make it. How cool hacking turns out to be will depend on what we can do with this new medium."

Andy Hertzfeld, co-creator of the Macintosh computer, says about Hackers & Painters: "Paul Graham is a hacker, painter and a terrific writer. His lucid, humorous prose is brimming with contrarian insight and practical wisdom on writing great code at the intersection of art, science and commerce."

Paul Graham, designer of the new Arc language, was the creator of Yahoo Store, the first web-based application. In addition to his PhD in Computer Science from Harvard, Graham also studied painting at the Rhode Island School of Design and the Accademia di Belle Arti in Florence.

Book News Annotation:

This volume is the 25th anniversary edition of technology writer and editor Levy's book on computer hacking and the people who shaped the computers we know today. The author profiles the "brainiacs" who found solutions to the thorniest computer engineering problems from the days of early computer research laboratories and into the era of the earliest home computers. Some notable names jump out of the roster, such as Bill Gates, Mark Zuckerberg, and Steve Wozniak. Annotation ©2010 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

'
In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.
\n

'

Synopsis:

This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification that teach basic hacking techniques as well as essential reverse engineering skills.

Synopsis:

Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks. This book reviews the many possible VoIP attacks, and discusses the best defenses against them.

Synopsis:

Watson reviews Rails development and then moves to essential enterprise subjects like Web services and their relationships with SOA, data persistence, messaging, interoperability with other platforms, handling documents and search, spell-checking, report generation, and how to access del.icio.us and Flickr from Ruby.

Synopsis:

In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.

Synopsis:

This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Synopsis:

This is the first book to focus on important new threats and attacks against modern Web 2.0 networks, sites, and applications. The security world is changing rapidly. A new generation of hacking techniques has appeared, combining social abuse with purely technical attacks, and focusing on new vulnerabilities that are inherent in wireless technologies. "Hacking: The Next Generation" is a must-read for anyone involved in defending a site, a network, or an application — including social networks and applications based in the cloud.

Synopsis:

'
Silverlight 2, Microsoft\'s new Web framework for developing rich Internet applications, brings the developer and the designer together. This example-rich tutorial reveals how to work on projects in Visual Studio and Expression Blend, how to use source control to manage projects, and how to deploy applications successfully.
\n

'

Synopsis:

The book addresses "geeky" owners of Canon consumer cameras who would like to explore the possibilities of their cameras, and eventually tweak them to do things way beyond their original specifications, such as

- RAW file (or DNG) support in addition to the camera's JPEG output - Manual control for aperture, shutter speed, and ISO - Expand shutter speeds way beyond the specification limits - Enable bracketing

The hacks are based on the Canon Hack Development Kit (CHDK), a free software maintained by a group of enthusiasts. Many scripts are already published on the web. The book teaches how to use existing scripts and how to write new ones.

Canon cameras, especially their consumer lines of PowerShot/IXUS cameras, allow the user to temporarily upload so called add-ons into the camera through the memory card. The next time the camara is switched on, the add-on is active, when the camera is switched off, the camera returns to its original state, so there is no risk of loosing the manufacturers warranty.

Synopsis:

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.

Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:

  • Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
  • Audit VoIP network security
  • Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
  • Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
  • Identify the many vulnerabilities in any VoIP network

Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.

About the Author

Paul Graham , designer of the new Arc language, was the creator of Yahoo Store, the first web-based application. His technique for spam filtering inspired most current filters. He has a PhD in Computer Science from Harvard and studied painting at RISD and the Accademia in Florence.

Table of Contents

HACKING: THE ART OF EXPLOITATION, 2ND EDITION.ACKNOWLEDGMENTSPREFACEChapter 0x100: INTRODUCTIONChapter 0x200: PROGRAMMINGChapter 0x300: EXPLOITATIONChapter 0x400: NETWORKINGChapter 0x500: SHELLCODEChapter 0x600: COUNTERMEASURESChapter 0x700: CRYPTOLOGYChapter 0x800: CONCLUSIONCOLOPHON

Product Details

ISBN:
9781449388393
Author:
Levy, Steven
Publisher:
O'Reilly Media
Author:
Jo
Author:
Erickson, Jon
Author:
Hardin, Brett
Author:
Huang, Andrew "Bunnie"
Author:
Engel, Der
Author:
Dwivedi, Himanshu
Author:
Rios, Billy
Author:
Graham, Paul
Author:
Byfield, Bruce
Author:
Watson, Mark
Author:
Dhanjani, Nitesh
Author:
n Erickson
Author:
Kelley, David James
Author:
Daum, Berthold
Author:
Waldorf and Statler
Subject:
Programming - General
Subject:
Security
Subject:
Data Transmission Systems - ISDN
Subject:
Business Software - General
Subject:
Internet - Web Site Design
Subject:
Networking - Network Protocols
Subject:
Programming Languages - General
Subject:
Computer hackers
Subject:
Geeks (Computer enthusiasts)
Subject:
Software Engineering - Programming and Languages
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock
Subject:
hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
CourseSmart Subject Description
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Subject:
computer club;decimal print routine;diy;ethic;fellow hackers;hacker community;hacker dream;hacker spirit;hackers;hardware hacker;levy;lock hacking;mystery house;open source;other hackers;phone hacking;true hackers;ware hackers;wired;young hacker
Copyright:
Edition Description:
Print PDF
Series:
Animal Guide
Series Volume:
Heroes of the Comput
Publication Date:
20100531
Binding:
TRADE PAPER
Language:
English
Pages:
520
Dimensions:
9.25 x 7.38 in
Media Run Time:
IAX SECURITY</li></ul>Part II: VOIP SECURITY T...

Other books you might like

  1. Rift New Trade Paper $12.95
  2. Godel, Escher, Bach: An Eternal...
    Used Trade Paper $16.50
  3. A People's History of the United...
    Used Trade Paper $13.95
  4. Bee Season
    Used Trade Paper $0.95

Related Subjects

Computers and Internet » Computers Reference » Beginning and Reference
Computers and Internet » Computers Reference » History and Society
Computers and Internet » Software Engineering » Programming and Languages
Science and Mathematics » History of Science » Computers

Hackers: Heroes of the Computer Revolution Used Trade Paper
0 stars - 0 reviews
$15.50 In Stock
Product details 520 pages O'Reilly Media - English 9781449388393 Reviews:
"Synopsis" by , '
In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.
\n

'

"Synopsis" by ,
This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification that teach basic hacking techniques as well as essential reverse engineering skills.
"Synopsis" by ,
Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks. This book reviews the many possible VoIP attacks, and discusses the best defenses against them.
"Synopsis" by ,
Watson reviews Rails development and then moves to essential enterprise subjects like Web services and their relationships with SOA, data persistence, messaging, interoperability with other platforms, handling documents and search, spell-checking, report generation, and how to access del.icio.us and Flickr from Ruby.

"Synopsis" by ,
In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can easily follow along with example code by booting the included live CD.
"Synopsis" by ,
This book is for both technical and nontechnical people interested in computer security. Unlike many so-called hacking books, this explains technical aspects of hacking such as stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
"Synopsis" by ,
This is the first book to focus on important new threats and attacks against modern Web 2.0 networks, sites, and applications. The security world is changing rapidly. A new generation of hacking techniques has appeared, combining social abuse with purely technical attacks, and focusing on new vulnerabilities that are inherent in wireless technologies. "Hacking: The Next Generation" is a must-read for anyone involved in defending a site, a network, or an application — including social networks and applications based in the cloud.

"Synopsis" by , '
Silverlight 2, Microsoft\'s new Web framework for developing rich Internet applications, brings the developer and the designer together. This example-rich tutorial reveals how to work on projects in Visual Studio and Expression Blend, how to use source control to manage projects, and how to deploy applications successfully.
\n

'

"Synopsis" by ,

The book addresses "geeky" owners of Canon consumer cameras who would like to explore the possibilities of their cameras, and eventually tweak them to do things way beyond their original specifications, such as

- RAW file (or DNG) support in addition to the camera's JPEG output - Manual control for aperture, shutter speed, and ISO - Expand shutter speeds way beyond the specification limits - Enable bracketing

The hacks are based on the Canon Hack Development Kit (CHDK), a free software maintained by a group of enthusiasts. Many scripts are already published on the web. The book teaches how to use existing scripts and how to write new ones.

Canon cameras, especially their consumer lines of PowerShot/IXUS cameras, allow the user to temporarily upload so called add-ons into the camera through the memory card. The next time the camara is switched on, the add-on is active, when the camera is switched off, the camera returns to its original state, so there is no risk of loosing the manufacturers warranty.

"Synopsis" by ,

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.

Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:

  • Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
  • Audit VoIP network security
  • Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
  • Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
  • Identify the many vulnerabilities in any VoIP network

Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.

spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.