e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Book Author - Hackers The (Books)

  1-20 of 99 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

click price to see details     click image to enlarge     click link to go to the store

$15.49
1. Winner-Take-All Politics: How
$60.00
2. A Writer's Reference
$7.95
3. Hackers & Painters: Big Ideas
$14.08
4. Hackers: Heroes of the Computer
$42.79
5. Hacker's Delight
$27.38
6. The Web Application Hacker's Handbook:
 
$37.65
7. Rules for Writers
$26.62
8. CEH Certified Ethical Hacker Study
$79.00
9. Writer's Reference 6e & MLA
$16.02
10. Higher Education?: How Colleges
$68.60
11. Pocket Style Manual: Updated With
$43.91
12. Hacker & Moore's Essentials
$13.61
13. Official Certified Ethical Hacker
$4.13
14. The Hacker Crackdown: Law And
$16.30
15. The Database Hacker's Handbook:
$4.20
16. The Hacker Diaries : Confessions
$4.40
17. The Downhill Lie: A Hacker's Return
$16.95
18. The Mac Hacker's Handbook
$11.97
19. Certified Ethical Hacker Exam
$9.55
20. The Best of 2600: A Hacker Odyssey

1. Winner-Take-All Politics: How Washington Made the Rich Richer--and Turned Its Back on the Middle Class
by Paul Pierson, Jacob S. Hacker
Hardcover: 368 Pages (2010-09-14)
list price: US$27.00 -- used & new: US$15.49
(price subject to change: see help)
Asin: 1416588698
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
A groundbreaking work that identifies the real culprit behind one of the great economic crimes of our time— the growing inequality of incomes between the vast majority of Americans and the richest of the rich. We all know that the very rich have gotten a lot richer these past few decades while most Americans haven’t. In fact, the exorbitantly paid have continued to thrive during the current economic crisis, even as the rest of Americans have continued to fall behind. Why do the “haveit- alls” have so much more? And how have they managed to restructure the economy to reap the lion’s share of the gains and shift the costs of their new economic playground downward, tearing new holes in the safety net and saddling all of us with increased debt and risk? Lots of so-called experts claim to have solved this great mystery, but no one has really gotten to the bottom of it—until now. In their lively and provocative Winner-Take-All Politics, renowned political scientists Jacob S. Hacker and Paul Pierson demonstrate convincingly that the usual suspects—foreign trade and financial globalization, technological changes in the workplace, increased education at the top—are largely innocent of the charges against them. Instead, they indict an unlikely suspect and take us on an entertaining tour of the mountain of evidence against the culprit. The guilty party is American politics. Runaway inequality and the present economic crisis reflect what government has done to aid the rich and what it has not done to safeguard the interests of the middle class. The winner-take-all economy is primarily a result of winner-take-all politics. In an innovative historical departure, Hacker and Pierson trace the rise of the winner-take-all economy back to the late 1970s when, under a Democratic president and a Democratic Congress, a major transformation of American politics occurred. With big business and conservative ideologues organizing themselves to undo the regulations and progressive tax policies that had helped ensure a fair distribution of economic rewards, deregulation got under way, taxes were cut for the wealthiest, and business decisively defeated labor in Washington. And this transformation continued under Reagan and the Bushes as well as under Clinton, with both parties catering to the interests of those at the very top. Hacker and Pierson’s gripping narration of the epic battles waged during President Obama’s first two years in office reveals an unpleasant but catalyzing truth: winner-take-all politics, while under challenge, is still very much with us. Winner-Take-All Politics—part revelatory history, part political analysis, part intellectual journey— shows how a political system that traditionally has been responsive to the interests of the middle class has been hijacked by the superrich. In doing so, it not only changes how we think about American politics, but also points the way to rebuilding a democracy that serves the interests of the many rather than just those of the wealthy few. ... Read more

Customer Reviews (13)

5-0 out of 5 stars Important, provocative and highly-readable
One of the most stunning developments of the past thirty years has been the concentration of income gains at the top. In this penetrating, highly-readable book, two of the nation's leading political scientists make a strong argument that growing inequality is not just the result of free market forces but also has been promoted by politicians who often have strong incentives to cater to the well-off. Hacker and Pierson's analysis of how social protections can change through a hidden process of "drift" should be seriously considered in any systematic effort to update and reform America's welfare state. Winner-Take-All-Politics identifies issues and generates hypotheses that will be investigated by scholars for years. An important book for students of American politics and public policy.

4-0 out of 5 stars Who knew!
I haven't finished yet. I lived through this period, I was born in the big depression, I may go out in one also. It's right on!

5-0 out of 5 stars Easy to read and detailed
Jacob Hacker and Paul Pierson know their stuff. This book is very easy to read and can be understood by all. The information that they give is not just their opinion but facts backed up with statistics and a few diagrams. It will probably make you mad unless you are one of the few filthy rich people that are laughing all the way to the bank. If you have a desire to find out why our economy is doing so bad in hopes of maybe changing something to turn us around, this is an excellant book to read. It will give you alot of insight into why we are where we are. If you are like me, it will probably also make you want to hang a few people!

5-0 out of 5 stars An ImportantBook
This is a phenomenal book and everyone interested in how American politics works (or more accurately, doesn't work) should pick it up. It's both really smart and really accessible to a lay audience, which is rare for a political science book.

Extreme economic inequality and the near paralysis of our governing institutions has lead to a status-quo that is almost entirely indifferent to the needs of working families. Hacker & Pierson chronicle the rise of this corrupt system and the dual, yet distinct, roles the Republican and Democratic Parties have played in abetting it.

Seriously, it's top-notch. Read this book.

3-0 out of 5 stars Interesting -- but the argument is not credible
This is a very interesting and well written book. The central argument is that growing income inequality is primarily a result of the political policies enacted since the Reagan administration.

The book makes many valid points, for example marginal tax rates on the wealthy have been reduced dramatically.

The problem is that the book discounts the impact of both technology and globalization, and I find that to be simply not credible. The evidence of factory relocations, service offshoring and automation are all around us.

I believe there is solid evidence that globalization and technology are the primary forces driving inequality. The problem is that for most workers labor is becoming less and less valued -- and as a result they have less bargaining power.

Politics is certainly important, and if we had had more progressive, countervailing policies, then we could have mitigated the impact of technology an globalization. Instead we adopted conservative policies that actually accelerated the push toward more concentration of income.

It is very important to understand what is going on here, because if technology is to blame, then it is going to get worse. Technology is moving faster than ever before, and we will soon have far more advanced job automation. More and more people are likely to find that they no longer have marketable skills. Politics may worsen that -- or fail to help -- but it is NOT the fundamental cause.

For the real story on what is happening, and more importantly, a look at what is likely to happen in the future, I'd recommend this book:

The Lights in the Tunnel: Automation, Accelerating Technology and the Economy of the Future.

Read "Winner Take All Politics" by all means, because it certainly raises valid points. But if you want to understand the danger we face in the next couple of decades, be sure to read "The Lights in the Tunnel". ... Read more


2. A Writer's Reference
by Diana Hacker, Nancy Sommers
Paperback: 576 Pages (2010-10-25)
-- used & new: US$60.00
(price subject to change: see help)
Asin: 0312601433
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

A Writer's Reference, the most widely adopted handbook in the United States, continues to be groundbreaking in its simplicity, offering the right content in an accessible format. New coauthor Nancy Sommers's own research, campus travel, and classroom experience keep the handbook in tune with the needs of academic writers. In a trusted quick-reference format, the seventh edition delivers advice on all the right topics: working with sources, revising with comments, preparing a portfolio, and more. A Writer's Reference offers unprecedented flexibility with several versions to choose from -- a handbook that's truly at your service.
... Read more

Customer Reviews (98)

2-0 out of 5 stars 'Very Good' condition - i don't think so
When ordering this book, the description said it was in very good condition. When i received the book, which was actually pretty fast, the last pages were ripped out and the condition was horrible. No matter how many times i tried to call the company nobody was picking up the phone. I got the response to my e-mail a week later saying i can return it on my own expense. that will tech me a lesson never to order from them again

1-0 out of 5 stars a writer's reference
i ordered this book at 8/26/2010, but still i did not get it today(09/27/2010). i realy want this book badly.

5-0 out of 5 stars WOW!!
I received this item the next day (nearly before I finished placing the order!).I have not ever received an item so fast!The book was in great condition.Seller was extremely prompt and deserves an excellent rating for taking care of business so fast.

5-0 out of 5 stars Writers Refrence
I got my book SUPER fast and it was in perfect condidtion! I will Definetly buy from you again!

1-0 out of 5 stars Cotastrophy
THIS IS THE WORST COMPANY I HAVE EVER DELT WITH!!!! I NEVER RECIEVED MY BOOK AND THEY WONT REFUND ME. I FILED A CLAIM AND NOTHING HAS BEEN DONE STILL. I'M GETTING A LAWSUIT TOGETHER. ... Read more


3. Hackers & Painters: Big Ideas from the Computer Age
by Paul Graham
Paperback: 272 Pages (2010-05-01)
list price: US$17.99 -- used & new: US$7.95
(price subject to change: see help)
Asin: 1449389554
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham

We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?

Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.

Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."

The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.

... Read more

Customer Reviews (61)

4-0 out of 5 stars Essays
Thought provoking and entertaining collection of essays.If you liked 'Joel on Software' you will like this.

5-0 out of 5 stars Clearly Written, Entertaining, Thought Provoking
Graham is obviously really smart.He covers both obvious and complex ideas really clearly and convincingly.The first portion of the book is largely on social theory/philosophy/economics, while the latter is computer science.All of these are of interest to me, so I thought the book was phenomenal, as was the author's insight.

The footnotes and glossary are entertaining as well.

1-0 out of 5 stars poorly written and uninteresting
Any new ideas in this book? Not really. Simple thoughts, mostly either quite trivial or simply wrong, drove by a person whose confidence is only equalled by pretentiousness. I hope "nerds" are smarter than this, they deserve to be praised by someone who's idea of what is "important" (not specified in the book, unfortunately, I'd be interested to hear) are more "important" than what the author believes important things are...

2-0 out of 5 stars The nerd boy who won
So Paul Graham is a successful Lisp hacker who made a lot of money from his start-up. Good for him. To be sure, this earns him some credibility in discussing languages and start-ups. Unfortunately, he takes it upon himself to extrapolate from this single data point to universal laws of what makes you successful. Moreover, he seems to think that his success as a geek entrepreneur somehow lends validity to whatever unsubstantiated thoughts, feelings and prejudices he may cook up, including some completely ridiculous views on the general superiority of geeks over regular people. The only reason so many of his readers seem to accept these views must be that he's preaching to the choir: certainly his geek audience would dearly like them to be true. His arcane and naive notions of art and aesthetics are too embarrassing to even discuss. Oh, and the smugness is just insufferable.

5-0 out of 5 stars Great Product, Great SErvice
I ordered this book a few days ago and it was delivered really quickly, quicker than I had ordered. Thanks szaralex. Love the book, enjoying every moment reading it!! Thank you. ... Read more


4. Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
by Steven Levy
Paperback: 528 Pages (2010-05-20)
list price: US$21.99 -- used & new: US$14.08
(price subject to change: see help)
Asin: 1449388396
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.



Amazon.com Exclusive: The Rant Heard Round the World
By Steven Levy

Author Steven Levy
When I began researching Hackers--so many years ago that it’s scary--I thought I’d largely be chronicling the foibles of a sociologically weird cohort who escaped normal human interaction by retreating to the sterile confines of computers labs. Instead, I discovered a fascinating, funny cohort who wound up transforming human interaction, spreading a culture that affects our views about everything from politics to entertainment to business. The stories of those amazing people and what they did is the backbone of Hackers: Heroes of the Computer Revolution.

But when I revisited the book recently to prepare the 25th Anniversary Edition of my first book, it was clear that I had luckily stumbled on the origin of a computer (and Internet) related controversy that still permeates the digital discussion. Throughout the book I write about something I called The Hacker Ethic, my interpretation of several principles implicitly shared by true hackers, no matter whether they were among the early pioneers from MIT’s Tech Model Railroad Club (the Mesopotamia of hacker culture), the hardware hackers of Silicon Valley’s Homebrew Computer Club (who invented the PC industry), or the slick kid programmers of commercial game software. One of those principles was “Information Should Be Free.” This wasn’t a justification of stealing, but an expression of the yearning to know more so one could hack more. The programs that early MIT hackers wrote for big computers were stored on paper tapes. The hackers would keep the tapes in a drawer by the computer so anyone could run the program, change it, and then cut a new tape for the next person to improve. The idea of ownership was alien.

This idea came under stress with the advent of personal computers.The Homebrew Club was made of fanatic engineers, along with a few social activists who were thrilled at the democratic possibilities of PCs. The first home computer they could get their hands on was 1975’s Altair, which came in a kit that required a fairly hairy assembly process. (Its inventor was Ed Roberts, an underappreciated pioneer who died earlier this year.) No software came with it.So it was a big deal when 19-year-old Harvard undergrad Bill Gates and his partner Paul Allen wrote a BASIC computer language for it. The Homebrew people were delighted with Altair BASIC, but unhappy that Gates and Allen charged real money for it. Some Homebrew people felt that their need for it outweighed their ability to pay. And after one of them got hold of a “borrowed” tape with the program, he showed up at a meeting with a box of copies (because it is so easy to make perfect copies in the digital age), and proceeded to distribute them to anyone who wanted one, gratis.

This didn’t sit well with Bill Gates, who wrote what was to become a famous “Letter to Hobbyists,” basically accusing them of stealing his property. It was the computer-age equivalent to Luther posting the Ninety-Five Theses on the Castle Church. Gate’s complaints would reverberate well into the Internet age, and variations on the controversy persist. Years later, when another undergrad named Shawn Fanning wrote a program called Napster that kicked off massive piracy of song files over the Internet, we saw a bloodier replay of the flap. Today, issues of cost, copying and control still rage--note Viacom’s continuing lawsuit against YouTube and Google.And in my own business—journalism--availability of free news is threatening more traditional, expensive new-gathering. Related issues that also spring from controversies in Hackers are debates over the “walled gardens” of Facebook and Apple’s iPad.

I ended the original Hackers with a portrait of Richard Stallman, an MIT hacker dedicated to the principle of free software. I recently revisited him while gathering new material for the 25th Anniversary Edition of Hackers, he was more hard core than ever. He even eschewed the Open Source movement for being insufficiently noncommercial.

When I spoke to Gates for the update, I asked him about his 1976 letter and the subsequent intellectual property wars. “Don’t call it war,” he said. “Thank God we have an incentive system. Striking the right balance of how this should work, you know, there's going to be tons of exploration.”Then he applied the controversy to my own situation as a journalism. “Things are in a crazy way for music and movies and books,” he said. “Maybe magazine writers will still get paid 20 years from now.Who knows?Maybe you'll have to cut hair during the day and just write articles at night.”

So Amazon.com readers, it’s up to you. Those who have not read Hackers,, have fun and be amazed at the tales of those who changed the world and had a hell of time doing it. Those who have previously read and loved Hackers, replace your beat-up copies, or the ones you loaned out and never got back, with this beautiful 25th Anniversary Edition from O’Reilly with new material about my subsequent visits with Gates, Stallman, and younger hacker figures like Mark Zuckerberg of Facebook. If you don’t I may have to buy a scissors--and the next bad haircut could be yours!

Read Bill Gates' letter to hobbyists

... Read more

Customer Reviews (13)

5-0 out of 5 stars A History Book about Computing
I recently finished reading the Soul of a New Machine which I really enjoyed and overall enjoy these types of history of computing types of books. This takes the next step forward from Soul as that was focused primarily on shipping out one machine this focus on three distinct different eras of computing, both the people who used and the machines.

Overall I really enjoyed this book as an IT professional as it is the single best location of the history of computing. Other reviews go into much greater detail of the time periods and the technology so I wont repeat it here. I'm more echoing what others have said. If this book does sound interesting then I recommend you purchase it without hesitation. You will thoroughly enjoy it. I just wish there was more to it.

5-0 out of 5 stars This was with me from the start!
I read this book when it came out the first time.I was getting ready to my first job as an engineer in Boston during the boom-boom years of hi tech.This book got me really excited about what lay ahead and I wasn't let down a bit.I highly recommend this book to anyone interested in history or the tech culture.I also recommend the book, "Soul of a New Machine" by Tracy Kidder.

5-0 out of 5 stars Brilliant!
Hackers is an absolutely fascinating look at the history of not just computing, but those who made it all happen: the curious college kids of MIT and those who came after who saw computers as more than just computational devices.

Levy weaves an amazing tale of geeks with a passion for using computers as a more than just tools; these kids (and some of them were quite young) fostered a community of information sharing to further the goal of the "hacker ethic." Information should be free and be used to better the individual and improve the use of computers.

Levy skillfully moves from MIT and the east coast, to the next generation of wonderkids in the Berkeley area, where computer technology was first used as an attempt to improve society. As more and more users wished to build their own hardware, Homebrew was formed to aid those in that goal. Homebrew helped launch the most influential wave of personal computing, and resulted in such greats as Woz's Apple computer. Also from this era is the conflict of software (or information) with the hacker ethic. Bill Gates's infamous letter against copying software ushered in a new area of for-profit hacking.

The final portion of the book focuses on computers as forms of personal entertainment, specifically as machines upon which we can play games, and Levy focuses on Sierra On-Line, a once rapidly growing and equally exploding powerhouse in early computer gaming. Here Levy is at his weakest. He fails to delve into coin-op gaming and console gaming as important factors in the drive to bring gaming deeper into the home via computers.

Another failure on Levy's part is, as this is the 25th anniversary edition, a discussion of the open source movement, a direct descendant of the hacker ethic. Had Levy discussed that, his excellent book would have made a wonderful, complete, up-to-date circle.

3-0 out of 5 stars Formatting errors on Kindle
I love this book, and would normally give it five-stars, but I am very disappointed that the table of contents is completely messed up on the Kindle--it only displays one or two lines per page, which makes it unusable. Considering how this edition of the book is being marketed as eBook friendly, it seems like someone at the publishing company would have caught this problem since the formatting errors are visible as soon as the book is opened for the first time.

5-0 out of 5 stars History you will WANT to read
Being a computer geek always felt like a stigma, but after reading about some of the real computer geeks from an age where computers were mystical 'black boxes' and seeing how they created the world that we now live in, I am proud to be a computer geek and Hope that I can live up to the 'Hacker Ethic' ... Read more


5. Hacker's Delight
by Henry S. Warren
Hardcover: 306 Pages (2002-07-27)
list price: US$59.99 -- used & new: US$42.79
(price subject to change: see help)
Asin: 0201914654
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Veteran programmer Hank Warren shares the tricks he has collected from his considerable experience in the worlds of application and system programming. For anyone who wants to create efficient code. Self-directed study. ... Read more

Customer Reviews (15)

5-0 out of 5 stars Comprehensive!
Hacker's Delight really is delightfully comprehensive, not to mention fantastically dense. It's really more of a reference but you can certainly read it from cover to cover... but be prepared to be stalled for hours or days on certain pages if you really want to understand why things work.

Be warned: this book is not an introduction to the subject of bit manipulation. It doesn't explain basic concepts and only falls into prose later in the book; much of it is page after page of mindblowing formulas for every concievable task. Beginners can get through it, but only with serious effort. Although the framework you need to understand bit manipulation is very simple, certain devices come up frequently in code examples, but take awhile to grasp for the uninitiated.

Above all this is a very entertaining -see how many pages you can read without grinning at the magic- and thorough compilation of fascinating little tricks and algorithms. It probably won't be very useful to a Java programmer or "software engineer", but in any case it's good to expand your thinking. If you appreciated HAKMEM, you must get Hacker's Delight!

5-0 out of 5 stars Bit-banger's delight. More fun than a barrel of monkeys.
If you find delight in the optimization of code--and you SHOULD--this is the book for you.

The book contains a great collection of techniques and tricks for highly efficient numerical programming.
Great read.

5-0 out of 5 stars This is a fantastic book!
I have a virtual calculator called the DIY Calculator that accompanies my own book "How Computers Do Math" The Definitive Guide to How Computers Do Math : Featuring the Virtual DIY Calculator.

I recently added a "Conundrums, Puzzles, and Posers" section to the "Programs and Subroutines" page on my DIY Calculator website ([...]) and I've started to build a collection of simple puzzles for people to play with.

One of the first problems I posed was to count the number of ones in the 8-bit accumulator and to present the result as a binary value. I thought I had discovered the best-possible solution, until someone pointed me in the direction of the "Hacker's Delight". (In this context, "Hacker" refers to a hero who is manipulating code; not a nefarious rapscallion who breaks into other people's computer systems.)

I immediately ordered a copy from Amazon, and took delivery just yesterday as I pen these words. This book is fantastic - I kid you not - on the first page of Chapter 2, for example, I discovered at least five or six capriciously clever tricks that blew my solutions out of the water!

I highly recommend this book.

5-0 out of 5 stars Absolute essential
This book is an absolute essential to the right reader. That right reader is either a low-level coder, a high-level logic designer, or someone who builds tools and libraries for same. In other words, not a lot of people. This is hacking at its bit-level finest, though. If you're among those few, or think you might be, or want a good laugh at the people who are, dig in.

It's good for things like counting the number of 1 bits in a word-length integer (hint: if you count the bits, you're doing it the hard way). It's good for things like fast division by an integer constant, or mod to a constant integer modulus (hint: if you perform division by dividing, you're barking up the wrong tree). If you can look into a 32x32 bit multiplication and see a convolution going on, you're way ahead of the game. The only tricks I know that didn't appear here are A) for purposes that almost no one has or B) for machines that almost no one has.

Warren presents the coolest collection of slimy coding tricks ever collected, with full attention to the number of machine cycles and the compiler-writer's unique needs. I've seen a lot, and this is by far the biggest and coolest collection around. I have two complaints, though, a small one and a really big one. The small one is that the author didn't score a direct bullseye on my somewhat offbeat needs. Well, he never tried to - that's just me griping that he didn't write a different book. The big complaint is that pages, lots of them, just fluttered out of this pricey book and onto the floor. GRRR. This takes nothing away from the content of the book, until some critical page flutters off never to be seen again. Still, if you can keep a rubber band around it, this will be one of the deepest mines of coolness in your uber-geek library.

//wiredweird

5-0 out of 5 stars Fun, interesting and useful
My first introduction to binary operators wizardry was in a 1st year, 1st semester course in Digital Systems at the Technion, IIT. I thought it was fun. While I was trying to write a computer program to compute Karnaugh Maps for me, I run into performance problems, and then some binary hackery helped me get back on the horse.

Since then, whenever I come across some binary trick I write it down with a few examples of usage and sometimes with some reasoning why it works.

Then came "Hacker's Delight" and I felt compelled to buy it.

I wasn't disappointed at all! Not only it contained all of the tricks that I have collected, but also it contains a lot more in depth examples of how these tricks can come in handy when trying to squeeze performance from an implementation or save a few more bytes and bits.

The book also gave me a fresh perspective on the implementation of some well known algorithms with the twist of binary arithmetic. This was very enlightening.

I read the "BASICS" chapter (chapter 2) with a single breath of air, and just couldn't leave it down. Not only it was nice to have all these tricks summarized in one book, but also I liked some of the reasoning and the "so-called" proofs.

Remaining chapters were, as I mentioned before, a fresh look for me on known algorithms. This fresh look was through the glasses of binary arithmetic.

I'd recommend this book to anyone who feels comfortable with binary arithmetic and/or computer organization -- even just for the fun of it!

I'd recommend the book to developers who don't necessarily have a sympathy to this topic, but would like a Copy&Paste solution to some problems they have to tackle.

I really enjoyed reading this book, and I will probably reference it from time to time. ... Read more


6. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
by Dafydd Stuttard, Marcus Pinto
Paperback: 768 Pages (2007-10-22)
list price: US$50.00 -- used & new: US$27.38
(price subject to change: see help)
Asin: 0470170778
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools. ... Read more

Customer Reviews (16)

5-0 out of 5 stars An essential handbook for web hacking
In my opinion this is the essential handbook for web hacking.I've spent years doing web application pen tests and this book has always been on my desk as a valuable reference while hacking web sites (legally, of course), and writing reports.I highly recommend this book as an excellent source of information about website insecurities, how to defend web apps, and how to systematically compromise web sites.Also recommended is Burp Suite Professional which I have time and time again found invaluable.

5-0 out of 5 stars Serious candidate for Best Book Bejtlich Read 2009
The Web Application Hacker's Handbook (TWAHH) is an excellent book.I read several books on Web application security recently, and this is my favorite.The text is very well-written, clear, and thorough.While the book is not suitable for beginners, it is accessible and easy to read for those even without Web development or assessment experience.

At 736 pages, TWAHH is the sort of book that one needs to read more than once in order to digest its contents.At every turn I perceived the authors to be experts and I trusted their advice.Their "Hack Steps" sections nicely summarize key points for operators.The authors integrate explanations of HTTP as a protocol into their text, without boring readers already familiar with the protocol.They also also demonstrate their subject using code snippets for multiple languages and products.

While I considered almost all of the book to be equally helpful, I'd like to mention three specific chapters or sections.First, chapters 1-3 provided a great technical overview of the subject.Chapter 11, Attacking Application Logic, featured examples from the authors' consulting experience which really resonated with me.Finally, I liked the recognition of the importance of locally-written applications, called "bespoke" applications, in chapter 13.

I struggled to find much to complain about in TWAHH.My only concern appeared early in the book, when the authors talked about "all user input is untrusted."They really meant "all user input is untrustworthy," or they should have said "Web developers should consider all user input to be untrusted, but they often trust it."The difference between "untrusted" and "untrustworthy" is subtle, and I still understood the authors' point.

I strongly recommend TWAHH to anyone with a role in defending Web applications.The authors have set a very high standard with this book.Great work!

5-0 out of 5 stars Most Important Internet Security Book Available!!!
Not for the faint of heart kiddie scriptors.
This book actually shows just how vulnerable the Web really is and that it in fact is sometimes futile to hope for real security.
With that said though it also shows you what to be on the lookout for and how to make things MORE secure than you already may be.

It's a lot to absorb for those of us who have had no formal training but it's imperative that if you are even considering a career in computer repair/security or anything to do with the IT field, you'd better have this book on hand in your library of tools.

It takes you from Web design flaws to HTML bypasses to failures in the design of Operating Systems and that includes ALL OS's. Just because you're using a MAC don't think that you're really any more secure than any other OS. It's a book that will take several weeks to months to get through but you will be forever wiser for having invested the time in it.

An absolute must have!

4-0 out of 5 stars Perfect for auditors, less useful for developers
I was hoping that this book would give me a clear conception of how to secure my web applications against potential attackers. It did, but only peripherally. Many of the book's pages are dedicated to hands-on examples of using tools to discover and exploit vulnerabilities. This also means that it's obsessed with the flaws in yesterday's technologies (e.g. older versions of ASP) that I would never touch for a new app.

Still, if you're developing a web application, this book is worth at least skimming through. And if you're in charge of patching up a legacy system, this should be your bible.

4-0 out of 5 stars Great reference
Great book.The beginning has some good explanation of how web apps are constructed.This section is a little tedious if you already know this material, but it is a good review, none the less.The rest of the book is an explanation of web application exploits.I particularly like the review questions at the end of each chapter.Also, be sure to play with the tools cited in the book. ... Read more


7. Rules for Writers
by Diana Hacker
 Paperback: Pages (2011-07)
list price: US$37.65 -- used & new: US$37.65
(price subject to change: see help)
Asin: 0312647360
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Rules for Writers succeeds because it has always been grounded in classroom experience. By looking at her own students needs, Diana Hacker created an affordable and practical classroom tool that doubles as a quick reference. Developed with the help of instructors from two- and four-year schools, the sixth edition gives students quick access to the information they need to solve writing problems in any college course.In the Hacker tradition, the new contributing authors — Nancy Sommers, Tom Jehn, Jane Rosenzweig, and Marcy Carbajal Van Horn have crafted solutions for the writing problems of today s college students. Together they give us a new edition that provides more help with academic writing and research and one that works better for a wider range of multilingual students. Flexible content options in print and online allow students to get more than they pay for. ... Read more

Customer Reviews (24)

5-0 out of 5 stars Great price
This is a college book that my son needed.Got it here for over $30 less than at the school bookstore.I always either look on Amazon to buy or rent their books!

5-0 out of 5 stars Rules for Writers
Received the book as promised. I do not like this class but the book is great. would recommend this site to others.

5-0 out of 5 stars The history of my review
I bought the book and now I have it. With much gratitude, I thank the seller. May we all shine with the sun.

2-0 out of 5 stars Feminism has no place in such a book
This book has some good information in it but it was a turn off when the author deals with gender and pronouns.She correctly states that to use "they" when referring to a singular person is incorrect.She advocates that singular pronouns also be avoided when the person to which it refers is unknown.She states that the use of the masculine pronoun in such cases is "offensive".This is a change in the rules of English grammer.She has allowed her feminist views to influence the book.I found this book distastful for this reason because I don't like this kind of propaganda and especially dislike the use of this book as a vehicle to promote the feminist agenda.

4-0 out of 5 stars Brand New
Even though I have not use it once yet, I will be benefit from it for more than years. Customer satisfaction seems guaranteed. ... Read more


8. CEH Certified Ethical Hacker Study Guide
by Kimberly Graves
Paperback: 432 Pages (2010-04-26)
list price: US$49.99 -- used & new: US$26.62
(price subject to change: see help)
Asin: 0470525207
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Prepare for the new version of CEH certification with this advanced guide

Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice.

  • Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
  • Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
  • Includes a CD with review questions, bonus exams, and more study tools

This is the ideal guide to prepare you for the new CEH certification exam.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file. ... Read more

Customer Reviews (4)

4-0 out of 5 stars CEH Certified Ethical Hacker Study Guide
The book was in exactly the same shape and condition as it was advertised on Amazon website. I am very happy with the order. Some of my local Security group users are studying for the CEH exam and we have a study group where we review the chapters from this book every week. It's a great book if you want to get into application security testing arena. One thing I would like to see in the next edition of the book is more details on the topic. Right now, the chapters are a bit concise compared to the some other books published on the same topic. Overall, this book is a great addition to resources on Security testing and CEH topic.

5-0 out of 5 stars Highly recommended!
Certified Ethical Hacker Study Guide covers all exam objectives for CEHv6, includes real-world scenarios and exercises, and pairs this with exam prep software featuring the entire book in pdf and electronic flashcards. The result is a powerful pick for any studying for the CEHv6 who wants a clear do-it-yourself home classroom in a book. Highly recommended!

5-0 out of 5 stars Well done and a good read
I managed to read this book very quickly (2 nights) and found it rather enjoyable. The materials were very well covered within the confines of the CEH exam. This was my primary reference material for the CEH, which I passed. If you DON'T have any previous networking and INFOSEC experience, I would recommend additional study elsewhere.

5-0 out of 5 stars Super book!
This is a super book!It nicely rounds out required topics for the latest EC-Council exam!It's also a very nice complement to the Review Guide.I highly recommend this book to all who are embarking down the CEH path and need further insight into the diverse topics that candidates must master. ... Read more


9. Writer's Reference 6e & MLA Quick Reference Card
by Diana Hacker, Barbara Fister
Plastic Comb: 488 Pages (2006-11-23)
-- used & new: US$79.00
(price subject to change: see help)
Asin: 0312465319
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan

Customer Reviews (12)

5-0 out of 5 stars concise reference guide
A few years ago I purchased two copies of Diana Hacker's "A Writer's Reference" second edition.It can now be purchased for a couple of dollars.I gave a copy to each set of grandchildren, some of whom were in elementary school. Diana Hacker's books are great for students of any grade level. Yes you can get the same info off the internet but it is so much easier to have all the information at your finger tips.We just purchased "The Writer's Reference" 6th edition for our grandson who has just entered college.

4-0 out of 5 stars Revised statement
Thank you for your prompt response, I appreciate what you did for me. I truly hope that I do receive the book soon. Thank you again, and I will do business with you in the future. This is an up-date to my response,,,I have received my book, and I am very, very pleased. Thank you very, very much.

5-0 out of 5 stars Great resource in one book!
This book is what I have been desperately seeking, one book that answers the majority of questions about basic styles, structure, grammar, punctuation, quotations, adverb usage, adjective usage, and more.Whenever I need assistance, I refer to this book by looking in the index first, going to the reference section (on point and short), and reading the section that quickly answers my questions. Highly recommend this book for professionals who want to ensure their communication is accurate and do not have much time to read a whole book on grammar, punctuation, and the like.Nice thing about this book is that it is spiral bound and can lay flat.

I used to use the classic, Strunk and White, "The Elements of Style," but this book is more thorough and offers more information.Recommend it without being disappointed.

4-0 out of 5 stars A Writer's Reference 6th Edition
This book should be a staple in every serious writer's library!!! Although I'm familiar with most of the information, I still found several bits of helpful info within the pages. I highly recommend this book for ALL writers.

5-0 out of 5 stars Necessity
Writer's Reference 6e & MLA Quick Reference Card
An absolute necessity for any college student!!! ... Read more


10. Higher Education?: How Colleges Are Wasting Our Money and Failing Our Kids---and What We Can Do About It
by Andrew Hacker, Claudia Dreifus
Hardcover: 288 Pages (2010-08-03)
list price: US$26.00 -- used & new: US$16.02
(price subject to change: see help)
Asin: 0805087346
Average Customer Review: 3.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

What's gone wrong at our colleges and universities—and how to get American higher education back on track 

A quarter of a million dollars. It's the going tab for four years at most top-tier universities. Why does it cost so much and is it worth it?

Renowned sociologist Andrew Hacker and New York Times writer Claudia Dreifus make an incisive case that the American way of higher education, now a $420 billion-per-year business, has lost sight of its primary mission: the education of young adults. Going behind the myths and mantras, they probe the true performance of the Ivy League, the baleful influence of tenure, an unhealthy reliance on part-time teachers, and the supersized bureaucracies which now have a life of their own.

As Hacker and Dreifus call for a thorough overhaul of a self-indulgent system, they take readers on a road trip from Princeton to Evergreen State to Florida Gulf Coast University, revealing those faculties and institutions that are getting it right and proving that teaching and learning can be achieved—and at a much more reasonable price.

... Read more

Customer Reviews (38)

1-0 out of 5 stars Simplistic
Hacker suggests that the high percentage of Missourians who fail to graduate from a four-year college or university arises from shortcomings among faculty.He may in part be right.

Other explanations are possible as well:the pervasive anti-intellectualism of Missouri is one.Students and parents value certification to be sure, but a high school diploma in Missouri does not guarantee that the graduate can write a literate sentence or solve a simple equation.By mandating that almost everyone graduate from high school, Missourians assure that a good manyhigh school seniors go on to university with poor training and often unrealistic expectations of what they need to know and to do to succeed in college. Many state universities, moreover, have such absurdly low entrance requirements that a large number of academically deficient students with little chance of success are admitted.

5-0 out of 5 stars Finally!
Full of insights, humor, and good advice, the authors have finally given shape to an increasing uneasiness many of us have felt about higher education over the past few decades.This book describes how post-high school education got sidetracked from its original goals and reshaped into a self-perpetuating group of institutions with little interest in students' actual learning.If you know somebody in high school or college, or if you are curious how lofty ideals can crumble under bureaucracy, please read this wonderful book.

3-0 out of 5 stars Excellent in some sections, simplistic in others
This is an interesting, opinionated, anecdotal study of the current plight of our colleges and universities.I agree with about 80% of it, but disagree with some of its crucial elements.Education is indeed too expensive and far too much of its budget goes to `amenities' like luxury dorms, exercise facilities with rock climbing walls, professionalized athletics, and so on.The `top' institutions are not always providing value for dollar while many public, regional, and little-known institutions are.

The criticism, however, comes with a very broad brush.I would not, e.g., do away with tenure, because tenure is a form of compensation and salaries would probably be higher without it, so the efficiencies sought might not be recouped.I agree with the authors that tenure is largely unnecessary for protecting academic freedom; meanwhile, the contingent faculty's academic freedom is not being protected in that manner, since they're not on the tenure track.Tenure, however, helps protect faculty from their colleagues.For example, when I was deaning I once had a department chair try to force a senior colleague into early retirement.Why?Because he graded too rigorously and was (the chair claimed) hurting the feelings of his students.When two of us (another dean and I) looked at examples we were heartened to learn that the senior faculty member in question was grading accurately, fairly and in a helpful (i.e. an honest) manner.The department wanted somebody more soft, more politically correct, more touchy/feely.The presence of tenure also protects disciplines from corporatist deans and senior administrators.In the current, commercialized university (which I deplore along with the authors) there are many administrators who would quickly dissolve Classics departments, e.g., and put something vocational in their place.Once a few of those events occurred, students would stop studying Classics at the graduate level.There is continuing student interest in Classics but a sudden blip in enrollments is all that a corporatist administrator would need to take out the long knife.Tenure helps us in this regard and protects education (as opposed to training).

The authors also inveigh against research.There is no question that much `research' is white noise, but the answer is not to say (as the authors do), that `if a faculty member wants to write a book he can do it on the weekends.'Check out Jonathan Cole's book defending research universities and specifying all of the inventions, medicines and procedures that originated there.We all have moments of frustration with trivial research and inactive `researchers', but that should not lead us to damn all research, across the board.Also, one of the principal features of our higher education institutions is that one size does not fit all.There is a place for research institutions and students there can have very special experiences.

One of the huge failings of contemporary higher education is the erosion of general education and the teaching of core curricula (if at all) through the use of adjuncts and graduate assistants.At many of our institutions (especially those at the `top') students can graduate without studying crucial areas of human experience while remaining ignorant of fundamental human knowledge.I am surprised that the authors did not spend much more time on this issue.

The book is strong in its facts, its statistics and in its anecdotes.I love anecdotes in general and I love many of the authors' anecdotes in particular.Good anecdotes speak to major issues and that is how many of the anecdotes here function.On the other hand, anecdotes may not be representative of larger issues.In the `ten of our favorite schools' section, some of the anecdotes are limited in the extreme.The authors visit a campus, meet some people they like and conclude that that institution would be a good place in which to enroll.As I'm sure the authors know, every campus includes both heroes and villains, the inspirational and the embarrassing.

The book is lively, lucid and `personal' in the best sense of the word, but like the `anecdotal', the `personal' is not always a good indicator.For example, the authors praise my undergraduate institution, Notre Dame, and list it among their ten faves, for being faithful to its principles.The main example: inviting President Obama to speak, despite his stands on abortion (including support for partial-birth abortion).As the authors must know, many of the Notre Dame alumni have seen that decision as a failure to be faithful to the institution's principles.Faithfulness is sometimes in the eye of the beholder.

The book has tended to evoke diametrically-opposed responses, with some people loving it and others dismissing it.As I said, I liked about 80% of it, but found parts to be simplistic.I do think we need more analysis here and more suggestions of ways to address concrete problems.Some of this book reads like the work of academic gadflies who have the courage to speak truth to corporatist power.Other sections read like the musings of a small town editorial writer.

2-0 out of 5 stars Lots of interesting facts, but not a thoughful analysis
In fact, this book does not offer any analysis. The authors have compiled a lot of interesting facts about many problems in today's colleges. They surely made me think a lot. However, their conclusions are shallow and unsubstantiated. I am especially surprised that they say there should be no research in universities, and then all they have to say about why are a couple of stories. This happens many times in the book. They come with some bold opinions but don't even try to explain why we should believe them. You don't need to understand those sentences to see which ones they are, they are the ones that start with "We...".

I find this style insulting.

I had many points of criticism in mind but they are contained in Wanda B. Red's review above.

I have two small things to add to that review:
- The authors compare the yearly wages of full professors to salaried lawyers and find that full professors have higher wages. The median age of full professors in the US is 55. I couldn't find the same statistic for salaried lawyers, but I doubt it is the same or more. What are they trying to say by this comparison anyway? Is comparing to 'salaried' lawyers the standard way of measuring wealth?
-The authors keep talking about how the graduate students are being exploited. Where I am doing my graduate studies, I have to do 4 hours of teaching per week. It comes to about 12 hours per week of teaching related work including the grading and the preparation. In return I get a wage that I can live with and have time and resources to pursue the research projects I aspire to complete together with the experts who work here. It seems like a good deal to me.

5-0 out of 5 stars the question of standards
This is a first rate book that covers a lot of ground. For me more than any thing else it is the failure of colleges to maintain any real academic standards that is the tragedy. I worked in academia for twelve years and I once had a professor tell me that a failing student once said to him"you have to pass me. I'm paying you to do it." Colleges are no longer institutions of "higher" learning. They are for profitbusinesses. ... Read more


11. Pocket Style Manual: Updated With Mla's 1999 Guidelines
by Diana Hacker
Paperback: Pages (1999-03)
list price: US$14.95 -- used & new: US$68.60
(price subject to change: see help)
Asin: 0312247524
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Covers clarity, grammar, usage, puntuation and mechanics, as well as common ESL problems and MLA and APA documentation. The book includes hand-edited examples that show students how to correct errors. ... Read more

Customer Reviews (48)

4-0 out of 5 stars Hacker Pocket Manual
This Quick Guide is really helpful.My purchase went to my son who has returned to school, and it goes with his PC everywhere.Now I would like one!

1-0 out of 5 stars Pocket Manual
This product took a month longer to get to me than it should have. I was supposed to receive it within a week and it took five. The manual is not in horrible condition, but I will only say that it is usable.

4-0 out of 5 stars Full of helpful information
I am a college student and find this manual incredibly helpful.I found some of the descriptions in the grammar sections to be a little confusing with the way they were explained, but usually the examples helped to make things clearer.The section on the paper formatting is incredibly helpful, especially when it comes to explaining the different ways to cite sources in the works cited section of a paper.I will hold onto this book and use it to help me write papers for the rest of my college career.

5-0 out of 5 stars Perfect
The book came in days before I expected it in perfect condition! I appreciated the fast servicing of my order.

1-0 out of 5 stars Stay away from this seller
Ordered a book for school on August 15th -- supposedly in stock and given an estimated delivery date of August 20th -September 7th.

School started on September 6th -- two emails sent to seller last week and NO RESPONSE.Status still notes no shipping information.

I AM CANCELLING THIS ORDER !!!! ... Read more


12. Hacker & Moore's Essentials of Obstetrics and Gynecology: With STUDENT CONSULT Online Access (Essentials of Obstetrics & Gynecology (Hacker))
by Neville F. Hacker MD, Joseph C. Gambone DO, Calvin J. Hobel
Paperback: 496 Pages (2009-02-04)
list price: US$59.95 -- used & new: US$43.91
(price subject to change: see help)
Asin: 1416059407
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Get guidance on evaluation, diagnosis, and management of a wide range of obstetric and gynecologic disorders from the most comprehensive and concise reference on the subject. The 5th Edition of this popular and practical resource features additional clinical photos and material on vaccination and disease prevention. The full-color design with illustrations and photographs complement the text. Access the full text online, along with an additional image gallery, case studies, and online note-taking via Student Consult for a better learning experience.

  • Features a full-color design and images for a visually accessible guide that easily correlates to actual clinical experience.
  • Delivers must-know information efficiently and effectively through a concise, clear writing style.


  • Features a chapter on vaccination and disease prevention and origin for increased clinical focus and utility.
  • Incorporates more clinical photographs for a clearer visual presentation of clinical applications.
  • Reflects changes in the APGO/CREOG objectives through updated content.
... Read more

Customer Reviews (1)

5-0 out of 5 stars HELP PLEASE
CAN SOMEONE PLEASE POST HERE ON HOW THIS BOOK COMPARES TO Blueprints OBGYN? I flipped through this book and I REALLY like it (illustrations and language are great), but I am hesitant because there are no reviews on it yet.would really appreciate your input! ... Read more


13. Official Certified Ethical Hacker Review Guide
by Steven DeFino, Barry Kaufman
Paperback: 384 Pages (2009-11-09)
list price: US$31.95 -- used & new: US$13.61
(price subject to change: see help)
Asin: 1435488539
Average Customer Review: 3.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Get ready for the latest Certified Ethical Hacker exam with the only book authorized by the creators of the certification, EC-Council! This book covers all of the various areas of the very challenging Certified Ethical Hacker (C|EH) exam version 6.1, and includes hundreds of review questions in addition to refresher coverage of the information needed to successfully become a Certified Ethical Hacker. Including helpful at-a-glance quick reference boxes and tables, summaries, review questions and answers, tutorial information and more, this resource is at once succinct and comprehensive. With over 70 Try It Out exercises and challenges, plus assignments that guide the C|EH learner to additional study materials, this book is not just an exam preparation tool. This book helps prepare future Certified Ethical Hackers to proactively protect their organization's systems from malicious hackers. It strengthens readers' knowledge that will help them successfully assess and analyze computer system weaknesses and vulnerabilities ? so they can most effectively safeguard the organization's information and assets. This is the ideal resource for anyone looking to refresh their skills in this area, learn more about ethical hacking, or successfully pass the certification exam and become a Certified Ethical Hacker. ... Read more

Customer Reviews (1)

3-0 out of 5 stars Helpful, brief review book
Helpful, brief review. Maybe a little bit too brief. Helps you stay focused on main exam issues. ... Read more


14. The Hacker Crackdown: Law And Disorder On The Electronic Frontier
by Bruce Sterling
Mass Market Paperback: 336 Pages (1993-11-01)
list price: US$7.50 -- used & new: US$4.13
(price subject to change: see help)
Asin: 055356370X
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings. Reprint.Amazon.com Review
Bruce Sterling's classic work highlights the 1990 assault onhackers, when law-enforcement officials successfully arrested scoresof suspected illicit hackers and other computer-based law-breakers.These raids became symbolic of the debate between fighting seriouscomputer crime and protecting civil liberties. However, The HackerCrackdown is about far more than a series of police stingoperations. It's a lively tour of three cyberspace subcultures--thehacker underworld, the realm of the cybercops, and the idealisticculture of the cybercivil libertarians.

Sterling begins his storyat the birth of cyberspace: the invention of the telephone. We meetthe first hackers--teenage boys hired as telephone operators--who usedtheir technical mastery, low threshold for boredom, and love of pranksto wreak havoc across the phone lines. From phone-related hi-jinks,Sterling takes us into the broader world of hacking and introducesmany of the culprits--some who are fighting for a cause, some who arein it for kicks, and some who are traditional criminals after a fastbuck. Sterling then details the triumphs and frustrations of thepeople forced to deal with the illicit hackers and tells how theydeveloped their own subculture as cybercops. Sterling raises theethical and legal issues of online law enforcement by questioning whatrights are given to suspects and to those who have private e-mailstored on suspects' computers. Additionally, Sterling shows how theonline civil liberties movement rose from seemingly unlikely places,such as the counterculture surrounding the Grateful Dead. TheHacker Crackdown informs you of the issues surrounding computercrime and the people on all sides of those issues. ... Read more

Customer Reviews (43)

4-0 out of 5 stars Still interesting today
While being quite old, this book can still be an interesting read today if you are interested in the early days of the Hacker movement as we know it today or have fond memories of the time yourself. Sterling tries to give us the complete picture, from the Hacker underground, over the Telcos and law enforcement to the back then newly founded EFF and other electronic civil libertarians. If you have ever read an issue of Phrack or 2600, spent countless hours on old-school BBS's or still remember the internet before the world wide web became popular, this will also be a fun trip down memory lane.

5-0 out of 5 stars One of the best historical "hacker scene" accounts
Bruce Sterling's book The Hacker Crackdown (THC) captures the spirit and history of the "hacker scene" in the late 1980s and early 1990s.Having lived through that period with my C-64 and first 386 PC, I thought the author accurately describes what it was like for computer users during that era.THC is one of my favorite books on hacker activity because it combines a narrative with the author's accounts of interactions with key individuals.THC expertly tells several stories from multiple perspectives -- hacker, law enforcement, security professional, telecom operator, even homeless man-on-the-street!The author also manages to not offend technically-minded readers while describing material for non-technical audiences.

I found the last line of the book to be especially prescient: "It is the End of the Amateurs."This statement applies to offensive as well as defensive players in digital security.Consider the focus of THC: the hunt by law enforcement officials for, essentially, bit players in the digital underground.The offenders were basically joyriders (who no doubt caused plenty of headaches for security professionals) who didn't materially profit from their actions.The offenders also did not serve foreign masters for purposes of espionage.On the other side, many of the defenders were only discovering digital crime and pioneering incident response tradecraft in the heat of battle.In brief, THC is about amateur offenders vs amateur defenders.For the last five to ten years, digital security has been almost strictly a matter of professional offenders (criminal and state-sponsored) vs professional defenders (corporate, military, and improved law enforcement).

The bottom line is that anyone involved with digital security will enjoy reading The Hacker Crackdown.

4-0 out of 5 stars good story
its a great book at first its a little boring but after passing chapter2 its starts to get alot faster and better,i picked it up because iv been a computer geek since i was 8 and literature like this is good to know.must buy,plus it has a cool looking cover

4-0 out of 5 stars Good book
This is a good book. I took it to mexico with me and read it on the beach.

5-0 out of 5 stars Essential reading on computers, freedom and privacy.
Bruce Sterling of Cyberpunk fame takes a journalistic approach to researching law and disorder on the electronic frontier by examining two specific events in depth : the 1990 Operation Sundevil, a concerted nationwide effortby district attorneys, the Secret Service, the FBI, local authorities and various Telco security to bust and publicize a hacker crackdown; and the resulting trials and creation of the Electronic Frontier Foundation and rise of the civil libertarians.

The book is divided into four parts: crashing the system, the digital underground, law and order, and the Civil Libertarians. Mr. Sterling does a credible job explaining the telco systems and motivations and actions of the people on both sides of the issue - phone phreaks/hackers and law enforcement/district attorneys without succumbing to a lot of jargon or taking sides.

The book is replete with interesting accounts of Alexander Graham Bell and history of telephony, the origins of the Secret Service and its' early battles with "Boodlers", and the dissemination of the E911 document that came to cause grief to many people.

Reading this in 2006 and beyond will cause a few chuckles at his penchant for describing and drooling over advance systems (I have a real urge to drive down to the storage unit for my Commodore 64 and IBM clone), yet the events of the early hacker sub-culture remain relevant to anyone interested in computers, freedom and privacy. ... Read more


15. The Database Hacker's Handbook: Defending Database Servers
by David Litchfield, Chris Anley, John Heasman, Bill Grindlay
Paperback: 500 Pages (2005-07-14)
list price: US$50.00 -- used & new: US$16.30
(price subject to change: see help)
Asin: 0764578014
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.

In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know

Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download. ... Read more

Customer Reviews (7)

4-0 out of 5 stars Coverage of many databases, but not as coherent as it should be
The Database Hacker's Handbook (TDHH) is unique for two reasons.First, it is written by experts who spend their lives breaking database systems.Their depth of knowledge is unparalleled.Second, TDHH addresses security for Oracle, IBM DB2, IBM Informix, Sybase ASE, MySQL, Microsoft SQL Server, and PostgreSQL.No other database security book discusses as many products.For this reason, TDHH merits four stars.If a second edition of the book addresses some of my later suggestions, five stars should be easy to achieve.

The first issue I would like to see addressed in a second edition of TDHH is the removal of the 60 pages of C code scattered throughout the book.The code is already provided on the publisher's Web site, and its appearance in a 500 page book adds little.The three pages of characters (that's the best way to describe it) on pages 313-315 in Ch 19 are really beyond what any person should be expected to type.

The second issue involves general presentation.Many chapters end abruptly with no conclusion or summary.Several times I thought "Is that it?"Chapters 2, 5, 7, 10, 13, 15, 18, 21 and 22 all end suddenly.The editor should have told the authors to end those chapters with summaries, as appear in other chapters.On a related note, some of the "chapters" are exceptionally short; Ch 9 and 12 are each 3 pages, for example.Chapters that short are an indication the book is not organized well.

The final issue involves discussion of various databases.I preferred the "Hacking Exposed" style of the 2003 book SQL Server Security, which included Dave Litchfield and Bill Grindlay as co-authors.That book spent more time introducing the fundamentals of database functions before explaining how to break them.For example, more background on PL/SQL would be helpful.With 60 pages of code removed, that leaves plenty of room for such discussion in the second edition.

On the positive side, I thought TDHH started strong with Ch 1.The Oracle security advice was very strong.I thought the time delay tactic for extracting bit-by-bit information from the database was also exceptionally clever.

Although I have not read it, I believe Implementing Database Security and Auditing by Ron Ben Natan might be a good complement to TDHH.Natan's book appears to take a functional approach, whereas TDHH takes a product-specific approach.The drawback of the product-centric approach is repetition of general security advice, such as enabling encryption, disabling default accounts, etc.

At the end of the day TDHH is still a revealing and powerful book.Anyone responsible for database security should refer to the sections of the book covering their database.I also recommend keeping an eye on the Next Generation Security Software Web site for the latest on database security issues.You should also see the authors speak at security conferences whenever possible.

5-0 out of 5 stars Just as good as I expected
So, there I was. I was about to buy a new book and I really had to think hard about what to buy - after reading The Shellcoders Handbook, I was really interested in grabbing a copy of this book, in the end, that's exactly what I did.

I am happy with my decision to the fullest extent. Not only was it a great brother to The Shellcoders Handbook, but it was also just good reading in general. It covers seven of the most popular databases around, and each section of the book goes over it's history, it's flaws, how to propogate after a successful exploit, and finally how to lock down your database. You'd be suprised at how easily and how asinine some of the flaws found in database servers are - it's almost laughable, some of the flaws that many servers have been prone to are ridiculous.

The book, like it's brother, covers information that is somewhat dependent on context, but the general concepts you will see and learn are going to remain relevent to all types of research related to the topic at hand for a long time to come.

If you own the Shellcoders Handbook -- or even if you don't --, you should not at all miss on this, The Database Hacker's Handbook: Defending Database Servers is something security enthusiasts everywhere should have on their shelfs.

5-0 out of 5 stars Dave is amazing!
Wow - I had to have this book. They are right, he explains everything wrong with Oracle and all about vulnerabilities and exploits.

5-0 out of 5 stars Important Book For Database and Security Admins
David Litchfield is arguably the foremost expert and evangelist when it comes to database security. He, and his team of compatriots from Next Generation Security Software, have written a book that any database or security administrator should be familiar with.

Even if some of the attacks or exploits described in the book were previously obscure or unknown, the fact that they have been outlined in this book means that administrators need to know about them and defend against them before the "bad guys" read this book and take advantage of them.

One of the best aspects of this book is the way it is organized. Splitting the book into sections devoted to specific database systems makes it exceptionally simple and convenient to use. If you only use MySQL, you can skip all of the information regarding Oracle or Microsoft SQL Server, and just focus on the section of the book that applies to you.

Within each section, the authors provide a tremendous wealth of knowledge. Aside from describing weaknesses, potential exploits and protective measures to defend against them, they also look at the general architecture and the methods of authentication used by the database.

Any database admin should have a copy of this on their desk.

5-0 out of 5 stars Attacking Database Servers
This review is only for the Oracle parts of the book.

The most interesting chapter is "Attacking Oracle". These guys give phrase "thinking outside of the box" the real meaning. They look for a feature or bug open to the security attack, then they shake it til it breaks. You will see exploits of AUTHID, PL/SQL injections, app. server, dbms_sql.parse bug,... most of them relevant to 9i and 10g versions.

The hacks are mainly in the sections called "Real-World Examples". Most of the exploits are already patched by Oracle and they are also available on hacking forums, but there were some new ones that were quite a revelation.

The security recommendations in the "Securing Oracle" chapter were too general, you can probably find Internet white papers on hardening Oracle that give more details. But, this book is not really about hardening Oracle, even if it says "Defending Database Servers" with small, blue letters on the front cover. This book is about attacking database servers.

I have seen David Litchfield's previous work and I am sure he knows (and has tried) more than what is written here. Can we expect to see that in "The Hacker's Handbook" part II? ... Read more


16. The Hacker Diaries : Confessions of Teenage Hackers
by Dan Verton
Hardcover: 219 Pages (2002-03-26)
list price: US$24.99 -- used & new: US$4.20
(price subject to change: see help)
Asin: 0072223642
Average Customer Review: 3.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
To many who knew him, there was nothing odd about him. He was a normal kid...

On February 7, 2000, Yahoo.com was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, Buy.com was battling a massive denial-of-service attack. Later that afternoon, eBay.com also reported significant outages of service, as did Amazon.com. Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis mode...all thanks to an ordinary fourteen-year-old kid.

Friends and neighbors were shocked to learn that the skinny, dark-haired, boy next door who loved playing basketball--almost as much as he loved computers--would cause millions of dollars worth of damage on the Internet and capture the attention of the online world--and the federal government. He was known online as "Mafiaboy" and, to the FBI, as the most notorious teenage hacker of all time. He did it all from his bedroom PC. And he's not alone.

Computer hacking and Web site defacement has become a national pastime for America's teenagers, and according to the stories you'll read about in The Hacker Diaries--it is only the beginning. But who exactly are these kids and what motivates a hacker to strike? Why do average teenagers get involved in hacking in the first place? This compelling and revealing book sets out to answer these questions--and some of the answers will surprise you. Through fascinating interviews with FBI agents, criminal psychologists, law-enforcement officials--as well as current and former hackers--you'll get a glimpse inside the mind of today's teenage hacker. Learn how they think, find out what it was like for them growing up, and understand the internal and external pressures that pushed them deeper and deeper into the hacker underground. Every hacker has a life and story of his or her own. One teenager's insatiable curiosity as to how the family's VCR worked was enough to trigger a career of cracking into computer systems. This is a remarkable story of technological wizardry, creativity, dedication, youthful angst, frustration and disconnection from society, boredom, anger, and jail time. Teenage hackers are not all indifferent punks. They're just like every other kid and some of them probably live in your neighborhood. They're there. All you have to do is look. ... Read more

Customer Reviews (32)

2-0 out of 5 stars Ugh, terrible writing.
I initially picked up this book with the hope that it would not only teach me about specific hackers (this book does this fairly well), but also talk about hackers in society as a whole as a general phenomenon (it attempts this, but doesn't quite stick it in a way that feels substantive-- it is too anecdotal).

The one thing I absolutely could not forgive was the writing style this book had. In order to draw readers in about the story, passages regularly popped up that sounded more fit for a melodramatic movie trailer, or Americas Most Wanted, as the writer strained and strained to make these teen hackers all the more sinister and mysterious. They may very well have been sinister and mysterious hackers, but it just sounded ridiculous, not to mention repetitive. I worry it gives readers a distorted picture of reality, as a result. These may have been impressive hackers, but they were not that significant on a wide scale (I elaborate on this below), yet the author writes about them like they're incredible mythic figures. I found many instances the author used language that was so much more melodramatic than the things he was actually describing that after I finished reading his description of a sequence of events I'd still be just as bored as before he started writing so darkly.

I also feel like this book has little societal significance. It tells several different stories, but after reading it, I tried to come up with discussion questions about society as a whole (I read this for a school assignment, actually, merely to come up with an informal discussion about society-- EXTREMELY open-ended) and could not do so. You simply cannot talk about society as a whole through these 8 narratives, except to say the generic-- that these hackers are socially rebellious, probably have parent problems, are quite intelligent, etc. Decent narratives, written in a way that was over-theatrical, that was hard to connect to today. The topic of privacy is fascinating, but really, the author doesn't talk much about it except to say that some hackers invaded privacy and went on to later become security folk at businesses. Interesting, maybe, but not that surprising, and not that significant-seeming (the author didn't spend much time using this to make a point about how rule-breaking can lead to innovation, nor did he ask a question about what the future might hold, he mainly used it to show off how impressive the hackers were). If this book were less about 8 hackers and more about computer history/concepts in general using these guys as /examples/ instead of the only plotline of the book, it would be a lot more impressive. I feel like the author went to a lot of trouble to interview these kids without getting a result of importance.

It would have also been better of the author seemed more knowledgeable and authoritative. As these were essentially 8 anecdotes, it would have been great if the author quoted people who actually study hacker/teen psychology who had opinions to make me feel more comfortable using it as a reference to think about the world at large. Instead, I read ideas like 'many hackers are socially outcast in one way or another' or 'hacking became more mainstream/hacking culture became less about skills and more about attitude,' without giving concrete examples. I believe the author, but I want more substantiation.

What this book does ok is paint a fairly good picture of the beginnings of hacker culture/tech history, but again this wasn't that useful, as the author told 8 different narratives that basically said the same things about this. And again, the same problem of lack-of-substantiation. If he'd said 'Hacker X got super-interested in hacking as a result of phone phreaking and VCRs' and then went on to cite an expert or historian elaborate on it, it would have felt more satisfying. Perhaps most authors don't need to make these sorts of extra citations, but as the author takes on a very melodramatic tone, I didn't trust him as an authority.

2-0 out of 5 stars Far from being a good book
I can recognize Dan Verton really did a lot of researching for writing this book but, despite all of it, it's a bad book. Excepting HD Moore I never saw any of those hackers interviewed. The tales are very unintersting. A mom from a friend of mine liked it and probably my mother will.

3-0 out of 5 stars More fiction that reality.
This is one of the only books that directly talks about teenage hackers and one that tries to change the people's and the media's perception about a hacker. It does not, however, do a great job of conveying this message at least that is what I thought. The preface starts as a restatement of the well know Hacker's Manefesto authored by Mentor a decade ago. The book will not appeal to the technical audience, since it is mostly a novel. One issue that I really found serious in the book was that the message is contradicted. Although the book wants to convey the message that hacking is bad and people who practice it are normal teenagers who might be cutting your grass; the choice of characters was no where normal. The characters which are mostly from divorced parents, living with no water in their house, picking fights, getting arrested, and getting expelled from school; hardly the norm for the average teenager IMHO. A couple of technical inaccuracies were also spotted between the text and there a huge gap in the time line described between the day the hacker fiddled with his first computer and the day he started to break computers. Other than that issue the book is a good read although it does really appeal to my technological taste.

1-0 out of 5 stars Hackers
This book is horrible.Hackers are the people who commit crimes using computer, Hackers are people who are expert programmers.A better book would be "Hacker: Heroes of the Computer Revolution".

3-0 out of 5 stars Written for non-technical readers
This book is one of a few that provides insight into hackers, security personnel, and cybercrime investigators through first-person interviews. It reads much like a magazine article or investigative newspaper report.

The title implies that we will get a very personal glimpse of hackers, as if reading their diaries. That is not the case. We only get what the hacker is willing to say to the interviewer, so there is a level of info we don't get to see.

As a computer geek myself, I expected more techinical information, but the author saw need to explain what things like "telnet" means. If you are not a technical person, you will be able to read this book without being left in the dark on anything. But geeks like me will be left wondering more about specific techniques and tools used, while bored at the basic information provided.

I don't have a lot of time or patience, so the fact that I read this book cover-to-cover without giving up on it means it has some value, though it leaves something to be desired. It is not a book that will change your life or give you a deep insight, but it is an interesting read. ... Read more


17. The Downhill Lie: A Hacker's Return to a Ruinous Sport (Vintage)
by Carl Hiaasen
Paperback: 224 Pages (2009-05-05)
list price: US$14.00 -- used & new: US$4.40
(price subject to change: see help)
Asin: 0307280454
Average Customer Review: 3.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Bestselling author Carl Hiaasen wisely quit golfing in 1973. But some ambitions refuse to die, and as the years passed and the memories of slices and hooks faded, it dawned on Carl that there might be one thing in life he could do better in middle age than he could as a youth. So gradually he ventured back to the rolling, frustrating green hills of the golf course, where he ultimately—and foolishly—agreed to compete in a country-club tournament against players who can actually hit the ball. Filled with harrowing divots, deadly doglegs, and excruciating sandtraps, The Downhill Lie is a hilarious chronicle of mis-adventure that will have you rolling with laughter. ... Read more

Customer Reviews (75)

5-0 out of 5 stars You can't make this stuff up
Hiassen hits it again and doesn't call FORE and the book hits you fully in the funny zone.If you play golf or not this book will put you on the floor laughing at his shenanigans.I'm a newbie at the sport and dang, he's dead on with every word.If you've never lost every last ounce of human dignity, play golf but read this book first so you know what to expect.Ignore the frogs...

5-0 out of 5 stars the downhill lie
The book was very entertaining and was all that Carl Hiaasen is noted for.I have read all of his books and this one was just as entertaining as all the others.I would recommend it to all the golfers out there..

1-0 out of 5 stars The Downhill Slide: A Hacker's Return to a Ruinous Sport
I was thinking I was getting one of Carl Hiaasen's great books of the past.I'm not a golfer and don't understand the terms for golf.He can sometime's be a very complex writter, in this one he truly is.I wish I would have gotten a different book.

5-0 out of 5 stars Just what a golf addict needed
Mr. Hiaasen hit the tee-shot straight up the fairway with this book.It was a great read and just what I needed in the middle of winter to rekindle my golf itch.

5-0 out of 5 stars The Downhill Lie: A Hacker's Return to a Ruinous Sport
If you love golf you will love this story.Full of good humor and full of golf. ... Read more


18. The Mac Hacker's Handbook
by Charles Miller, Dino Dai Zovi
Paperback: 384 Pages (2009-03-03)
list price: US$49.99 -- used & new: US$16.95
(price subject to change: see help)
Asin: 0470395362
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses. ... Read more

Customer Reviews (5)

3-0 out of 5 stars Good book but needs an update
The Mac Hacker's Handbook covers a lot of useful technical topics surrounding vulnerability analysis and exploit development for Mac OS X.That said, it doesn't so much teach you directly, as guide your learning.For example, it introduces the use of DTrace on OS X for dynamic analysis.It makes a very good case for DTrace's usefulness in reverse engineering, and for you to go out on your own and learn about it.Its DTrace examples aren't really freestanding, and require some background that you must get yourself.If the book were to give you the necessary background on every topic it introduces, it would be an enormous tome, and the authors probably would still be writing it.

Think of the book as explaining to you what all tools you need in your Mac hacking toolbox and why you need them, and how to put them together once you have them. It's up to you do go develop those skills on your own.

The biggest shortcoming of the book, however, is it is out of date.The concepts are sound and still very applicable, but the examples are written for OS X 10.5.Most do not work on Snow Leopard.Many you can get to work if you go out and beat the pavement trying to figure them out.I recommend this, but be aware, your progress through the book will be slow going as you get bogged down trying to figure out how to adapt each example so that it works.

This book succeeds if taken for what it is: a guide for your learning.You'll need to invest a fair amount of sweat equity to get the most out of it, though.

2-0 out of 5 stars Well, it at least had Mac in the title
I have to disagree with the other reviewers of this book. The book seemed to be a jumbled collection of thoughts with only a very faint sense of direction. The book consist of a large number of code samples, but the explaination of these samples lacked.

The arena for Mac hacking books is relatively small. While I appreciate the effort to put together a basic understanding of the Mac attack surface, the manner in which this book does this seems less than cohesive. Admittedly I have not finished the entire book yet and that is largely due to the fact that reading the book more than a chapter at a time is tiresome.

I will give the authors credit for venturing into a new area of security research and hope that future books on the subject are easier to read. Not easier as in smaller words, but easier as in thought flow.

5-0 out of 5 stars The best Mac security reference
The Mac Hacker's Handbook is the best reference for Mac-specific attack information that I have found. At 368 pages, it may appear small compared to the typical 750+ page security tome. That's because the authors have done a near-perfect job of sticking to the topic at hand, the Mac. The authors do not succumb to the usual temptation to try and teach assembly language or reverse engineering. Rather, they do an excellent job touching on those topics in an OS X context, and assume the reader has a little background in that area already, or can otherwise keep up. I have done some limited research into the areas of Mac malware and process injection in the past. This book has done a fantastic job of filling in many holes in my knowledge that I hadn't been able to take care of before. Plus, it introduced me to a number of Mac-specific security features I wasn't aware of before. Highly recommended for anyone interested in Mac security.

5-0 out of 5 stars Breaks new ground into the Mac
As a security professional Mac's are an interesting subject. They combine many of the best features from other operating systems into a wonderful package. I purchased a Macbook during a pen test about 8 months ago and have been in love with it since then. Before this book looking at security on Apple products was a difficult dive into the unknown. Charlie and Dino have done a lot of hard work and figured out the internals of OS X as related to security. They clearly present what's going inside the OS and how they learned the internals. This enables other security professionals to follow their method to both gain better understanding and to know what's wrong when something inevitably changes.

I'd definitely recommend this book for experienced security professionals looking to do exploit development on the Mac.

5-0 out of 5 stars Fantastic book for understanding details of Mac OSX
Well-written, readable, and fascinating, Charlie and Dino describe what goes on under the covers of Mac OS X, warts and all. They explain the obscure, badly-documented, and unsupported. Well worth reading for anyone who wants to know what's under the covers. ... Read more


19. Certified Ethical Hacker Exam Prep
by Michael Gregg
Paperback: 696 Pages (2006-04-17)
list price: US$54.99 -- used & new: US$11.97
(price subject to change: see help)
Asin: 0789735318
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam.

 

Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to help you drill and practice your way to higher scores.

... Read more

Customer Reviews (17)

2-0 out of 5 stars Outdated, no longer sufficient.
This was a good book in its day... for the previous version (5) of the test.But it's outdated and needs an update.This version of the book won't prepare you for the test.Version 6 was released in 2008 with lots more modules and newer malware and hacking tools.Example, there are no sections on wireless or bluetooth hacking, and no info on Cisco PIX firewall models and their specs.(Unfortunately, books that cover the new CEH v6 exam seem to be lacking at the moment.)

5-0 out of 5 stars Great Exam Book! But....
This is a great book for studying for the exam. If you want to get an idea of security info in general you can't find a better condensed book. However I just took the exam and passed and will say this book alone would not have been nearly enough. Since I can't say what is actually on the exam and also your test could be vastly different that mine I will say study everything and I mean minor details! Study vendor specific technologies!Best of luck.RC

5-0 out of 5 stars Great book
This book is a great. Not recommended to people with low expirience in Computers or Information Technology. You should have a strong foundation in systems and different Operating Systems. This book has tons of relevnat, strong, new age information on todays Systems and software. GREAT BUY!

5-0 out of 5 stars Excellent preparation book for the exam, makes you not a Ethical Hacker.
This book I used for reference material to prepare for the CEH Exam. There is also a review guide for CEH, see Amazon for this book (CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 by Kimberly Graves). Beware: this is a REVIEW guide. Personally I think that this book (Certified Ethical Hacker Exam Prep, Que Publishing by Michael Gregg) is great for a start and you don't need the other review book.

The exam consists of 150 questions with sometimes deep technical detailed questions. You'll need certainly a good knowledge about protocols and typical behaviour of it but nevertheless this will not make you an ethical hacker. This takes much much more experience, dedication and years of work in the field.
Besides that; you will need lots and lots of other material to prepare yourself for the exam and to build up knowledge in general. For example; buy the guide of "professor Messer" to get additional knowledge on the Nmap tool. The book is however a great guide in the sometimes complex material.

I think this book is easy to read, the author did a great job on this. Second there is a good roll up of all the issues that where discussed in every chapter. I think CEH is a typically focussed on the Windows Platform. This not a problem for me because this is my expertise area anyway but unix and linux is touched lightly.

With that in mind, great guide for preparing, buy some other stuff or search the internet for additional material.

Rob Faber [CISSP, CEH, MCSE]
Security Consultant
The Netherlands

4-0 out of 5 stars Some errors but hackers don't care about grammer.
My teach kept saying how he threw the book at the wall when he saw the first error. So don't believe everything word for word in this book. Try some of the stuff out it tells you about to help ya learn about it. The book has a lot of good information. It'd be nice though if they could get a new edition out with the errors fixed. ... Read more


20. The Best of 2600: A Hacker Odyssey
by Emmanuel Goldstein
Hardcover: 888 Pages (2008-07-28)
list price: US$39.99 -- used & new: US$9.55
(price subject to change: see help)
Asin: 0470294191
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s perspective. Included are stories about the creation of the infamous tone dialer “red box” that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks. ... Read more

Customer Reviews (15)

4-0 out of 5 stars A history of the culture of hacking
This books contains selected articles from the magazine 2600. It is not to be read as a technical guide, but as an anthology and history book about the culture of hacking. The book covers the history of hacking, from the early 1960's to the present. I would suggest this book to anyone looking for references on culture.

Please, don't buy this book if you expect a technical guide. Expect the stories of a community, the collective voices of thousands of people, sharing their ideas, challenges and guidance.

3-0 out of 5 stars Not as good as I had hoped.
Generally when something is the "best" it is actually really really good. This book is full of average and slightly above average. Worth reading but not amazing.

5-0 out of 5 stars Hack The Planet (one book at a time!)
2600: A Hacker Odyssey is an invaluable tome of knowledge, history and perspective on the hacker culture. It covers several topics of hacking, social engineering, telephones, security and more. If you're familiar with 2600 magazine, this is a must have. If not, get caught up with articles going all the way back to the beginning. Magazine Editor and author Emmanuel Goldstein and his crew have gone out of their way to organize such a great resource.

5-0 out of 5 stars Great way to get all
Great way to get all the great stories from back issues of 2600 magazine. Love it.

4-0 out of 5 stars Mirada històrica a l'underground de les telecomunicacions
Un llibre interessant per tenir una idea de l'evolució de les comunicacions des del punt de vista nortamericà i underground, amb tot el que comporta. Un document escrit per gent curiosa i sense por d'experimentar, fins i tot jugant-se haver d'anar a comisaria.
A mesura que vas llegint articles i els comentaris intructoris d'en Goldstein, et va quedant el regust d'aquesta necessitat que tenen els americans per generar llegendes arreu, però no és perfectament suportable. ... Read more


  1-20 of 99 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

site stats