Synopses & Reviews
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. The third edition of this bestseller (over 150,000 copies sold) adopts the same informative, irreverent, and entertaining style that made the first two editions a huge success. Thoroughly updated, this edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
Review
""If this book had a soundtrack, it'd be Lou Reed's Walk on the Wild Side."
Synopsis
In this third edition, Wallace Wang employs the same informative, irreverent, and entertaining style that made the first two editions of STEAL THIS COMPUTER BOOK so successful. Along with discussing the methods that hackers and crackers use to do their dirty work, the book also addresses ethical issues surrounding hacking. Thoroughly updated, this edition now also includes information on rootkits, spyware, Web bugs, identity theft, hacktivism, wireless hacking (wardriving), and firewalls. The CDROM includes over 300 software programs that provide examples of most of the topics discussed.
Synopsis
This worldwide bestseller, with over 150,000 copies sold of previous editions, is a great crossover title that appeals to both readers with computer security experience and those new to the topic. The included CDROM has over 300 programs.
About the Author
Best-selling computer book author Wallace Wang (The Book of Nero 6, Steal This File Sharing Book, both No Starch Press, and Visual Basic 6 for Dummies), is a former contributor to Boardwatch Magazine, where he wrote a monthly column called "Notes From the Underground." He is a successful stand-up comic who has appeared on A&E's "Evening at the Improv" and appears regularly at the Riviera Comedy Club in Las Vegas.
Table of Contents
pt. 1. Information overload (lies, damn lies, and statistics) -- pt. 2. Dangerous threats on the Internet -- pt. 3. Breaking and entering computers -- pt. 4. Protecting yourself -- pt. 5 Protecting your computer.