Hackers: Heroes of the Computer Revolution

( 14 )

Overview

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers — those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs ...

See more details below
Paperback
$14.51
BN.com price
(Save 34%)$21.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (15) from $12.12   
  • New (13) from $12.34   
  • Used (2) from $12.12   
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$10.49
BN.com price
(Save 41%)$17.99 List Price

Overview

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers — those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

A classic reissued for the first time in trade paperback with a new afterword from the author, this is the story of the true pioneers of the computer revolution -- the young mavericks and renegades who hacked their way into controlling an industry. Levy's monthly column appears in MacWorld.

Read More Show Less

Product Details

  • ISBN-13: 9781449388393
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 6/10/2010
  • Edition number: 1
  • Pages: 499
  • Sales rank: 249,938
  • Product dimensions: 5.50 (w) x 8.40 (h) x 1.10 (d)

Meet the Author

Levy is a senior writer for Wired. Previously, he was chief technology writer and a senior editor for Newsweek. Levy has written six books and had articles published in Harper's, Macworld, The New York Times Magazine, The New Yorker, Premiere, and Rolling Stone. Steven has won several awards during his 30+ years of writing about technology, including Hackers, which PC Magazine named the best Sci-Tech book written in the last twenty years and, Crypto, which won the grand eBook prize at the 2001 Frankfurt Book festival.

Read More Show Less

Read an Excerpt

Chapter 1: The Tech Model Railroad Club

Just why Peter Samson was wandering around in Building 26 in the middle of the night is a matter that he would find difficult to explain. Some things are not spoken. If you were like the people whom Peter Samson was coming to know and befriend in this, his freshman year at the Massachusetts Institute of Technology in the winter of 1958-59, no explanation would be required.

Wandering around the labyrinth of laboratories and storerooms, searching for the secrets of telephone switching in machine rooms, tracing paths of wires or relays in subterranean steam tunnels . . . for some, it was common behavior, and there was no need to justify the impulse, when confronted with a closed door with an unbearably intriguing noise behind it, to open the door uninvited. And then, if there was no one to physically bar access to whatever was making that intriguing noise, to touch the machine, start flicking switches and noting responses, and eventually to loosen a screw, unhook a template, jiggle some diodes and tweak a few connections. Peter Samson and his friends had grown up with a specific relationship to the world, wherein things had meaning only if you found out how they worked. And how would you go about that if not by getting your hands on them?

It was in the basement of Building 26 that Samson and his friends discovered the EAM room. Building 26 was a long glassand-steel structure, one of MIT's newer buildings, contrasting with the venerable pillared structures that fronted the Institute on Massachusetts Avenue. In the basement of this building void of personality, the EAM room. Electronic Accounting Machinery. A room that housed machineswhich ran like computers.

Not many people in 1959 had even seen a computer, let alone touched one. Samson, a wiry, curly-haired redhead with a way of extending his vowels so that it would seem he was racing through lists of possible meanings of statements in mid-word, had viewed computers on his visits to MIT from his hometown of Lowell, Massachusetts, less than thirty miles from campus. This made him a "Cambridge urchin," one of dozens of science-crazy high schoolers in the region who were drawn, as if by gravitational pull, to the Cambridge campus. He had even tried to rig up his own computer with discarded parts of old pinball machines: they were the best source of logic elements he could. find.

Logic elements: the term seems to encapsulate what drew Peter Samson, son of a mill machinery repairman, to electronics. The subject made sense. When you grow up with an insatiable curiosity as to how things work, the delight you find upon discovering something as elegant as circuit logic, where all connections have to complete their loops, is profoundly thrilling. Peter Samson, who early on appreciated the mathematical simplicity of these things, could recall seeing a television show on Boston's public TV channel, WGBH, which gave a rudimentary introduction to programming a computer in its own language. It fired his imagination: to Peter Samson, a computer was surely like Aladdin's lamp-rub it, and it would do your bidding. So he tried to learn more about the field, built machines of his own, entered science project competitions and contests, and went to the place that people of his ilk aspired to: MIT. The repository of the very brightest of those weird high school kids with owl-like glasses and underdeveloped pectorals who dazzled math teachers and flunked PE, who dreamed not of scoring on prom night, but of getting to the finals of the General Electric Science Fair competition. MIT, where he would wander the hallways at two o'clock in the morning, looking for something interesting, and where he would indeed discover something that would help draw him deeply into a new form of creative process, and a new life-style, and would put him into the forefront of a society envisioned only by a few science-fiction writers of mild disrepute. He would discover a computer that he could play with.

The EAM room which Samson had chanced on was loaded with large keypunch machines the size of squat file cabinets. No one was protecting them: the room was staffed only by day, when a select group who had attained official clearance were privileged enough to submit long manila cards to operators who would then use these machines to punch holes in them according to what data the privileged ones wanted entered on the cards. A hole in the card would represent some instruction to the computer, telling it to put a piece of data somewhere, or perform a function on a piece of data, or move a piece of data from one place to another. An entire stack of these cards made one computer program, a program being a series of instructions which yield some expected result, just as the instructions in a recipe, when precisely followed, lead to a cake. Those cards would be taken to yet another operator upstairs who would feed the cards into a "reader" that would note where the holes were and dispatch this information to the IBM 704 computer on the first floor of Building 26. The Hulking Giant.

The IBM 704 cost several million dollars, took up an entire room, needed constant attention from a cadre of professional machine operators, and required special air-conditioning so that the glowing vacuum tubes inside it would not heat up to data-destroying temperatures. When the air-conditioning broke down-a fairly common occurrence-a loud gong would sound, and three engineers would spring from a nearby office to frantically take covers off the machine so its innards wouldn't melt. All these people in charge of punching cards, feeding them into readers, and pressing buttons and switches on the machine were what was commonly called a Priesthood, and those privileged enough to submit data to those most holy priests were the official acolytes. It was an almost ritualistic exchange.

Acolyte: Oh machine, would you accept my offer of information so you may run my program and perhaps give me a computation?

Priest (on behalf of the machine): We will try. We promise nothing. As a general rule, even these most privileged of acolytes were not allowed direct access to the machine itself, and they would not be able to see for hours, sometimes for days, the results of the machine's ingestion of their "batch" of cards.

This was something Samson knew, and of course it frustrated the hell out of Samson, who wanted to get at the damn machine. For this was what life was all about...

Read More Show Less

Table of Contents

Preface

Who’s Who: The Wizards and Their Machines

True Hackers: Cambridge: The Fifties and Sixties

Hardware Hackers: Northern California: The Seventies

Game Hackers: The Sierras: The Eighties

The Last of the True Hackers: Cambridge: 1983

The Last of the True Hackers

Afterword: Ten Years After

Afterword: 2010

Notes

Acknowledgments

About the Author

Colophon

Read More Show Less

Customer Reviews

Average Rating 4.5
( 14 )
Rating Distribution

5 Star

(10)

4 Star

(2)

3 Star

(1)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 14 Customer Reviews
  • Anonymous

    Posted June 15, 2001

    The good old days!

    Although the book covers the early days of the computer revolution and its growth over the decades, the most nostalgic part for me was the early 1980s segment. For those who remember, it was the dawn of the home computer age, and there were so many platforms to choose from (today it's just PC and Mac). There were a lot of movers and shakers, pioneers with a vision. And back then, Bill Gates was just some guy that made a Disk Operating System and a version of the BASIC programming language. As the title demonstrates, 'hackers' are referred to as the good guys. There was actually once upon a time when the word had positive meanings. Today most people associate the word 'hacker' with people bent with destructive purporses with their computers. A very good read for those interested in the history of the computer age and the people that made a difference. They paved way for the computers we all are using today.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 16, 2000

    Incredible read

    I've read Steven Levy's articles in Macworld magazine. It's this book, Hackers, that earned him my utmost respect as an author. Levy chronicles the history of hacking from the ancient 1960's at MIT up through the early 1980's. While the material is apparently non-fiction, the book flows very well, and is well suited to reading chapters every now and then, as every few chapters covers a different breed of hacker.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 25, 2014

    Not Working

    Unable to open sample on my tablet. Delete!

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted November 11, 2012

    Since I knew, from childhood, one of the major players in this b

    Since I knew, from childhood, one of the major players in this book, I feel qualified to comment on the nature of Mr. Levy's accuracy and scholarship, as well as his enthusiastic and readable writing style. I would say that he got the essence and attitude of my friend as accurately as one could hope for. After reading over 50 pages concerning this fellow, Mr. Levy left me with only one comment...which was "SPOT-ON!"

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 6, 2011

    This is a great read

    This is a great read for understanding the history of hacking and who where the role players.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 20, 2011

    Great book about the foundation of modern computing

    This is a great read on the history of computing, and an interesting study on what defined the earliest hackers, and the hacker spirit. I recommend this book highly to those who love computers and want to learn more about what defined the computer they are currently using.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 15, 2001

    A book about true Hackerism

    Unlike what any AOL-lamer might think this book is not about security exploitation or anything of the like. Hacking is a philosophy, and this book describes it ever so eloquently. This is one of the best computer history books ever written for programmers and curious users alike. This takes you through the world where computers were only for the highly privileged all the way to the beginnings of mainstream home computing. You get to learn about the real pioneers of computing, from those that began the AI revolution to the writer of the ever so popular EMACS. A smooth read, I highly recommend it to anyone interested in computers in general.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 27, 2001

    Very in depth

    You wouldn't believe the detail in this book. It's basically a step by step description of the biggest computer accomplishments when computers had just came out. It is very percise, down to the model numbers, and characteristics. This is a very good book if you're a techie. Otherwise, go read a dummies book, dummy.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 8, 2000

    Great book about Real Hackers

    This book is a great read, it starts from the early days of huge mainframes to the early years of PCs, it chronicles the lifes and accomplishments of real hackers not those wanna-bes that just want to destroy things.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted August 5, 2013

    No text was provided for this review.

  • Anonymous

    Posted April 3, 2011

    No text was provided for this review.

  • Anonymous

    Posted October 25, 2008

    No text was provided for this review.

  • Anonymous

    Posted December 27, 2010

    No text was provided for this review.

  • Anonymous

    Posted April 9, 2011

    No text was provided for this review.

Sort by: Showing all of 14 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)