Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1

Paperback (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 90%)
Other sellers (Paperback)
  • All (20) from $1.99   
  • New (11) from $12.18   
  • Used (9) from $1.99   


Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read for anyone who owns a computer and has ever pondered the threats of modern technology.

Black Hat takes a fair and thorough look at the hacking cases that have made the news in recent years. These stories include all the juicy details, like the people behind the hacking, as well as legislative attempts to curtail hacking, cracking, and spam.

Table of Contents

  1. Black Hats: Things That Go Ping in the Night
  2. Y.O.U. Mayhave Alredy 1!: Spam
  3. Deep Cover: Spyware
  4. Shockwave: Worms and Viruses
  5. Dear Friend: Scams
  6. Upload or Perish: Pirates
  7. Breakin: Hacking
  8. Don't Get Burned: White Hats
Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Who’s sending you all that spam? Who’s trying to break into your computer? Who’s planting hidden spyware there? Who’s trying to con you out of your password? Read Black Hat and find out.

John Biggs has catalogued the scams and the scammers. You’ll dive into a spam email message to figure out where it came from. You’ll learn how your computer might be sitting in harness with millions more, waiting for the command to start processing on behalf of someone you’ve never heard of. (OK, they say they won’t. But they can.) You’ll learn who captured every keystroke on the public computers at Manhattan’s Kinko’s -- user IDs, passwords, and all. How worms work. How online stock market scams work. How not to get phished. Can you afford not to know this stuff? Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9781590593790
  • Publisher: Apress
  • Publication date: 6/10/2004
  • Series: Business Series
  • Edition description: 1st Corrected ed. 2004. Corr. 2nd printing 2004
  • Edition number: 1
  • Pages: 176
  • Sales rank: 1,256,959
  • Product dimensions: 9.00 (w) x 6.00 (h) x 0.38 (d)

Meet the Author

John Biggs is senior editor at, the gadgets weblog with 200,000 unique visitors per day, as well as editor of, a popular Mac Mini site. He has written for Linux Journal and the New York Times on open source and security. John has worked for over 10 years in the IT industry and recently completed a master's degree in business and economic reporting at New York University.
Read More Show Less

Table of Contents

Ch. 1 Black hats : things that go ping in the night 1
Ch. 2 Y.o.u. mayhave already II : spam 5
Ch. 3 Deep cover : spyware 31
Ch. 4 Shockwave : worms and viruses 49
Ch. 5 Dear friend : scams 71
Ch. 6 Upload or perish : pirates 93
Ch. 7 Break in : hacking 115
Ch. 8 Don't get burned : white hats 133
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Anonymous

    Posted January 10, 2005

    Security Book for the Novice User

    This is a review on a book called Black Hat, Misfits, Criminals, and Scammers in the Internet Age. This is a book on computer security. The book talks about how to secure your home/office computer from the script kiddies. The book breaks down the different types of security issues that you might be faced with, being online. It covers all types of security from Email to Hacking, (Script Kiddies) to Scams. The book talks about current security issues (Blaster Worm, Melissa, Mydoom). The book is current, it was published this year (June 2004). The content of the book is good for people just starting out in computers (security). It will not be a real useful resource for the experienced user. This book covers a lot of topics, but 90% if the information is designed for the novice user. If you have any computer experience at all, this book is good, but a little basic. I liked the book for some of the information it provided, but a lot of it was not new. Most of the security web sites that talk about security will cover this same information. The author talks about Windows and Linux for the Operating Systems used in the book. Since Mac (OS X) is also a viable operating system, I wish they would have covered it as well. Since it is Unix based The book is very readable. It is a very easy read, I was able to read the entire book in a few days. There are some examples in the book. I liked most of them, but some (few) had really dark screens. It was not to bad. I wish that he would have lighten them up some. So there where kind of hard to see. It did help having some of the illuastrations to see the point that was being made. I wish they would have given a few more. The book does not come with any software, or any code samples. I think that it would have been helpful to have a CD in the book. The book does give a lot of information on the fact that all the information you see on TV and in the movies is just not true. You can not use your computer to play a game of 'Nuclear War' on your computer. As is shown in 'War Games' (1983) In Chapter 1 is about the guys and gals that have been caught hacking different types of machines. It also gives a basic over view of what you can expect by having a computer on the Internet. That the best (Only) way to keep your computer safe is to cut the cord. I agree that it is safer to not go on the net, but if you want to stay current, or talk to others you need to be on the net. I wish that they would have covered the different types of devices (Router, Firewalls, Switchs) that can be used to help prevent attachs. When you get to Chapter 2 the book will cover what is happening with SPAM. He goes over a lot of different items on SPAM. He tells you that you can not do anything about SPAM. Then he talks about 'The Solution' which he covers what a 'Whitelist' and a 'Blacklist' are. He covers the way a Bayesian filter works. This is one of the ways to protect your machine that he goes into a lot of detail. He does cover the what kind of messages look like that are SPAM. In the next chapter he goes into SPYWARE and what it is caused by and what kind of software it is in. He does cover the information about 'Gator' and what they have done. He does cover the how to get rid of it, and what you can do to be careful and not get it in the first place. It is good information, and if you follow the advise it help keep it off your machine. Each of the chapters cover a different type of security risk. I wish that some of the chapters would have covered the secuirty topic in more detail. As I have stated above, the second chapter covers spam. The information that they talk about is good, but it could have been better. One of the things that was lightly touched on was a way to discover if the mail that you are getting is really from the sender. This is one of the chapters that I was looking really

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 19, 2004

    Excellent primer in computer security

    This is the security book for everyone. Excellent explantions of worms, viruses, hacking, and scammers. Don't get caught on the web!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 7, 2004

    good overview

    This is a very readable journey into the smarmy underside of the Internet. In straightforward, nontechnical prose, it explains the basic ideas behind spam and viruses and worms. Plus ostensibly benign spyware. And outright scams, that are a particularly pernicious subset of spam. Space is given to explaining about the Nigerian 419 and of phishers. Then there is the explanation of downloading of copyrighted material (usually music). This differs from the others in that here millions actively participate. Whereas the others are pushed out to millions, most of whom decline. The book is ideal for a person still new to the Internet, and worried about snares. It eshews a sensationalistic or preachy tone. The only unfortunate thing is that it is pessimistic about defeating spam. The reasons give reflect the current consensus in the antispam field. But a few others, like myself, believe, based on our own works, that spam can indeed be crushed.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)