Skip to Main Content (Press Enter)
Steal This Computer Book 4.0 by Wallace Wang
Add Steal This Computer Book 4.0 to bookshelf
Add to Bookshelf

Steal This Computer Book 4.0

Best Seller
Steal This Computer Book 4.0 by Wallace Wang
Paperback $29.95
May 06, 2006 | ISBN 9781593271053

Buy from Other Retailers:

See All Formats (1) +
  • $29.95

    May 06, 2006 | ISBN 9781593271053

    Buy from Other Retailers:

  • May 06, 2006 | ISBN 9781593273439

    Buy from Other Retailers:

Product Details

Praise

“A terrific guide . . . made enjoyable by the sense that you’re seeing how the bad guys operate. But beyond this excitement, the book has immediate value.”
—SD Times

“Since Steal This Computer Book 4.0 hit my desk, a strange thing happened: Almost every person who saw it immediately asked to borrow it. This wasn’t just the other office geeks, but some downright technophobes, as well . . . There are good reasons for all the interest.”
—Security Management

“Demonstrates that you can write about computer security in an engaging manner . . . it is as entertaining as it is informative.”
—Greater Cleveland PC Users Group

“A lot of information is revealed in the Wang book that could be useful for hackers.”
—Cybercriminology727 blog

“This book has some of the best information about protecting yourself, your family and your computer from illegal or malicious acts perpetrated electronically. It also contains very thoughtful and insightful paragraphs about the use of computers by individuals, groups, corporations and nations. And it is almost as compelling as a good novel.”
—Kickstart News

“Offers a philosophical book about the implications of hacking.”
—SciTech Book News

“Highly readable and highly informative. It won’t turn you into a hacker. But it will prepare you against being attacked by one and will entertain and delight you along the way.”
—IT Wales

“A technology classic that is as entertaining and irreverent as it is informative . . . “
—MacDirectory

“An excellent offbeat examination of hacking. . . I found the book fascinating, at times almost addicting.”
—MacCompanion

“If you’ve used the computer, you need to know about common tricks and traps, and the latest edition covers them all.”
—Midwest Book Review

“A surprisingly fun read on a serious topic.”
—Business in Vancouver

“Guides us nicely through the computer and internet underworld and as such it’s a fairly good guide to a lot of the possible things that can go wrong.”
—Mstation

“I would recommend it for anyone that wants an entertaining overview of computers and criminals.”
—WindowsSecurity.com

“It’s similar to reading about the seamy underbelly of your local city . . . you know it’s there, you don’t condone it, but you have a hard time averting your eyes when you drive by.”
—Duffbert’s Random Musings

“Although this book is not for the non-technical small business owner/manager, it could be VERY useful for the IT consultant serving the needs of small businesses and who needs a better understanding of security and the world of hackers.”
—Small Business News

Table Of Contents

Part 1: The Early Hackers
Chapter 1: The Hacker Mentality
Chapter 2: The First Hackers: The Phone Phreakers
Chapter 3: Hacking People, Places, and Things
Part 2: The PC Pioneers
Chapter 4: Ansi Bombs and Viruses
Chapter 5: Trojan Horses and Worms
Chapter 6: Warez (Software Piracy)
Part 3: The Internet Hackers
Chapter 7: Where the Hackers Are
Chapter 8: Stalking a Computer
Chapter 9: Cracking Passwords
Chapter 10: Digging Into a Computer with Rootkits
Chapter 11: Censoring Information
Chapter 12: The Filesharing Networks
Part 4: The Real World Hackers
Chapter 13: The Internet Con Artists
Chapter 14: Finding People on the Internet
Chapter 15: Propaganda as News and Entertainment
Chapter 16: Hacktivism: Online Activism
Chapter 17: Hate Groups and Terrorists on the Internet
Part 5: The Future—Hacking for Profit
Chapter 18: Identity Theft and Spam
Chapter 19: Banner Ads, Pop-up Ads, and Search Engine Spamming
Chapter 20: Adware and Spyware
Part 6: Protecting Your Computer and Yourself
Chapter 21: Computing on a Shoestring: Getting Stuff for (Almost) Free
Chapter 22: Computer Forensics: The Art of Deleting and Retrieving Data
Chapter 23: Locking Down Your Computer

Looking for More Great Reads?
21 Books You’ve Been Meaning to Read
Back to Top