Buy Used
£12.93
+ £2.80 UK delivery
Used: Very Good | Details
Sold by owlsmart_usa
Condition: Used: Very Good
Comment: Pages are clean and free of writing and or highlighting. Cover edges show some wear from reading and storage.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks and Spies Over Time Paperback – 4 Sep 2001

3.0 out of 5 stars 1 customer review

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
"Please retry"
£16.88 £12.93
click to open popover

Special Offers and Product Promotions

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.




Product details

  • Paperback: 960 pages
  • Publisher: John Wiley & Sons; Pap/Cdr edition (4 Sept. 2001)
  • Language: English
  • ISBN-10: 0471055891
  • ISBN-13: 978-0471055891
  • Product Dimensions: 19.2 x 5.2 x 22.2 cm
  • Average Customer Review: 3.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 1,885,888 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

Review

" The author has amassed an enormous amount of material and it is supplemented by a bound–in CD–ROM in each book". (Software World, May 2002)

From the Author

Step Inside the Real World-A Glimpse into the Hacker's Underground

I know of a reality where computer crime is a lifestyle. Places where your social security and credit card numbers are traded with pokerfaced anonymity. Places where even the most guarded computers are vulnerable to sophisticated hack attacks. These places share a common name-a name composed of alternative vocations such as computer hacking and cracking, software pirating, phone system phreaking, information sniffing, identity spoofing, communication spying, and corporate espionage. The name is the Underground-a virtual locality that hackers call home.

Did you know you could unintentionally download malicious programs that can make the most threatening virus seem harmless? These programs are designed to allow a remote attacker the ability to secretly control your network server or personal computer. Hackers can collect passwords, access accounts (including e-mail), modify documents, share hard drive volumes, record keystrokes, capture screen shots, and even listen to conversations from your computer's microphone.

Did you know by simply browsing the Internet, wherever you go and whatever you do, almost anyone can track your movements while collecting personal information about you? Hackers can easily exploit this critical information leak, and collect data right from your web browser.

As the world becomes increasingly networked through the Internet, competitors, spies, disgruntled employees, bored teens, and hackers more frequently invade others' computers to steal information, sabotage careers, and just to make trouble. Together, the Internet and the World Wide Web have opened a new backdoor, through which a remote attacker can invade home computers or company networks and electronically snoop through the data therein. The continued growth of the Internet, along with advances in technology, mean these intrusions will become increasingly prevalent. Today, external threats are a real-world problem for any company or home with connectivity. To ensure that remote access is safe, that systems are secure, and that security policies are sound, users in all walks of life need to understand the hacker, know how the hacker thinks-in short, become the hacker.

Most people hardly realize the threats they face from within their company networks to their home computers. More than likely, there have been hack attacks unbeknownst to you-in your neighborhood, down your block, next door, even in your home. If you think you're safe, you're probably not. Join me through the maelstrom of chaos, from where malicious hackers attack. Follow me through the Hack Attacks series, to the very core of the Underground, as we expose these attacks, and lockdown our networks, our personal computers, and our privacy. You are faced with a challenging technogothic journey, and I'll be your guide. Malicious individuals are infesting the world of technology. My goal is to help mold you into something better I'm going to make a virtuous hacker guru out of you.

See all Product Description

Customer Reviews

3.0 out of 5 stars
5 star
0
4 star
0
3 star
1
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
This contains more that's of interest to someone who wants to understand the history and culture of hacking than to the would-be hacker/cracker or security professional.
The book begins with the almost obligatory explanation of the original meaning of the word 'hacker' as someone who is able to produce elegant or faster-running (or both) solutions to programming problems along with the accompanying explanations of the differences between hackers, crackers and phreakers. It goes on to give an interesting historical synopsis from the 1950's to the present listing significant events which are relevant to the subject, or, in the author's opinion, likely to be of interest to someone reading a history of hacking.
Following on from this it's split into chronologically ordered sections covering hacking and cracking. Each section really just lists the files for the equivalent directory on the CD and gives a short summary of the file's origins and contents and details of where to look on CD-ROM. It's interesting (in places) but there isn't a great deal in the early sections that is of any practical use. The later sections do include some interesting stuff relating to more modern Windows and UNIX systems.
Among the appendices is a glossary of over 200 pages which provides a guide to terminology used in this field. It provides a dictionary of hacking with plenty of information provided and is useful both as a general reference and for explanations of some of the less well known terms which crop up in the main text.
The main problem is that the book is hundreds of pages long, but other than the introduction and history of hacker culture at the beginning and the glossary at the end, the entire thing is filled with snippets and excerpts from the CD. It's interesting as an illustration of some aspects of hacker culture and the evolution of hacking and cracking, but probably a bit overpriced.
Comment 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 4.7 out of 5 stars 35 reviews
21 of 21 people found the following review helpful
5.0 out of 5 stars Carmada reviews Hack Attacks Encyclopedia 7 Sept. 2001
By A Customer - Published on Amazon.com
Format: Paperback
"We're sure someone's thought of this idea before, but it took John Chirillo to pull it off: an encyclopedia of 30 years of hacks, cracks, phreaks, and related endeavors. Yes, there's now a single authoritative reference for all of it.
Hack Attacks Encyclopedia starts back in the mists of time, chronicling John Draper's long-distance telephony adventures as Captain Crunch (that is, before he wrote Easy Writer, the original IBM PC word processor). If you were too young for the '60s or early '70s, Chirillo quotes some anarchist texts that put you right in the spirit. His timelines and narratives then take you through "the golden age" (1980-1989); "the great hacker war" (1990-1994); the age of "zero tolerance" (1994-1999), and beyond the millennium.
Of course, the heart of the book isn't the narrative. Together, the book and CD-ROM assemble nearly 2,000 historic texts, program files, code snippets, and hacking/security tools -- files as old as the '70s and as new as tomorrow's headlines. You name it: password programs, Unix/Linux scripts, remote hacks for Windows systems, scanners, sniffers, spoofers, flooders, keystroke capture programs, virus hacks -- not just one variation but many. A veritable cornucopia of digital anarchy. (Bill Camarda)"
23 of 25 people found the following review helpful
5.0 out of 5 stars Hands down the best book available on infosec 11 Sept. 2001
By Dennis M. - Published on Amazon.com
Format: Paperback
Well constructed text all about cyberculture and the dark underside of security. Within I found writings by Cap'n Crunch (famous phreaker), Justin Peterson, Kevin Mitnick (hacker celebrity), Kevin Poulsen (aka. Dark Dante), L0pht and Masters of Deception (famous hacking groups), Mixter (author of Targa and TFN), and Robert T. Morris, just to name a few. To think there's much more in here makes this book hands down the best title on infosec available today.
13 of 13 people found the following review helpful
5.0 out of 5 stars Youll love this book! 30 Aug. 2001
By S Walters - Published on Amazon.com
Format: Paperback
Revealed gave me a good understanding of the network security. This is the first book I've ever read from the Wiley series. I now know where to turn if I want to get going on something fast. In conclusion this book might not make you a master at hacking but if you want a good foundation and methodoligal approach, take a look.
Denied is the second part to Hack Attacks Revealed, over 500 pages, whose value is in the patches for all the security holes illustrated in the first book. The CD is loaded with compiled programs for securing systems, building firewalling devices, and secure browsing, telnet, ftp, chat, and mail. Again, there are extensive walkthroughs which makes it unique in this category.
Encyclopedia is something completely different. The book is a look at hacking and cracking and phreaking and some I haven't the title for, all from different user submissions from all over the globe. I rated high Revealed and Denied, but this book is much better organzied and a pleasure to read.
6 of 6 people found the following review helpful
5.0 out of 5 stars RECOMMENDED 9 Sept. 2001
By Todd Griswold - Published on Amazon.com
Format: Paperback
In the past we've been full of praise for the two others books in this series. It's now been joined by another, called Hack Attacks Encyclopedia. If you want to know all there is to know from hackers of the 70s, 80s, and 90s, check it out!
5 of 5 people found the following review helpful
5.0 out of 5 stars Worth the wait! 30 Aug. 2001
By Steven M. James - Published on Amazon.com
Format: Paperback
Most computer-security textbooks approach the subject from a single point of view. In contrast, Hack Attacks Encyclopedia talks about almost every security topic from thousands of view points. That's right, the book is like "60-Minutes Goes Underground"-there are documentaries from past and present hacker's; actual texts, e-mail, articles-a HUGE collection, some dating back to Cap'n Crunch and other legends. Really an excellent composition of "just the facts"-excerpts from before the 70's to the Millennium. 5 Stars for the research that went into this text, and the kicker...the COMPLETE text containing each excerpt is organized on the CD. It will literally take me months to get through all this history!
Were these reviews helpful? Let us know


Feedback