Hackers: Heroes of the Computer Revolution

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 87%)
Other sellers (Paperback)
  • All (31) from $1.99   
  • New (3) from $21.89   
  • Used (28) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
Seller since 2010

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

0141000511 We guarantee all of our items - customer service and satisfaction are our top priorities. Please allow 4 - 14 business days for Standard shipping, within the US. ... Thank you for supporting our small, family-owned business! Read more Show Less

Ships from: ACWORTH, GA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2008

Feedback rating:


Condition: New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


A mere fifteen years ago, computer nerds were seen as marginal weirdos, outsiders whose world would never resonate with the mainstream. That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.

A remarkable collection of characters...courageously exploring mindspace, an inner world where nobody had ever been before. (The New York Times)

Fascinating...A huge job hugely well done. (The Washington Post)

Author Bio: Steven Levy is also the author of Crypto: When the Code Rebels Beat the Government-Saving Privacy in the Digital Age and the chief technology writer for Newsweek. He is a regular contributor to numerous publications including Macworld and Wired.

A classic reissued for the first time in trade paperback with a new afterword from the author, this is the story of the true pioneers of the computer revolution -- the young mavericks and renegades who hacked their way into controlling an industry. Levy's monthly column appears in MacWorld.

Read More Show Less

Product Details

  • ISBN-13: 9780141000510
  • Publisher: Penguin Publishing Group
  • Publication date: 1/28/2001
  • Edition description: Updated
  • Pages: 464
  • Product dimensions: 5.28 (w) x 7.88 (h) x 1.06 (d)

Meet the Author

Levy is a senior writer for Wired. Previously, he was chief technology writer and a senior editor for Newsweek. Levy has written six books and had articles published in Harper's, Macworld, The New York Times Magazine, The New Yorker, Premiere, and Rolling Stone. Steven has won several awards during his 30+ years of writing about technology, including Hackers, which PC Magazine named the best Sci-Tech book written in the last twenty years and, Crypto, which won the grand eBook prize at the 2001 Frankfurt Book festival.

Read More Show Less

Read an Excerpt

Chapter 1: The Tech Model Railroad Club

Just why Peter Samson was wandering around in Building 26 in the middle of the night is a matter that he would find difficult to explain. Some things are not spoken. If you were like the people whom Peter Samson was coming to know and befriend in this, his freshman year at the Massachusetts Institute of Technology in the winter of 1958-59, no explanation would be required.

Wandering around the labyrinth of laboratories and storerooms, searching for the secrets of telephone switching in machine rooms, tracing paths of wires or relays in subterranean steam tunnels . . . for some, it was common behavior, and there was no need to justify the impulse, when confronted with a closed door with an unbearably intriguing noise behind it, to open the door uninvited. And then, if there was no one to physically bar access to whatever was making that intriguing noise, to touch the machine, start flicking switches and noting responses, and eventually to loosen a screw, unhook a template, jiggle some diodes and tweak a few connections. Peter Samson and his friends had grown up with a specific relationship to the world, wherein things had meaning only if you found out how they worked. And how would you go about that if not by getting your hands on them?

It was in the basement of Building 26 that Samson and his friends discovered the EAM room. Building 26 was a long glassand-steel structure, one of MIT's newer buildings, contrasting with the venerable pillared structures that fronted the Institute on Massachusetts Avenue. In the basement of this building void of personality, the EAM room. Electronic Accounting Machinery. A room that housed machineswhich ran like computers.

Not many people in 1959 had even seen a computer, let alone touched one. Samson, a wiry, curly-haired redhead with a way of extending his vowels so that it would seem he was racing through lists of possible meanings of statements in mid-word, had viewed computers on his visits to MIT from his hometown of Lowell, Massachusetts, less than thirty miles from campus. This made him a "Cambridge urchin," one of dozens of science-crazy high schoolers in the region who were drawn, as if by gravitational pull, to the Cambridge campus. He had even tried to rig up his own computer with discarded parts of old pinball machines: they were the best source of logic elements he could. find.

Logic elements: the term seems to encapsulate what drew Peter Samson, son of a mill machinery repairman, to electronics. The subject made sense. When you grow up with an insatiable curiosity as to how things work, the delight you find upon discovering something as elegant as circuit logic, where all connections have to complete their loops, is profoundly thrilling. Peter Samson, who early on appreciated the mathematical simplicity of these things, could recall seeing a television show on Boston's public TV channel, WGBH, which gave a rudimentary introduction to programming a computer in its own language. It fired his imagination: to Peter Samson, a computer was surely like Aladdin's lamp-rub it, and it would do your bidding. So he tried to learn more about the field, built machines of his own, entered science project competitions and contests, and went to the place that people of his ilk aspired to: MIT. The repository of the very brightest of those weird high school kids with owl-like glasses and underdeveloped pectorals who dazzled math teachers and flunked PE, who dreamed not of scoring on prom night, but of getting to the finals of the General Electric Science Fair competition. MIT, where he would wander the hallways at two o'clock in the morning, looking for something interesting, and where he would indeed discover something that would help draw him deeply into a new form of creative process, and a new life-style, and would put him into the forefront of a society envisioned only by a few science-fiction writers of mild disrepute. He would discover a computer that he could play with.

The EAM room which Samson had chanced on was loaded with large keypunch machines the size of squat file cabinets. No one was protecting them: the room was staffed only by day, when a select group who had attained official clearance were privileged enough to submit long manila cards to operators who would then use these machines to punch holes in them according to what data the privileged ones wanted entered on the cards. A hole in the card would represent some instruction to the computer, telling it to put a piece of data somewhere, or perform a function on a piece of data, or move a piece of data from one place to another. An entire stack of these cards made one computer program, a program being a series of instructions which yield some expected result, just as the instructions in a recipe, when precisely followed, lead to a cake. Those cards would be taken to yet another operator upstairs who would feed the cards into a "reader" that would note where the holes were and dispatch this information to the IBM 704 computer on the first floor of Building 26. The Hulking Giant.

The IBM 704 cost several million dollars, took up an entire room, needed constant attention from a cadre of professional machine operators, and required special air-conditioning so that the glowing vacuum tubes inside it would not heat up to data-destroying temperatures. When the air-conditioning broke down-a fairly common occurrence-a loud gong would sound, and three engineers would spring from a nearby office to frantically take covers off the machine so its innards wouldn't melt. All these people in charge of punching cards, feeding them into readers, and pressing buttons and switches on the machine were what was commonly called a Priesthood, and those privileged enough to submit data to those most holy priests were the official acolytes. It was an almost ritualistic exchange.

Acolyte: Oh machine, would you accept my offer of information so you may run my program and perhaps give me a computation?

Priest (on behalf of the machine): We will try. We promise nothing. As a general rule, even these most privileged of acolytes were not allowed direct access to the machine itself, and they would not be able to see for hours, sometimes for days, the results of the machine's ingestion of their "batch" of cards.

This was something Samson knew, and of course it frustrated the hell out of Samson, who wanted to get at the damn machine. For this was what life was all about...

Read More Show Less

Table of Contents

Preface ..... 7
Who's Who ..... 9
Part 1: True Hackers ..... 15
1: The Tech Model Railroad Club ..... 17
2: The Hacker Ethic ..... 39
3: Spacewar ..... 50
4: Greenblatt and Gosper ..... 70
5: The Midnight Computer Wiring Society ..... 91
6: Winners and Losers ..... 108
7: Life ..... 129
Part 2: Hardware Hackers ..... 153
8: Revolt in 2100 ..... 155
9: Every Man a God ..... 181
10: The Homebrew Computer Club ..... 201
11: Tiny Basic ..... 224
12: Woz ..... 244
13: Secrets ..... 268
Part 3: Game Hackers ..... 279
14: The Wizard and the Princess ..... 281
15: The Brotherhood ..... 303
16: The Third Generation ..... 313
17: Summer Camp ..... 332
18: Frogger ..... 350
19: Applefest ..... 372
20: Wizard vs. Wizards ..... 393
Epilogue: The Last of the True Hackers ..... 413
Afterword ..... 431
Acknowledgments ..... 437
Notes ..... 441
Index ..... 445
Read More Show Less

Customer Reviews

Average Rating 4
( 15 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 15 Customer Reviews
  • Anonymous

    Posted June 15, 2001

    The good old days!

    Although the book covers the early days of the computer revolution and its growth over the decades, the most nostalgic part for me was the early 1980s segment. For those who remember, it was the dawn of the home computer age, and there were so many platforms to choose from (today it's just PC and Mac). There were a lot of movers and shakers, pioneers with a vision. And back then, Bill Gates was just some guy that made a Disk Operating System and a version of the BASIC programming language. As the title demonstrates, 'hackers' are referred to as the good guys. There was actually once upon a time when the word had positive meanings. Today most people associate the word 'hacker' with people bent with destructive purporses with their computers. A very good read for those interested in the history of the computer age and the people that made a difference. They paved way for the computers we all are using today.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 16, 2000

    Incredible read

    I've read Steven Levy's articles in Macworld magazine. It's this book, Hackers, that earned him my utmost respect as an author. Levy chronicles the history of hacking from the ancient 1960's at MIT up through the early 1980's. While the material is apparently non-fiction, the book flows very well, and is well suited to reading chapters every now and then, as every few chapters covers a different breed of hacker.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 18, 2015

    How are hackers a GOOD thing?

    I got hacked once. It killed mah computer

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 25, 2014

    Not Working

    Unable to open sample on my tablet. Delete!

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted November 11, 2012

    Since I knew, from childhood, one of the major players in this b

    Since I knew, from childhood, one of the major players in this book, I feel qualified to comment on the nature of Mr. Levy's accuracy and scholarship, as well as his enthusiastic and readable writing style. I would say that he got the essence and attitude of my friend as accurately as one could hope for. After reading over 50 pages concerning this fellow, Mr. Levy left me with only one comment...which was "SPOT-ON!"

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 6, 2011

    This is a great read

    This is a great read for understanding the history of hacking and who where the role players.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 20, 2011

    Great book about the foundation of modern computing

    This is a great read on the history of computing, and an interesting study on what defined the earliest hackers, and the hacker spirit. I recommend this book highly to those who love computers and want to learn more about what defined the computer they are currently using.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 15, 2001

    A book about true Hackerism

    Unlike what any AOL-lamer might think this book is not about security exploitation or anything of the like. Hacking is a philosophy, and this book describes it ever so eloquently. This is one of the best computer history books ever written for programmers and curious users alike. This takes you through the world where computers were only for the highly privileged all the way to the beginnings of mainstream home computing. You get to learn about the real pioneers of computing, from those that began the AI revolution to the writer of the ever so popular EMACS. A smooth read, I highly recommend it to anyone interested in computers in general.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 27, 2001

    Very in depth

    You wouldn't believe the detail in this book. It's basically a step by step description of the biggest computer accomplishments when computers had just came out. It is very percise, down to the model numbers, and characteristics. This is a very good book if you're a techie. Otherwise, go read a dummies book, dummy.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 8, 2000

    Great book about Real Hackers

    This book is a great read, it starts from the early days of huge mainframes to the early years of PCs, it chronicles the lifes and accomplishments of real hackers not those wanna-bes that just want to destroy things.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted August 5, 2013

    No text was provided for this review.

  • Anonymous

    Posted April 9, 2011

    No text was provided for this review.

  • Anonymous

    Posted December 27, 2010

    No text was provided for this review.

  • Anonymous

    Posted October 25, 2008

    No text was provided for this review.

  • Anonymous

    Posted April 3, 2011

    No text was provided for this review.

Sort by: Showing all of 15 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)