Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists, and Weapons of Mass Disruption

Overview

In recent years information warfare has trickled from the domain of governments and megacorporations into the lives and workplaces of the average citizen, and privacy concerns are at an all-time high. Cybershock is the first book to guide the average Internet user through online perils and offers answers and solutions in common-sense language. Winn Schwartau leads readers through the basics (What's hacking? Who hacks?), introduces actual hacking tools and techniques, and using corporate, law enforcement, and ...

See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (20) from $1.99   
  • New (2) from $5.94   
  • Used (18) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$5.94
Seller since 2014

Feedback rating:

(99)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Hardcover New 1560252464.

Ships from: San Mateo, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$50.00
Seller since 2014

Feedback rating:

(164)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

In recent years information warfare has trickled from the domain of governments and megacorporations into the lives and workplaces of the average citizen, and privacy concerns are at an all-time high. Cybershock is the first book to guide the average Internet user through online perils and offers answers and solutions in common-sense language. Winn Schwartau leads readers through the basics (What's hacking? Who hacks?), introduces actual hacking tools and techniques, and using corporate, law enforcement, and military examples, teaches how to become a successful anti-hacker. It also provides balanced viewpoints through graphic, pictorial, and written contributions from the principal stakeholders: hackers and phreakers; corporate security experts; lawyers and cyberjudicial professionals; and officers with the security-sensitive military and government agencies. The book includes an extensive listing of both hacking and anti-hacking Internet sites and a compendium of the leading anti-hacking security products and tools.

Read More Show Less

Editorial Reviews

Library Journal
One of the leading information security and electronic privacy experts in the United States, Schwartau (Information Warfare) here brings the perils of the Internet to life in an engaging style accessible to the average reader. Schwartau describes an Internet full of criminal hackers and cyberpunks who are clearly ethically-challenged but clever enough and willing to use deception to establish and expand their power. He explains who these people are, why they hack, and how they crack passwords, break into systems, and maintain their anonymity. More importantly, Schwartau suggests what a user can do to deter such attacks and explains the fundamentals of how to protect oneself without having to become a security expert. With burgeoning concerns over privacy and security on the Internet, this is one book that everyone from systems administrators to casual net surfers should read. References to further readings are scattered throughout the work. Highly recommended for most collections.—Joe Accardi, Northeastern Illinois Univ. Lib., Chicago Copyright 2000 Cahners Business Information.
Booknews
"The Internet can be a bad neighborhood," says Schwartau (Information Warfare), and suggests measures for protecting families from fraud, identity theft, online predators, and pornography. He also reveals the lurid secrets of hacker conferences, considers whether to hire hackers for protection, and argues that the US military is the best defense for the whole world. Annotation c. Book News, Inc., Portland, OR (booknews.com)
M. Zuckerman
If you've ever wondered whether your bank, telephone, or home computer are secured from Internet criminals you need to read CYBERSHOCK. Winn Schwartau is unchallenged as the first civilian to see clearly the future of cyber insecurity and warn the masses. He has maintained a vigil atop that high ground for nearly two decades reporting back to the rest of us, relatively nearsighted spectators. So who better than Winn, author of the groundbreaking Information Warfare, to explain today's cyber landscape? CYBERSHOCK takes the reader well beyond mere hackers, widely regarded as ankle-biters by security professionals, and offers an understanding of the real threat to cyber security and how to act defensively.
USA Today
Read More Show Less

Product Details

  • ISBN-13: 9781560252467
  • Publisher: Basic Books
  • Publication date: 5/28/2000
  • Pages: 320
  • Product dimensions: 6.37 (w) x 9.31 (h) x 1.57 (d)

Table of Contents

Acknowledgments x
Foreword xiii
Introduction xxi
Part I The Hackers 1
The Great New Global Society 3
Whole Lotta Hacking Goin' On 19
CyberGraffiti 25
Who Are the Hackers? 33
CyberChrist at the Hacker Con: Las Vegas, Nevada, USA 53
Hactivism: Political Hacking 69
An American Alien Hacks Through Customs 79
Part II Protecting Kids, Family, and Your Privacy 83
In Cyberspace You're Guilty Until Proven Innocent 85
Protecting Your Kids and Family from Hackers 111
Spam 130
Scam Spam: Fraud 141
Part III How They Hack 153
Getting Anonymous 155
Password Hacking 165
Hack and Sniff 176
Scanning, Breaking, and Entering: Anatomy of a Friendly Hack 180
War Dialing: Hacking the Phones 195
Trojan Hacking 201
Hacking for $ 206
Viruses, Hoaxes, and Other Animals 212
Crypto Hacking 229
Steganography: Hiding in Plain Site (Sight?) 253
Hacking for Evidence 258
Part IV "We're Sorry, but the Computers Are Down" 273
Denial of Service: Taking Down the Net 275
Schwartau to Congress: HERF This 284
Weapons of Mass Disruption 286
Part V Anti-Hacking Tips and Tricks 313
Hiring Hackers 315
Catching Hackers 325
Defensive Hacking: Firewalls 336
Corporate Anti-Hacking: It Ain't the Technology 346
Lying to Hackers Is OK by Me 357
Part VI Law Enforcement, Vigilantism, and National Security 365
Hacking and Law Enforcement 367
Corporate Vigilantism: Strike Back or Lay Back? 374
Infrastructure Is Us: The National Response to Hacking 390
Something Other Than War 408
Part VII The Future 419
Luddite's Lament 421
The Future of Microsoft 425
Messing with the Collective Mind: PsyOps 428
Extreme Hacking 432
The Toaster Rebellion of '08 438
Postscript 448
Appendix 450
Top Hacker Sites 450
Top 50 Security Sites 451
Other Works 453
Index 455
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 5 Customer Reviews
  • Anonymous

    Posted August 31, 2003

    this book is excellent

    I think this kind of book is excellent because talk about security warnings and how hackers/crackers can act against common and insecure networks made for us.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 25, 2001

    CIAHacker gives it two thumbs up

    This book provided an excellent resource for people who know nothing about computers and computer safety. It was an easy read so that anybody could understand it. I highly advise reading this, you will have your eyes opened.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 23, 2001

    Excellent Book

    Computer Security Guru Winn Schwartau gives a clear, easy-to-understand view of the dangers posed by technology in the wrong hands. It is very well written and I recommend it wholeheartedly to anyone who wants to learn more about the dangers facing our computer networks today.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 8, 2000

    The Information Highway, what you don't really want to know about .

    Great stars, not for the meek or computer challenged. Written so that -anyone, -anyone who is interested in what goes on behind the scene of computing. Challanges the taken for granted concept of personal privacy. Execellent references, law inforcement issues and protecting yourself from related abuse.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 21, 2000

    Excellent Book

    This is one of the best books that I've read, ever. Gives you a great sense of the hacker culture and provides outstanding information, including examples of some real events.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 5 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)