Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
 |
No Outward Sign : |
List Price: $28.95
Your Price: $28.95 |
 |
|
|
Product Info |
Reviews |
Rating:  Summary: No Outward Sign Review: This timely page turner will keep the reader on the edge of his seat!! Mr. Neugent weaves an intricate plot that is frightening, puzzling, and also informative. Curl up in your favorite spot and disappear into the world of computer crime.
Rating:  Summary: There is no better book of its kind anywhere! Review: What Bill Neugent was able to do, and what no other author is capable of doing, is bring the horror of information warfare to a readable and understandable literary presentation for the general public. Even more amazing is that he has brought white knuckle, edge of your seat excitement to a topic like cyber security, which is no small feat. The ability to transform a complex but timely subject matter into a full action drama is extremely rare. Once you pick it up, you won't be able to put it down.
Rating:  Summary: unfortunately real Review: When I studied creative writing, I got furious with my teacher who praised my verisimilitude. What I had written was true, damn it! He explained that that didn't matter. All that mattered was whether the reader believed it.
From the reviews I read here, some readers didn't believe Bill's plot. To me, as a computer security architect, the only thing unbelievable was the array of defenses Bill hauled out. I hope our military has such defenses. We in the commercial world don't.
On the other hand, the attack scenarios were all believable, to me as someone in this field, and many of these attacks have been demonstrated already.
So, I recommend this book to friends in the computer security business as an attack scenario that we need to design against. Designing against attackers less capable than these is folly, IMHO.
|
|
|
|