netwars - The Code 1: Crash [NOOK Book]

Overview

netwars: The Code. Episode 1 of 6. - Hackers. Cyber warfare. Terrorism. Forget Edward Snowden and the NSA. Do you really know who's monitoring your data? -- Welcome to the Deep Web. Those parts of the internet no search engine explores. The place where you can buy anything. Drugs, children, weapons. Anyone can do it. And get away free. -- Anthony Prince, head of PrinceSec, a firm that provides high-tech security for the government and major corporations, dies in a plane crash when crossing the English Channel. ...
See more details below
netwars - The Code 1: Crash

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook - 1. Aufl. 2014)
$1.99
BN.com price

More About This Book

Overview

netwars: The Code. Episode 1 of 6. - Hackers. Cyber warfare. Terrorism. Forget Edward Snowden and the NSA. Do you really know who's monitoring your data? -- Welcome to the Deep Web. Those parts of the internet no search engine explores. The place where you can buy anything. Drugs, children, weapons. Anyone can do it. And get away free. -- Anthony Prince, head of PrinceSec, a firm that provides high-tech security for the government and major corporations, dies in a plane crash when crossing the English Channel. Responsible for Prince's death is a hacker named Strider, whose real name is Scott Mitchell. During his day job at the National Cyber Crime Unit (NCCU) Mitchell uses legitimate means to get the bad guys. As Strider, he pushes the boundaries of the law to punish them. On the night of Anthony Prince's death, PrinceSec suffers a cyber-attack. Passwords, secrets, security measures to high profile targets are stolen. When the NCCU is called to assess the damage, they find a link between Prince and a criminal hacker group called Black Flag. The race is on for Mitchell to protect his identity as Strider and to stop Black Flag before the next attack. -- netwars: The Code is part of a transmedia project based on real facts and cyber-attack scenarios. The project spans multiple story platforms including a fact-based website (www.netwars-project.com) and the interactive graphic novel app "netwars: The Butterfly Attack." For fans of Dave Eggers, THE CIRCLE; Daniel Suarez, DARKNET; the movie ENEMY OF THE STATE, and espionage and high-tech thrillers. -- About the Author: M. Sean Coleman launched his career as one of the original writers on Hitchhikers Guide to the Galaxy Online. He has since written and produced original, award-winning shows for MSN, O2, Sony Pictures, Fox, the BBC, and Channel 4. He continues to write novels, graphic novels and tv scripts from his home in London.
Read More Show Less

Product Details

  • ISBN-13: 9783838755953
  • Publisher: Bastei Entertainment
  • Publication date: 5/16/2014
  • Series: netwars 1 - A Cyber Crime Thriller, #1
  • Sold by: Zebralution
  • Format: eBook
  • Edition description: 1. Aufl. 2014
  • Pages: 61
  • Sales rank: 106,577
  • File size: 2 MB

Customer Reviews

Average Rating 4.5
( 5 )
Rating Distribution

5 Star

(3)

4 Star

(1)

3 Star

(1)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 5 Customer Reviews
  • Posted January 7, 2015

    Well written, fast past cyber thriller that leaves you wanting m

    Well written, fast past cyber thriller that leaves you wanting more. The references to computer and SCADA vulnerabilities is dead accurate.
    Any IT person should enjoy this series. It would be nice if this was collected into one eBook. Multiple purchases was the only downside.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 24, 2014

    I gave it 5 stars. It was intriguing to say the least. My knowle

    I gave it 5 stars. It was intriguing to say the least. My knowledge of cyberspace is minimal. 
     
    This story frightened me by calling to awareness all the aspects of our lives that are governed by the internet. Every key stroke we make, every Twitter or Facebook Status we key in, reveals something about us. Should that knowledge be accessed by an unscrupulous individual, it puts us at risk. It can be used as a weapon.
     
     PrinceSec was developed by Anthony Prince & 'had been supplying industry-leading security software for years and with a substantial number of the major control systems operating in Europe already using PrinceSec’s software, they were in a unique position of trust.'
     
    He got involved with something called the Teddybear's Picnic Network where a group of like-minded individuals shared child pornography. That involvement opened the door to a criminal hacker group known as Black Flag. They blackmailed him into allowing them access into PrinceSec's database. It became a lucrative partnership for them.
     
    He was changing his life as he knew it by divorcing his wife & moving to Thailand where he could obtain his 'little princess'. He transferred his monies to an offshore account & was ready to fly his plane to England to tell his wife he was leaving when an airplane mechanic handed him an envelope.
     
    "The envelope had contained a single slip of paper with a series of digits written on it. Four sets of numbers, separated by three dots. 
     
    Prince recognised them immediately as a numerical website address. Sitting in the lounge at the airport, he had opened a secure browser on his laptop and keyed in the numbers. He often received information this way from his contacts, and he hadn’t thought twice about entering the digits. The address took him to a directory with several links in it. The first link said ‘Read Me’. 
     
    As Prince clicked on the link, it refreshed the screen with a cryptic note, which read: 'You will never know me, but I will be the death of you. I saw what you did — I see everything you do. I heard what you said — I know your secrets.I know where you went — I follow you everywhere. You are not above scrutiny — I scrutinise everything. You are not above the law — I am the law. Don’t ask for forgiveness, nor pardon, nor grace. Just understand this: If you cannot live by the Code, you must die by the Code.'- Strider"
     
    Prince started his flying his plane back to London on a rainy night, when he got warning lights & dings from the control panel. 
     
    "He was starting to hate that ominous little light. He disengaged the autopilot and tried to right the plane. The controls felt like they were fighting against him. His stomach lurched as he felt the plane go into a roll. What the hell was happening? The controls not only wouldn’t respond, but they seemed to do the opposite of everything he asked. As if from nothing, the small jet started to spin out of control, spiralling straight downward.
     
    ‘Mayday, Mayday, Mayday!’ he called over the radio. ‘Charlie Juliet Four. I’m out of control. I’m going down! Mayday, Mayday, Mayday!’ Nothing but static came as a response. He had been in a roll like this before; the Cessna was a touchy jet. He needed to act quickly. Trying to compose himself, Prince released the stick, eased forward on it again and felt the plane lift out of the roll and come back to level. He was a good pilot. He tried to calm down again, breathed out, and felt the plane come fully back into his control. He couldn’t see anything in the gloom outside, but he checked his console which confirmed that he’d lost height, so he cautiously eased the stick forward to lift the nose.‘Control? This is Citation Charlie Juliet four. I’m okay. I’m okay. Leveling up,’ he said.
     
    ‘Goodnight, sweet Prince,’ came the reply.
     
    "Prince looked up from the console just in time to see the looming white face of the cliffs of Dover right in front of him. His altitude indicator was way off — he had pulled up level just above the surface of the sea. There was not even time to scream before his small jet crashed into the white cliff face and exploded with the force."
     
    Strider aka Mitchell was a charming young hacker who could blend into society rather than the presumed image as a pale-skinned social misfit. 
     
    He was responsible for Prince's death. He thought of himself as a skilled provider of a necessary service. The fact that he was an assassin was a sideline. As Mitchell he works for the National Cyber Crime Unit.
     
    "He prided himself on being able to get close to even the most carefully protected people in the world. For some reason, no matter how paranoid in every other aspect of their lives, people somehow forgot to look over their digital shoulder quite as carefully. Nobody had really figured out the digital equivalent of bodyguards yet."
     
    He did due diligence in selecting a target by studying their every move.
     
    "Sometimes his targets were politicians, sometimes law-makers, sometimes CEOs of major corporations. The one thing that linked them all was their arrogance in thinking that they were above the law. Well, perhaps they were above the law, but they were not beyond the reach of the Code."
     
    Mitchell as Strider dispensed justice according to his Code. "Strider never felt guilt. Why should he? He was performing a service after all. Policing the ones the police couldn’t catch, governing the ungovernable."
     
     A member of Black Flag discovered Strider's existence & determined to find & get rid of him even though he felt a grudging respect for his hacking abilities.
     
    "Nightshade smiled. It was a smile of pure, twisted malice. There was still some fun to be had. There was something intriguingly familiar about the hacker’s work, and Nightshade wanted to know more. Besides, there was no point getting rid of an adversary without letting them know they’d been beaten — where was the fun in that?"
     
    The race was on for Mitchell to protect his identity from Black Flag's Nightshade.
     
    The world has become a smaller place with the development of the World Wide Web.
     
    "There’s something for everyone: if you can think of it, the Internet will have something dedicated to it. That’s how the majority of the connected population see it, anyway. Very few of us stop to think about just how many of our daily activities are now ‘connected’. Yes, we are aware of identity theft, spamming, phishing, viruses and worms, but few of us will look at a device which has been built to make our lives easier and see it as a possible weapon. Potentially, anything with an electronic component could be hacked to cause huge damage."
     
     To me, this was the truly scary part. I've been one of those unaware, thoughtless people who has over-shared on social media forums. Now I'll be more cautious.
     
    Rebecca McDonald worked for PrinceSec's Security services. I could relate to part of her description. "Her dark brown hair hung in springy curls, in a shape that could only be described as full. She had embraced her curls early on in life. Of course, as a teenager she had gone through the inevitable rebellion, trying straighteners, chemicals and tongs but there was no point fighting it." 
     
    The only difference being that my hair was red & unruly. I called it 'willful hair' & realized that it might as well suit the rest of my stubborn personality.
     
    Strider has been bullied throughout his childhood. He real

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted June 21, 2014

    more from this reviewer

    I absolutely loved this book. It is a serial novel, but it is on

    I absolutely loved this book. It is a serial novel, but it is one that once you begin you are going to want to read every page of the following series. The technology is true and so informative. It does not bog down in technical details, but it does make you aware of what goes on behind the scenes and what the net is truly capable of. I can't say enough good things about this book, and you should stop reading my review and start reading Netwars.This is a great reading experience, and this author really keeps the flow of the story going, along with great character development I was given this book for an honest review, and my review reflects my true reading experience.

    Was this review helpful? Yes  No   Report this review
  • Posted May 20, 2014

    Not a romance, this was supposed to be a tech-thriller. I enjoye

    Not a romance, this was supposed to be a tech-thriller. I enjoyed what plot there was, there just wasn't enough of it. Maybe it's because it's a serial, but ... something just left me out cold. The problem I had with this book was the fact that there was so much information dumped about so many little facets of the internet and the Deep Web, along with information about PrinceSec, that I just sort of ended up skimming a lot of the book.




    Strider/Mitchell - I liked the dual persona thing the main character had going for him. While I don't approve of being all assassin-like, I have to admire his personal code and the lengths he's willing to go to eliminate evil in the world. 




    There were many different facets to this book (the Deep Web, the Black Flag group, the ongoing human trafficking issue - at least I assume that's what the very end implied). There was no overall conclusion to the issues raised, and given this is a serial novel, that wasn't a problem for me. 




    I definitely want to read more in this series, but it wasn't something that totally blew my mind. Three gargoyles!




    Book provided by NetGalley in exchange for an honest review.

    Was this review helpful? Yes  No   Report this review
  • Posted May 18, 2014

    Flagship security software - Cryptos was supplied to governments

    Flagship security software - Cryptos was supplied to governments as form of cyber security systems around europe,
    and the company was built on a single piece of code. This is a story of intrigue, mystery, espionage and blackmail at the highest levels, together with
    seedy undertones, a secret urge for young girls and a elite group of hackers who have worked on the criminal marked on
    deep Web. If your looking for a thriller then this is the one for you, edge of seat reading with twist and turns.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 5 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)